Guozhu Meng
Guozhu Meng
Chinese Academy of Sciences & Nanyang Technological University
Verified email at - Homepage
TitleCited byYear
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations
G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, JS Dong
Proceedings of the 20th Annual Network and Distributed System Security …, 2013
Collaborative security: A survey and taxonomy
G Meng, Y Liu, J Zhang, A Pokluda, R Boutaba
ACM Computing Surveys (CSUR) 48 (1), 1, 2015
Guided, Stochastic Model-Based GUI Testing of Android Apps
T Su, G Meng, Y Chen, K Wu, W Yang, Y Yao, G Pu, Y Liu, Z Su
11th Joint Meeting of the European Software Engineering Conference and the …, 2017
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools
G Meng, Y Xue, M Chandramohan, A Narayanan, Y Liu, J Zhang, T Chen
ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), 2016
Semantic Modelling of Android Malware for Effective Malware Comprehension, Detection, and Classification
G Meng, Y Xue, Z Xu, Y Liu, J Zhang, A Narayanan
The International Symposium on Software Testing and Analysis (ISSTA), 2016
Auditing anti-malware tools by evolving Android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
Contextual Weisfeiler-Lehman graph kernel for malware detection
A Narayanan, G Meng, L Yang, J Liu, L Chen
2016 International Joint Conference on Neural Networks (IJCNN), 4701-4708, 2016
Large-scale analysis of framework-specific exceptions in Android apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu, Z Su
2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE …, 2018
From UI Design Image to GUI Skeleton: A Neural Machine Translation to Bootstrap Mobile GUI Implementation
C Chen, T Su, G Meng, Z Xing, Y Liu
The 40th International Conference on Software Engineering (ICSE), 2018
Battery-aware mobile data service
L He, G Meng, Y Gu, C Liu, J Sun, T Zhu, Y Liu, KG Shin
IEEE Transactions on Mobile Computing 16 (6), 1544-1558, 2016
Efficiently manifesting asynchronous programming errors in Android apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu
arXiv preprint arXiv:1808.03178, 2018
Androvault: Constructing knowledge graph from millions of android apps for automated analysis
G Meng, Y Xue, JK Siow, T Su, A Narayanan, Y Liu
arXiv preprint arXiv:1711.07451, 2017
Battery state-of-health estimation for mobile devices
L He, E Kim, KG Shin, G Meng, T He
2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS …, 2017
Are mobile banking apps secure? what can be improved?
S Chen, T Su, L Fan, G Meng, M Xue, Y Liu, L Xu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
Mining Implicit Design Templates for Actionable Code Reuse
Y Lin, G Meng, Y Xue, Z Xing, J Sun, X Peng, Y Liu, W Zhao, J Dong
The 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Securing Android App Markets via Modelling and Predicting Malware Spread between Markets
G Meng, M Patrick, Y Xue, Y Liu, J Zhang
IEEE Transactions on Information Forensics and Security, 2018
A Semantic-based Analysis of Android Malware for Detection, Generation, and Trend Analysis
G Meng
Doctoral dissertation, Nanyang Technological University, 2017
Securing android applications via edge assistant third-party library detection
Z Tang, M Xue, G Meng, C Ying, Y Liu, J He, H Zhu, Y Liu
Computers & Security 80, 257-272, 2019
DroidEcho: an in-depth dissection of malicious behaviors in Android applications
G Meng, R Feng, G Bai, K Chen, Y Liu
Cybersecurity 1 (1), 4, 2018
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps
Z Su, L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu
arXiv, 2018
The system can't perform the operation now. Try again later.
Articles 1–20