Guozhu Meng
Guozhu Meng
Associate Professor with Chinese Academy of Sciences
Verified email at - Homepage
Cited by
Cited by
Guided, Stochastic Model-Based GUI Testing of Android Apps
T Su, G Meng, Y Chen, K Wu, W Yang, Y Yao, G Pu, Y Liu, Z Su
11th Joint Meeting of the European Software Engineering Conference and the …, 2017
From UI Design Image to GUI Skeleton: A Neural Machine Translation to Bootstrap Mobile GUI Implementation
C Chen, T Su, G Meng, Z Xing, Y Liu
The 40th International Conference on Software Engineering (ICSE), 2018
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations
G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, JS Dong
Proceedings of the 20th Annual Network and Distributed System Security …, 2013
Large-scale analysis of framework-specific exceptions in android apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu, Z Su
Proceedings of the 40th International Conference on Software Engineering …, 2018
Towards Security Threats of Deep Learning Systems: A Survey
Y He, G Meng, K Chen, X Hu, J He
IEEE Transactions on Software Engineering, 2020
Collaborative security: A survey and taxonomy
G Meng, Y Liu, J Zhang, A Pokluda, R Boutaba
ACM Computing Surveys (CSUR) 48 (1), 1-42, 2015
Auditing anti-malware tools by evolving android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools
G Meng, Y Xue, M Chandramohan, A Narayanan, Y Liu, J Zhang, T Chen
ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), 2016
A performance-sensitive malware detection system using deep learning on mobile devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1563-1578, 2020
Semantic Modelling of Android Malware for Effective Malware Comprehension, Detection, and Classification
G Meng, Y Xue, Z Xu, Y Liu, J Zhang, A Narayanan
The International Symposium on Software Testing and Analysis (ISSTA), 2016
An empirical assessment of security risks of global android banking apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Efficiently manifesting asynchronous programming errors in android apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
Are mobile banking apps secure? what can be improved?
S Chen, T Su, L Fan, G Meng, M Xue, Y Liu, L Xu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned
B Liu, G Meng, W Zou, Q Gong, F Li, M Lin, D Sun, W Huo, C Zhang
2020 IEEE/ACM 42nd International Conference on Software Engineering, 2020
Large-scale empirical studies on effort-aware security vulnerability prediction methods
X Chen, Y Zhao, Z Cui, G Meng, Y Liu, Z Wang
IEEE Transactions on Reliability 69 (1), 70-87, 2019
Contextual weisfeiler-lehman graph kernel for malware detection
A Narayanan, G Meng, L Yang, J Liu, L Chen
2016 International Joint Conference on Neural Networks (IJCNN), 4701-4708, 2016
Learning program semantics with code representations: An empirical study
JK Siow, S Liu, X Xie, G Meng, Y Liu
2022 IEEE International Conference on Software Analysis, Evolution and …, 2022
Have you been properly notified? automatic compliance analysis of privacy policy text with GDPR article 13
S Liu, B Zhao, R Guo, G Meng, F Zhang, M Zhang
Proceedings of the Web Conference 2021, 2154-2164, 2021
Securing android app markets via modeling and predicting malware spread between markets
G Meng, M Patrick, Y Xue, Y Liu, J Zhang
IEEE Transactions on Information Forensics and Security 14 (7), 1944-1959, 2018
The system can't perform the operation now. Try again later.
Articles 1–20