Jianjun Huang
Jianjun Huang
School of Information, Renmin University of China
Verified email at - Homepage
Cited by
Cited by
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction
J Huang, X Zhang, L Tan, P Wang, B Liang
Proceedings of the 36th International Conference on Software Engineering …, 2014
Supor: Precise and scalable sensitive user input detection for android apps
J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang
24th USENIX Security Symposium (USENIX Security 15), 977-992, 2015
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
2019 IEEE Symposium on Security and Privacy (SP), 769-786, 2019
Automatic model generation from documentation for Java API functions
J Zhai, J Huang, S Ma, X Zhang, L Tan, J Zhao, F Qin
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
Precise Android API Protection Mapping Derivation and Reasoning
Y Aafer, G Tao, J Huang, X Zhang, N Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
NAR-miner: discovering negative association rules from code for bug detection
P Bian, B Liang, W Shi, J Huang, Y Cai
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching
J Huang, S Han, W You, W Shi, B Liang, J Wu, Y Wu
IEEE Transactions on Information Forensics and Security 16, 2144-2156, 2021
Malicious Web Pages Detection Based on Abnormal Visibility Recognition
B Liang, J Huang, F Liu, D Wang, D Dong, Z Liang
2009 International Conference on E-Business and Information System Security, 1-5, 2009
Detecting sensitive data disclosure via bi-directional text correlation analysis
J Huang, X Zhang, L Tan
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection
Y Aafer, J Huang, Y Sun, X Zhang, N Li, C Tian
25th Annual Network and Distributed System Security Symposium, NDSS, 18-21, 2018
Android permission re-delegation detection and test case generation
J Zhong, J Huang, B Liang
2012 International Conference on Computer Science and Service System, 871-874, 2012
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed
P Bian, B Liang, J Huang, W Shi, X Wang, J Zhang
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
UI driven Android application reduction
J Huang, Y Aafer, D Perry, X Zhang, C Tian
Proceedings of the 32nd IEEE/ACM International Conference on Automated …, 2017
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature
B Liang, J Li, J Huang
arXiv preprint arXiv:2106.05261, 2021
System and method for detecting sensitive user input leakages in software applications
LI Zhichun, X Xiao, Z Wu, J Huang, G Jiang
US Patent 9,870,485, 2018
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts
J Huang, J Jiang, W You, B Liang
IEEE Transactions on Computers 71 (7), 1551-1563, 2021
Do not jail my app: Detecting the Android plugin environments by time lag contradiction
Y Wu, J Huang, B Liang, W Shi
Journal of Computer Security 28 (2), 269-293, 2020
Vulnerabilities static detection for Web applications with false positive suppression
J Huang, B Liang, J Zhong, Q Wang, J Cai
2010 IEEE International Conference on Information Theory and Information …, 2010
黄建军, 梁彬
清华大学学报: 自然科学版, 2208-2214, 2009
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering
J Huang, B Xue, J Jiang, W You, B Liang, J Wu, Y Wu
IEEE Transactions on Software Engineering 49 (4), 2272-2284, 2022
The system can't perform the operation now. Try again later.
Articles 1–20