Minhui Xue (Jason Xue)
Minhui Xue (Jason Xue)
Lecturer (a.k.a. Assistant Professor), The University of Adelaide
Verified email at adelaide.edu.au - Homepage
Cited by
Cited by
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems
L Ma, F Juefei-Xu, F Zhang, J Sun, M Xue, B Li, C Chen, T Su, L Li, Y Liu, ...
arXiv preprint arXiv:1803.07519, 2018
Deepmutation: Mutation testing of deep learning systems
L Ma, F Zhang, J Sun, M Xue, B Li, F Juefei-Xu, C Xie, L Li, Y Liu, J Zhao, ...
2018 IEEE 29th International Symposium on Software Reliability Engineering …, 2018
Stormdroid: A streaminglized machine learning-based system for detecting android malware
S Chen, M Xue, Z Tang, L Xu, H Zhu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li
computers & security 73, 326-344, 2018
Deephunter: A coverage-guided fuzz testing framework for deep neural networks
X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See
Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019
Combinatorial testing for deep learning systems
L Ma, F Zhang, M Xue, B Li, Y Liu, J Zhao, Y Wang
arXiv preprint arXiv:1806.07723, 2018
Coverage-guided fuzzing for deep neural networks
X Xie, L Ma, F Juefei-Xu, H Chen, M Xue, B Li, Y Liu, J Zhao, J Yin, S See
arXiv preprint arXiv:1809.01266 3, 2018
Deepct: Tomographic combinatorial testing for deep learning systems
L Ma, F Juefei-Xu, M Xue, B Li, L Li, Y Liu, J Zhao
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
H Zheng, M Xue, H Lu, S Hao, H Zhu, X Liang, K Ross
Proceedings of Internet Society Symposium on Network and Distributed System …, 2018
The right to be forgotten in the media: A data-driven study
M Xue, G Magno, E Cunha, V Almeida, KW Ross
Proceedings on Privacy Enhancing Technologies 2016 (4), 389-402, 2016
I know where you are: thwarting privacy protection in location-based social discovery services
M Xue, Y Liu, KW Ross, H Qian
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
You can yak but you can't hide: Localizing anonymous social network users
M Xue, C Ballard, K Liu, C Nemelka, Y Wu, K Ross, H Qian
Proceedings of the 2016 Internet Measurement Conference, 25-31, 2016
Secure deep learning engineering: A software quality assurance perspective
L Ma, F Juefei-Xu, M Xue, Q Hu, S Chen, B Li, Y Liu, J Zhao, J Yin, S See
arXiv preprint arXiv:1810.04538, 2018
Are Mobile Banking Apps Secure? What Can Be Improved?
S Chen, T Su, L Fan, G Meng, M Xue, Y Liu, L Xu
In Proceedings of the 26th ACM Joint European Software Engineering …, 2018
Data-driven privacy analytics: A wechat case study in location-based social networks
R Wang, M Xue, K Liu, H Qian
International Conference on Wireless Algorithms, Systems, and Applications …, 2015
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics
M Xue, L Yang, KW Ross, H Qian
Peer-to-Peer Networking and Applications 10 (2), 357-367, 2017
Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
arXiv preprint arXiv:1909.02742, 2020
An Empirical Assessment of Security Risks of Global Android Banking Apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
ACM ICSE 2020, 2020
Attacks and defenses in location-based social networks: a heuristic number theory approach
J Peng, Y Meng, M Xue, X Hei, KW Ross
2015 International Symposium on Security and Privacy in Social Networks and …, 2015
Differentially Private Data Generative Models
Q Chen, C Xiang, M Xue, B Li, N Borisov, MA Kaafar, H Zhu
http://arxiv.org/abs/1812.02274, 2018
The system can't perform the operation now. Try again later.
Articles 1–20