Follow
Ye Quanqi
Title
Cited by
Cited by
Year
Towards model checking android applications
G Bai, Q Ye, Y Wu, H Botha, J Sun, Y Liu, JS Dong, W Visser
IEEE Transactions on Software Engineering 44 (6), 595-612, 2017
372017
Formal analysis of a single sign-on protocol implementation for android
Q Ye, G Bai, K Wang, JS Dong
2015 20th International Conference on Engineering of Complex Computer …, 2015
272015
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
212015
Deep review sharing
C Guo, D Huang, N Dong, Q Ye, J Xu, Y Fan, H Yang, Y Xu
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
132019
Systematic comprehension for developer reply in mobile system forum
C Guo, W Wang, Y Wu, N Dong, Q Ye, J Xu, S Zhang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
72019
Automatic construction of callback model for android application
C Guo, Q Ye, N Dong, G Bai, JS Dong, J Xu
2016 21st International Conference on Engineering of Complex Computer …, 2016
62016
Deep attentive factorization machine for app recommendation service
C Guo, Y Xu, X Hou, N Dong, J Xu, Q Ye
2019 IEEE International Conference on Web Services (ICWS), 134-138, 2019
52019
Inferring implicit assumptions and correct usage of mobile payment protocols
Q Ye, G Bai, N Dong, JS Dong
International Conference on Security and Privacy in Communication Systems …, 2017
42017
App genome: callback sequencing in Android
C Guo, N Dong, G Bai, Q Ye, J Dong, J Xu, G Si
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
32017
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
Q Ye, Y Zhang, G Bai, N Dong, Z Liang, JS Dong, H Wang
International Conference on Information Security, 299-318, 2019
22019
Analyzing security property of android application implementation using formal method
Q Ye
2015 20th International Conference on Engineering of Complex Computer …, 2015
22015
Position Paper: On Using Trusted Execution Environment to Secure COTS Devices for Accessing Industrial Control Systems
Q Ye, HC Tan, D Mashima, B Chen, Z Kalbarczyk
TechRxiv, 2021
12021
Analysis of Mobile Security and Privacy
Q Ye
PQDT-Global, 2018
2018
Vulnerable path attack and its detection
C She, W Wen, Q Ye, K Zheng
KSII Transactions on Internet and Information Systems (TIIS) 11 (4), 2149-2170, 2017
2017
ICECCS 2015 Additional Reviewers
R Arshad, C Attiogbe, P Ballarini, JL Béchennec, A Belaggoun, S Bijo, ...
The system can't perform the operation now. Try again later.
Articles 1–15