Libradar: Fast and accurate detection of third-party libraries in android apps Z Ma, H Wang, Y Guo, X Chen Proceedings of the 38th international conference on software engineering …, 2016 | 263 | 2016 |
Wukong: A scalable and accurate two-phase approach to android app clone detection H Wang, Y Guo, Z Ma, X Chen Proceedings of the 2015 International Symposium on Software Testing and …, 2015 | 245 | 2015 |
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ... Proceedings of the 2018 Internet Measurement Conference (IMC), 2018 | 147 | 2018 |
Cid: Automating the detection of api-related compatibility issues in android apps L Li, TF Bissyandé, H Wang, J Klein Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018 | 134 | 2018 |
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network X Cheng, H Wang, J Hua, G Xu, Y Sui ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-33, 2021 | 120 | 2021 |
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, YC Hu The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019 | 107 | 2019 |
FraudDroid: Automated Ad Fraud Detection for Android Apps F Dong, H Wang, L Li, Y Guo, TF Bissyande, T Liu, G Xu, J Klein ESEC/FSE 2018, 2018 | 95 | 2018 |
Towards a first step to understand flash loan and its applications in defi ecosystem D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021 | 92* | 2021 |
A comprehensive study on challenges in deploying deep learning based software Z Chen, Y Cao, Y Liu, H Wang, T Xie, X Liu Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 92 | 2020 |
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem N He, L Wu, H Wang, Y Guo, X Jiang The 24th International Conference on Financial Cryptography and Data …, 2020 | 83 | 2020 |
Understanding (Mis) Behavior on the EOSIO Blockchain Y HUANG, H WANG, LEI WU, G TYSON, X LUO, RUN ZHANG, X LIU, ... ACM SIGMETRICS 2020, 2020 | 80* | 2020 |
Flow2vec: Value-flow-based precise code embedding Y Sui, X Cheng, G Zhang, H Wang Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-27, 2020 | 79 | 2020 |
Using text mining to infer the purpose of permission use in mobile apps H Wang, J Hong, Y Guo Proceedings of the 2015 ACM international joint conference on pervasive and …, 2015 | 75 | 2015 |
Why are android apps removed from google play? a large-scale empirical study H Wang, H Li, L Li, Y Guo, G Xu Proceedings of the 15th International Conference on Mining Software …, 2018 | 74 | 2018 |
Characterizing cryptocurrency exchange scams P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu Computers & Security 98, 101993, 2020 | 69 | 2020 |
Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play H Wang, H Li, Y Guo THE WEB CONFERENCE 2019 (WWW 2019), 2019 | 69 | 2019 |
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective H Wang, Z Liu, Y Guo, X Chen, M Zhang, G Xu, J Hong Proceedings of the 26th International World Wide Web Conference (WWW 2017), 2017 | 68 | 2017 |
RmvDroid: Towards A Reliable Android Malware Dataset with App Metadata H Wang, J Si, H Li, Y Guo The 16th International Conference on Mining Software Repositories (MSR 2019), 2019 | 60 | 2019 |
Make web3. 0 connected Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021 | 58 | 2021 |
An empirical study on deployment faults of deep learning based mobile applications Z Chen, H Yao, Y Lou, Y Cao, Y Liu, H Wang, X Liu 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 57 | 2021 |