Wei Yang
Wei Yang
Assistant Professor, Department of Computer Science, University of Texas at Dallas
Verified email at - Homepage
Cited by
Cited by
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the USENIX Security Symposium, 2013., 2013
Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
ACM Conference on Computer and Communications Security, 2018
A Grey-box Approach for Automated GUI-Model Generation of Mobile Applications
W Yang, MR Prasad, T Xie
Proc. of International Conference on Fundamental Approaches to Software …, 2013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
Proceedings of the 37th International Conference on Software Engineering …, 2015
Charting the attack surface of trigger-action IoT platforms
Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps
W Yang, D Kong, T Xie, CA Gunter
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Automated test input generation for android: Are we really there yet in an industrial case?
X Zeng, D Li, W Zheng, F Xia, Y Deng, W Lam, W Yang, T Xie
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
Free for All! Assessing User Data Exposure to Advertising Libraries on Android
S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter
Proc. of the 23rd Annual Network and Distributed System Security Symposium, 2016
An empirical study of android test generation tools in industrial cases
W Wang, D Li, W Yang, Y Cao, Z Zhang, Y Deng, T Xie
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
Vulcnn: An image-inspired scalable vulnerability detection system
Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin
Proceedings of the 44th International Conference on Software Engineering …, 2022
Automated test input generation for Android: Towards getting there in an industrial case
H Zheng, D Li, B Liang, X Zeng, W Zheng, Y Deng, W Lam, W Yang, T Xie
Proceedings of the 39th International Conference on Software Engineering …, 2017
SCDetector: Software functional clone detection based on semantic tokens analysis
Y Wu, D Zou, S Dou, S Yang, W Yang, F Cheng, H Liang, H Jin
Proceedings of the 35th IEEE/ACM international conference on automated …, 2020
Supervised learning achieves human-level performance in moba games: A case study of honor of kings
D Ye, G Chen, P Zhao, F Qiu, B Yuan, W Zhang, S Chen, M Sun, X Li, S Li, ...
IEEE Transactions on Neural Networks and Learning Systems 33 (3), 908-918, 2020
An empirical analysis of UI-based flaky tests
A Romano, Z Song, S Grandhi, W Yang, W Wang
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis
Y Wu, X Li, D Zou, W Yang, X Zhang, H Jin
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
IntDroid: Android malware detection based on API intimacy analysis
D Zou, Y Wu, S Yang, A Chauhan, W Yang, J Zhong, S Dou, H Jin
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-32, 2021
ILFO: Adversarial attack on adaptive neural networks
M Haque, A Chauhan, C Liu, W Yang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
A Large-Scale Empirical Study on Android Runtime-Permission Rationale Messages
X Liu, Y Leng, W Yang, W Wang, C Zhai, T Xie
Symposium on Visual Languages and Human-Centric Computing (VL/HCC)., 2018
Juewu-mc: Playing minecraft with sample-efficient hierarchical reinforcement learning
Z Lin, J Li, J Shi, D Ye, Q Fu, W Yang
arXiv preprint arXiv:2112.04907, 2021
Generating regular expressions from natural language specifications: Are we there yet?
Z Zhong, J Guo, W Yang, T Xie, JG Lou, T Liu, D Zhang
Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
The system can't perform the operation now. Try again later.
Articles 1–20