Daoyuan Wu
Cited by
Cited by
On the accuracy of smartphone-based mobile network measurement
W Li, RKP Mok, D Wu, RKC Chang
2015 IEEE Conference on Computer Communications (INFOCOM), 370-378, 2015
Analyzing Android Browser Apps for file:// Vulnerabilities
D Wu, RKC Chang
Information Security Conference (ISC), 345-363, 2014
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance
D Wu, RKC Chang, W Li, EKT Cheng, D Gao
2017 USENIX Annual Technical Conference (ATC 17), 445-457, 2017
Measuring the declared SDK versions and their consistency with API calls in Android apps
D Wu, X Liu, J Xu, D Lo, D Gao
Wireless Algorithms, Systems, and Applications: 12th International …, 2017
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
D Wu, D Gao, RKC Chang, E He, EKT Cheng, RH Deng
NDSS, 2019
Indirect File Leaks in Mobile Applications
D Wu, RKC Chang
IEEE Mobile Security Technologies (MoST), in conjunction with S&P (Oakland) 2015, 2015
A sink-driven approach to detecting exposed component vulnerabilities in android apps
D Wu, X Luo, RKC Chang
arXiv preprint arXiv:1405.6282, 2014
Towards understanding Android system vulnerabilities: techniques and insights
D Wu, D Gao, EKT Cheng, Y Cao, J Jiang, RH Deng
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Deep-learning–based app sensitive behavior surveillance for Android powered cyber–physical systems
H Ma, J Tian, K Qiu, D Lo, D Gao, D Wu, C Jia, T Baker
IEEE Transactions on Industrial Informatics 17 (8), 5840-5850, 2020
SCLib: A practical and lightweight defense against component hijacking in Android applications
D Wu, Y Cheng, D Gao, Y Li, RH Deng
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Towards dynamically monitoring Android applications on non-rooted devices in the wild
X Tang, Y Lin, D Wu, D Gao
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
Stack layout randomization with minimal rewriting of Android binaries
Y Liang, X Ma, D Wu, X Tang, D Gao, G Peng, C Jia, H Zhang
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
Toward accurate network delay measurement on android phones
W Li, D Wu, RKC Chang, RKP Mok
IEEE Transactions on Mobile Computing 17 (3), 717-732, 2017
When program analysis meets bytecode search: Targeted and efficient inter-procedural analysis of modern Android apps in BackDroid
D Wu, D Gao, RH Deng, CR KC
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
Demystifying and puncturing the inflated delay in smartphone-based wifi network measurement
W Li, D Wu, RKC Chang, RKP Mok
Proceedings of the 12th International on Conference on emerging Networking …, 2016
MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic
D Wu, W Li, RKC Chang, D Gao
Poster in CoNEXT Student Workshop 2015, 2015
On the usability (in) security of in-app browsing interfaces in mobile apps
Z Zhang
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
Active warden attack: On the (in) effectiveness of Android app repackage-proofing
H Ma, S Li, D Gao, D Wu, Q Jia, C Jia
IEEE Transactions on Dependable and Secure Computing 19 (5), 3508-3520, 2021
Seccomp: Towards practically defending against component hijacking in android applications
D Wu, D Gao, Y Li, RH Deng
arXiv preprint arXiv:1609.03322, 2016
On the feasibility of specialized ability stealing for large language code models
Z Li, C Wang, P Ma, C Liu, S Wang, D Wu, C Gao
arXiv preprint arXiv:2303.03012, 2023
The system can't perform the operation now. Try again later.
Articles 1–20