Xiapu Luo, Ph.D. - Publications

Affiliations: 
2007 Hong Kong Polytechnic University (Hong Kong) 
Area:
Computer Science

37 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Zhang T, Chen J, Zhan X, Luo X, Lo D, Jiang H. Where2Change: Change request localization for app reviews Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2019.2956941  0.341
2020 Fan M, Luo X, Liu J, Nong C, Zheng Q, Liu T. CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis Ieee Transactions On Reliability. 69: 124-138. DOI: 10.1109/Tr.2019.2926129  0.352
2020 Shi Y, Wei W, Zhang F, Luo X, He Z, Fan H. SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT Ieee Transactions On Industrial Informatics. 16: 1602-1616. DOI: 10.1109/Tii.2019.2929431  0.35
2020 Alhanahnah M, Yan Q, Bagheri H, Zhou H, Tsutano Y, Srisa-An W, Luo X. DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code Ieee Transactions On Information Forensics and Security. 15: 2782-2797. DOI: 10.1109/Tifs.2020.2976556  0.362
2020 Ma X, An B, Zhao M, Luo X, Xue L, Li Z, Miu TTN, Guan X. Randomized Security Patrolling for Link Flooding Attack Detection Ieee Transactions On Dependable and Secure Computing. 17: 795-812. DOI: 10.1109/Tdsc.2019.2892370  0.372
2020 Huang Y, Hu X, Jia N, Chen X, Zheng Z, Luo X. CommtPst: Deep learning source code for commenting positions prediction Journal of Systems and Software. 170: 110754. DOI: 10.1016/J.Jss.2020.110754  0.3
2020 Tan Y, Xu S, Wang Z, Zhang T, Xu Z, Luo X. Bug severity prediction using question-and-answer pairs from Stack Overflow Journal of Systems and Software. 165: 110567. DOI: 10.1016/J.Jss.2020.110567  0.317
2020 Huang Y, Huang S, Chen H, Chen X, Zheng Z, Luo X, Jia N, Hu X, Zhou X. Towards automatically generating block comments for code snippets Information & Software Technology. 127: 106373. DOI: 10.1016/J.Infsof.2020.106373  0.309
2020 Xia P, Wang H, Zhang B, Ji R, Gao B, Wu L, Luo X, Xu G. Characterizing cryptocurrency exchange scams Computers & Security. 98: 101993. DOI: 10.1016/J.Cose.2020.101993  0.303
2019 Zhang T, Hu W, Luo X, Ma X. A Commit Messages-Based Bug Localization for Android Applications International Journal of Software Engineering and Knowledge Engineering. 29: 457-487. DOI: 10.1142/S0218194019500207  0.37
2019 Jiang H, Nie L, Sun Z, Ren Z, Kong W, Zhang T, Luo X. ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets Ieee Transactions On Services Computing. 12: 34-46. DOI: 10.1109/Tsc.2016.2592909  0.307
2019 Xue L, Qian C, Zhou H, Luo X, Zhou Y, Shao Y, Chan AT. NDroid: Toward Tracking Information Flows Across Multiple Android Contexts Ieee Transactions On Information Forensics and Security. 14: 814-828. DOI: 10.1109/Tifs.2018.2866347  0.327
2019 Shi Y, Wei W, Fan H, Au MH, Luo X. A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices Ieee Transactions On Computers. 68: 1411-1427. DOI: 10.1109/Tc.2019.2907847  0.334
2019 Xu Z, Li S, Xu J, Liu J, Luo X, Zhang Y, Zhang T, Keung J, Tang Y. LDFR: Learning deep feature representation for software defect prediction Journal of Systems and Software. 158: 110402. DOI: 10.1016/J.Jss.2019.110402  0.315
2019 Xu Z, Liu J, Luo X, Yang Z, Zhang Y, Yuan P, Tang Y, Zhang T. Software defect prediction based on kernel PCA and weighted extreme learning machine Information and Software Technology. 106: 182-200. DOI: 10.1016/J.Infsof.2018.10.004  0.323
2018 Sun B, Luo X, Akiyama M, Watanabe T, Mori T. PADetective: A systematic approach to automate detection of promotional attackers in mobile app store Journal of Information Processing. 26: 212-223. DOI: 10.2197/Ipsjjip.26.212  0.341
2018 Zhao S, Luo X, Ma X, Bai B, Zhao Y, Zou W, Yang Z, Au MH, Qiu X. Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing Security and Communication Networks. 2018: 1-22. DOI: 10.1155/2018/3182402  0.38
2018 Yu L, Luo X, Chen J, Zhou H, Zhang T, Chang H, Leung HKN. PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2018.2886875  0.318
2018 Yu L, Luo X, Qian C, Wang S, Leung HKN. Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy Ieee Transactions On Software Engineering. 44: 834-854. DOI: 10.1109/Tse.2017.2730198  0.371
2018 Xue L, Ma X, Luo X, Chan EWW, Miu TTN, Gu G. LinkScope: Toward Detecting Target Link Flooding Attacks Ieee Transactions On Information Forensics and Security. 13: 2423-2438. DOI: 10.1109/Tifs.2018.2815555  0.368
2018 Wang C, Miu TTN, Luo X, Wang J. SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks Ieee Transactions On Information Forensics and Security. 13: 559-573. DOI: 10.1109/Tifs.2017.2758754  0.386
2018 Ma X, He Y, Luo X, Li J, Zhao M, An B, Guan X. Camera Placement Based on Vehicle Traffic for Better City Security Surveillance Ieee Intelligent Systems. 33: 49-61. DOI: 10.1109/Mis.2018.223110904  0.306
2018 Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X. A Survey on Access Control in Fog Computing Ieee Communications Magazine. 56: 144-149. DOI: 10.1109/Mcom.2018.1700333  0.338
2017 Yu L, Zhang T, Luo X, Xue L, Chang H. Toward Automatically Generating Privacy Policy for Android Apps Ieee Transactions On Information Forensics and Security. 12: 865-880. DOI: 10.1109/Tifs.2016.2639339  0.324
2017 Chen W, Luo X, Yin C, Xiao B, Au MH, Tang Y. CloudBot: Advanced mobile botnets using ubiquitous cloud technologies Pervasive and Mobile Computing. 41: 270-285. DOI: 10.1016/J.Pmcj.2017.03.007  0.328
2017 Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems Future Generation Computer Systems. 107: 841-853. DOI: 10.1016/J.Future.2017.08.020  0.316
2016 Zhang T, Chen J, Yang G, Lee B, Luo X. Towards more accurate severity prediction and fixer recommendation of software bugs Journal of Systems and Software. 117: 166-184. DOI: 10.1016/J.Jss.2016.02.034  0.33
2016 Li W, Meng W, Luo X, Kwok LF. MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection Computers and Security. 60: 177-192. DOI: 10.1016/J.Cose.2016.04.007  0.354
2015 Qian C, Luo X, Le Y, Gu G. VulHunter: Toward Discovering Vulnerabilities in Android Applications Ieee Micro. 35: 44-53. DOI: 10.1109/Mm.2015.25  0.379
2014 Tang Y, Luo X, Hui Q, Chang RKC. Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks Ieee Transactions On Information Forensics and Security. 9: 339-353. DOI: 10.1109/Tifs.2013.2291970  0.35
2014 Zhang J, Perdisci R, Lee W, Luo X, Sarfraz U. Building a Scalable System for Stealthy P2P-Botnet Detection Ieee Transactions On Information Forensics and Security. 9: 27-38. DOI: 10.1109/Tifs.2013.2290197  0.349
2014 Shao Y, Luo X, Qian C. RootGuard: Protecting Rooted Android Phones Ieee Computer. 47: 32-40. DOI: 10.1109/Mc.2014.163  0.33
2013 Liu Y, Luo X, Chang RKC, Su J. Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events Ieee Journal On Selected Areas in Communications. 31: 1147-1157. DOI: 10.1109/Jsac.2013.130616  0.308
2013 Zhou P, Luo X, Chang RKC. Inference attacks against trust-based onion routing: Trust degree to the rescue Computers & Security. 39: 431-446. DOI: 10.1016/J.Cose.2013.09.007  0.381
2013 Zhou P, Luo X, Chen A, Chang RKC. SGor: Trust graph based onion routing Computer Networks. 57: 3522-3544. DOI: 10.1016/J.Comnet.2013.08.005  0.379
2012 Zhang C, Cai Z, Chen W, Luo X, Yin J. Flow level detection and filtering of low-rate DDoS Computer Networks. 56: 3417-3431. DOI: 10.1016/J.Comnet.2012.07.003  0.336
2009 Luo X, Chan EWW, Chang RKC. Detecting pulsing denial-of-service attacks with nondeterministic attack intervals Eurasip Journal On Advances in Signal Processing. 2009: 256821. DOI: 10.1155/2009/256821  0.338
Show low-probability matches.