Year |
Citation |
Score |
2020 |
Zhang T, Chen J, Zhan X, Luo X, Lo D, Jiang H. Where2Change: Change request localization for app reviews Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2019.2956941 |
0.341 |
|
2020 |
Fan M, Luo X, Liu J, Nong C, Zheng Q, Liu T. CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis Ieee Transactions On Reliability. 69: 124-138. DOI: 10.1109/Tr.2019.2926129 |
0.352 |
|
2020 |
Shi Y, Wei W, Zhang F, Luo X, He Z, Fan H. SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT Ieee Transactions On Industrial Informatics. 16: 1602-1616. DOI: 10.1109/Tii.2019.2929431 |
0.35 |
|
2020 |
Alhanahnah M, Yan Q, Bagheri H, Zhou H, Tsutano Y, Srisa-An W, Luo X. DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code Ieee Transactions On Information Forensics and Security. 15: 2782-2797. DOI: 10.1109/Tifs.2020.2976556 |
0.362 |
|
2020 |
Ma X, An B, Zhao M, Luo X, Xue L, Li Z, Miu TTN, Guan X. Randomized Security Patrolling for Link Flooding Attack Detection Ieee Transactions On Dependable and Secure Computing. 17: 795-812. DOI: 10.1109/Tdsc.2019.2892370 |
0.372 |
|
2020 |
Huang Y, Hu X, Jia N, Chen X, Zheng Z, Luo X. CommtPst: Deep learning source code for commenting positions prediction Journal of Systems and Software. 170: 110754. DOI: 10.1016/J.Jss.2020.110754 |
0.3 |
|
2020 |
Tan Y, Xu S, Wang Z, Zhang T, Xu Z, Luo X. Bug severity prediction using question-and-answer pairs from Stack Overflow Journal of Systems and Software. 165: 110567. DOI: 10.1016/J.Jss.2020.110567 |
0.317 |
|
2020 |
Huang Y, Huang S, Chen H, Chen X, Zheng Z, Luo X, Jia N, Hu X, Zhou X. Towards automatically generating block comments for code snippets Information & Software Technology. 127: 106373. DOI: 10.1016/J.Infsof.2020.106373 |
0.309 |
|
2020 |
Xia P, Wang H, Zhang B, Ji R, Gao B, Wu L, Luo X, Xu G. Characterizing cryptocurrency exchange scams Computers & Security. 98: 101993. DOI: 10.1016/J.Cose.2020.101993 |
0.303 |
|
2019 |
Zhang T, Hu W, Luo X, Ma X. A Commit Messages-Based Bug Localization for Android Applications International Journal of Software Engineering and Knowledge Engineering. 29: 457-487. DOI: 10.1142/S0218194019500207 |
0.37 |
|
2019 |
Jiang H, Nie L, Sun Z, Ren Z, Kong W, Zhang T, Luo X. ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets Ieee Transactions On Services Computing. 12: 34-46. DOI: 10.1109/Tsc.2016.2592909 |
0.307 |
|
2019 |
Xue L, Qian C, Zhou H, Luo X, Zhou Y, Shao Y, Chan AT. NDroid: Toward Tracking Information Flows Across Multiple Android Contexts Ieee Transactions On Information Forensics and Security. 14: 814-828. DOI: 10.1109/Tifs.2018.2866347 |
0.327 |
|
2019 |
Shi Y, Wei W, Fan H, Au MH, Luo X. A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices Ieee Transactions On Computers. 68: 1411-1427. DOI: 10.1109/Tc.2019.2907847 |
0.334 |
|
2019 |
Xu Z, Li S, Xu J, Liu J, Luo X, Zhang Y, Zhang T, Keung J, Tang Y. LDFR: Learning deep feature representation for software defect prediction Journal of Systems and Software. 158: 110402. DOI: 10.1016/J.Jss.2019.110402 |
0.315 |
|
2019 |
Xu Z, Liu J, Luo X, Yang Z, Zhang Y, Yuan P, Tang Y, Zhang T. Software defect prediction based on kernel PCA and weighted extreme learning machine Information and Software Technology. 106: 182-200. DOI: 10.1016/J.Infsof.2018.10.004 |
0.323 |
|
2018 |
Sun B, Luo X, Akiyama M, Watanabe T, Mori T. PADetective: A systematic approach to automate detection of promotional attackers in mobile app store Journal of Information Processing. 26: 212-223. DOI: 10.2197/Ipsjjip.26.212 |
0.341 |
|
2018 |
Zhao S, Luo X, Ma X, Bai B, Zhao Y, Zou W, Yang Z, Au MH, Qiu X. Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing Security and Communication Networks. 2018: 1-22. DOI: 10.1155/2018/3182402 |
0.38 |
|
2018 |
Yu L, Luo X, Chen J, Zhou H, Zhang T, Chang H, Leung HKN. PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2018.2886875 |
0.318 |
|
2018 |
Yu L, Luo X, Qian C, Wang S, Leung HKN. Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy Ieee Transactions On Software Engineering. 44: 834-854. DOI: 10.1109/Tse.2017.2730198 |
0.371 |
|
2018 |
Xue L, Ma X, Luo X, Chan EWW, Miu TTN, Gu G. LinkScope: Toward Detecting Target Link Flooding Attacks Ieee Transactions On Information Forensics and Security. 13: 2423-2438. DOI: 10.1109/Tifs.2018.2815555 |
0.368 |
|
2018 |
Wang C, Miu TTN, Luo X, Wang J. SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks Ieee Transactions On Information Forensics and Security. 13: 559-573. DOI: 10.1109/Tifs.2017.2758754 |
0.386 |
|
2018 |
Ma X, He Y, Luo X, Li J, Zhao M, An B, Guan X. Camera Placement Based on Vehicle Traffic for Better City Security Surveillance Ieee Intelligent Systems. 33: 49-61. DOI: 10.1109/Mis.2018.223110904 |
0.306 |
|
2018 |
Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X. A Survey on Access Control in Fog Computing Ieee Communications Magazine. 56: 144-149. DOI: 10.1109/Mcom.2018.1700333 |
0.338 |
|
2017 |
Yu L, Zhang T, Luo X, Xue L, Chang H. Toward Automatically Generating Privacy Policy for Android Apps Ieee Transactions On Information Forensics and Security. 12: 865-880. DOI: 10.1109/Tifs.2016.2639339 |
0.324 |
|
2017 |
Chen W, Luo X, Yin C, Xiao B, Au MH, Tang Y. CloudBot: Advanced mobile botnets using ubiquitous cloud technologies Pervasive and Mobile Computing. 41: 270-285. DOI: 10.1016/J.Pmcj.2017.03.007 |
0.328 |
|
2017 |
Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems Future Generation Computer Systems. 107: 841-853. DOI: 10.1016/J.Future.2017.08.020 |
0.316 |
|
2016 |
Zhang T, Chen J, Yang G, Lee B, Luo X. Towards more accurate severity prediction and fixer recommendation of software bugs Journal of Systems and Software. 117: 166-184. DOI: 10.1016/J.Jss.2016.02.034 |
0.33 |
|
2016 |
Li W, Meng W, Luo X, Kwok LF. MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection Computers and Security. 60: 177-192. DOI: 10.1016/J.Cose.2016.04.007 |
0.354 |
|
2015 |
Qian C, Luo X, Le Y, Gu G. VulHunter: Toward Discovering Vulnerabilities in Android Applications Ieee Micro. 35: 44-53. DOI: 10.1109/Mm.2015.25 |
0.379 |
|
2014 |
Tang Y, Luo X, Hui Q, Chang RKC. Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks Ieee Transactions On Information Forensics and Security. 9: 339-353. DOI: 10.1109/Tifs.2013.2291970 |
0.35 |
|
2014 |
Zhang J, Perdisci R, Lee W, Luo X, Sarfraz U. Building a Scalable System for Stealthy P2P-Botnet Detection Ieee Transactions On Information Forensics and Security. 9: 27-38. DOI: 10.1109/Tifs.2013.2290197 |
0.349 |
|
2014 |
Shao Y, Luo X, Qian C. RootGuard: Protecting Rooted Android Phones Ieee Computer. 47: 32-40. DOI: 10.1109/Mc.2014.163 |
0.33 |
|
2013 |
Liu Y, Luo X, Chang RKC, Su J. Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events Ieee Journal On Selected Areas in Communications. 31: 1147-1157. DOI: 10.1109/Jsac.2013.130616 |
0.308 |
|
2013 |
Zhou P, Luo X, Chang RKC. Inference attacks against trust-based onion routing: Trust degree to the rescue Computers & Security. 39: 431-446. DOI: 10.1016/J.Cose.2013.09.007 |
0.381 |
|
2013 |
Zhou P, Luo X, Chen A, Chang RKC. SGor: Trust graph based onion routing Computer Networks. 57: 3522-3544. DOI: 10.1016/J.Comnet.2013.08.005 |
0.379 |
|
2012 |
Zhang C, Cai Z, Chen W, Luo X, Yin J. Flow level detection and filtering of low-rate DDoS Computer Networks. 56: 3417-3431. DOI: 10.1016/J.Comnet.2012.07.003 |
0.336 |
|
2009 |
Luo X, Chan EWW, Chang RKC. Detecting pulsing denial-of-service attacks with nondeterministic attack intervals Eurasip Journal On Advances in Signal Processing. 2009: 256821. DOI: 10.1155/2009/256821 |
0.338 |
|
Show low-probability matches. |