Follow
Wei Yang
Wei Yang
Associate Professor, Department of Computer Science, University of Texas at Dallas
Verified email at utdallas.edu - Homepage
Title
Cited by
Cited by
Year
Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
ACM Conference on Computer and Communications Security, 2018
538*2018
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the USENIX Security Symposium, 2013., 2013
5312013
A Grey-box Approach for Automated GUI-Model Generation of Mobile Applications
W Yang, MR Prasad, T Xie
Proc. of International Conference on Fundamental Approaches to Software …, 2013
4492013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
Proceedings of the 37th International Conference on Software Engineering …, 2015
3352015
Charting the attack surface of trigger-action IoT platforms
Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1832019
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps
W Yang, D Kong, T Xie, CA Gunter
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
1582017
Automated test input generation for android: Are we really there yet in an industrial case?
X Zeng, D Li, W Zheng, F Xia, Y Deng, W Lam, W Yang, T Xie
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
1212016
Free for All! Assessing User Data Exposure to Advertising Libraries on Android
S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter
Proc. of the 23rd Annual Network and Distributed System Security Symposium, 2016
1192016
An empirical study of android test generation tools in industrial cases
W Wang, D Li, W Yang, Y Cao, Z Zhang, Y Deng, T Xie
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
1112018
Vulcnn: An image-inspired scalable vulnerability detection system
Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin
Proceedings of the 44th International Conference on Software Engineering …, 2022
1002022
Automated test input generation for Android: Towards getting there in an industrial case
H Zheng, D Li, B Liang, X Zeng, W Zheng, Y Deng, W Lam, W Yang, T Xie
Proceedings of the 39th International Conference on Software Engineering …, 2017
672017
SCDetector: Software functional clone detection based on semantic tokens analysis
Y Wu, D Zou, S Dou, S Yang, W Yang, F Cheng, H Liang, H Jin
Proceedings of the 35th IEEE/ACM international conference on automated …, 2020
612020
Supervised learning achieves human-level performance in moba games: A case study of honor of kings
D Ye, G Chen, P Zhao, F Qiu, B Yuan, W Zhang, S Chen, M Sun, X Li, S Li, ...
IEEE Transactions on Neural Networks and Learning Systems 33 (3), 908-918, 2020
562020
Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis
Y Wu, X Li, D Zou, W Yang, X Zhang, H Jin
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
532019
An empirical analysis of UI-based flaky tests
A Romano, Z Song, S Grandhi, W Yang, W Wang
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
522021
IntDroid: Android malware detection based on API intimacy analysis
D Zou, Y Wu, S Yang, A Chauhan, W Yang, J Zhong, S Dou, H Jin
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-32, 2021
422021
A Large-Scale Empirical Study on Android Runtime-Permission Rationale Messages
X Liu, Y Leng, W Yang, W Wang, C Zhai, T Xie
Symposium on Visual Languages and Human-Centric Computing (VL/HCC)., 2018
392018
Juewu-mc: Playing minecraft with sample-efficient hierarchical reinforcement learning
Z Lin, J Li, J Shi, D Ye, Q Fu, W Yang
arXiv preprint arXiv:2112.04907, 2021
362021
Glib: towards automated test oracle for graphically-rich applications
K Chen, Y Li, Y Chen, C Fan, Z Hu, W Yang
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
352021
ILFO: Adversarial attack on adaptive neural networks
M Haque, A Chauhan, C Liu, W Yang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
352020
The system can't perform the operation now. Try again later.
Articles 1–20