Följ
Lingling Fan
Lingling Fan
Associate Professor, Nankai University
Verifierad e-postadress på nankai.edu.cn - Startsida
Titel
Citeras av
Citeras av
År
Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach
S Chen, M Xue, L Fan, S Hao, LX Xu, H Zhu, L Bo
Proceeding of the Elsevier Computers & Security, 2017
2312017
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
G Chen, S Chen, L Fan, X Du, Z Zhao, F Song, Y Liu
The IEEE Security and Privacy (Oakland'2021), 2021
2092021
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu, Z Su
40th International Conference on Software Engineering (ICSE'2018), 408-419, 2018
1112018
StoryDroid: Automated Generation of Storyboard for Android Apps
S Chen, L Fan, C Chen, T Su, W Li, Y Liu, L Xu
41st International Conference on Software Engineering (ICSE'2019), 2019
1012019
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications
X Zhan, L Fan, S Chen, F Wu, T Liu, X Luo, Y Liu
Proceedings of the 43rd International Conference on Software Engineering (ICSE), 2021
792021
An empirical assessment of security risks of global android banking apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
42nd International Conference on Software Engineering (ICSE'2020), 2018
742018
Are Mobile Banking Apps Secure? What Can be Improved?
S Chen, T Su, L Fan, G Meng, M Xue, Y Liu, L Xu
In Proceedings of the 26th ACM Joint European Software Engineering …, 2018
722018
Efficiently Manifesting Asynchronous Programming Errors in Android Apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu
33rd International Conference on Automated Software Engineering (ASE'18 …, 2018
672018
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem
C Liu, S Chen, L Fan, B Chen, Y Liu, X Peng
International Conference on Software Engineering (ICSE'2022), 2022
642022
Why an android app is classified as malware: Toward malware classification interpretation
B Wu, S Chen, C Gao, L Fan, Y Liu, W Wen, MR Lyu
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (2), 1-29, 2021
602021
Automated Third-party Library Detection for Android Applications: Are We There Yet?
X Zhan, L Fan, T Liu, S Chen, L Li, H Wang, Y Xu, X Luo, Y Liu
35th International Conference on Automated Software Engineering (ASE'20), 2020
582020
Why My App Crashes Understanding and Benchmarking Framework-specific Exceptions of Android apps
T Su, L Fan, S Chen, Y Liu, L Xu, G Pu, Z Su
IEEE Transactions on Software Engineering (TSE), 2020
522020
CORE: Automating Review Recommendation for Code Changes
JK Siow, C Gao, L Fan, S Chen, Y Liu
27th edition of the IEEE International Conference on Software Analysis …, 2020
522020
GUI-Squatting Attack: Automated Generation of Android Phishing Apps
S Chen, L Fan, C Chen, M Xue, Y Liu, L Xu
IEEE Transactions on Dependable and Secure Computing (TDSC), 2019
522019
Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers
F Song, Y Lei, S Chen, L Fan, Y Liu
International Journal of Intelligent Systems 36 (9), 5210-5240, 2021
502021
Research on third-party libraries in android apps: A taxonomy and systematic literature review
X Zhan, T Liu, L Fan, L Li, S Chen, X Luo, Y Liu
IEEE Transactions on Software Engineering 48 (10), 4181-4213, 2021
432021
Automated cross-platform GUI code generation for mobile apps
S Chen, L Fan, T Su, L Ma, Y Liu, L Xu
2019 IEEE 1st International Workshop on Artificial Intelligence for Mobile …, 2019
402019
Accessible or Not? An Empirical Investigation of Android App Accessibility
S Chen, C Chen, L Fan, M Fan, X Zhan, Y Liu
IEEE Transactions on Software Engineering, 2021
392021
A Large-scale Empirical Study on Industrial Fake Apps
C Tang, S Chen, L Fan, L Xu, Y Liu, Z Tang, L Dou
41st ACM/IEEE International Conference on Software Engineering (ICSE'2019), 2019
382019
Towards understanding and mitigating audio adversarial examples for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing, 2022
292022
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20