Ding Li
Ding Li
Verified email at - Homepage
Cited by
Cited by
Estimating mobile application energy consumption using program analysis
S Hao, D Li, WGJ Halfond, R Govindan
2013 35th international conference on software engineering (ICSE), 92-101, 2013
Calculating source line level energy information for android applications
D Li, S Hao, WGJ Halfond, R Govindan
Proceedings of the 2013 International Symposium on Software Testing and …, 2013
Nodoze: Combatting threat alert fatigue with automated provenance triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
network and distributed systems security symposium, 2019
An Empirical Study of the Energy Consumption of Android Applications
D Li, S Hao, J Gui, WGJ Halfond
Software Maintenance and Evolution (ICSME), 2014 IEEE International …, 2014
An investigation into energy-saving programming practices for android smartphone app development
D Li, WGJ Halfond
Proceedings of the 3rd International Workshop on Green and Sustainable …, 2014
Towards a Timely Causality Analysis for Enterprise Security
L Yushan, Z Mu, L Ding, J Kangkook, L Zhichun, W Zhenyu, R Junghwan, ...
Network and Distributed System Security Symposium, 2018
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
Making web applications more energy efficient for OLED smartphones
D Li, AH Tran, WGJ Halfond
Proceedings of the 36th International Conference on Software Engineering …, 2014
Estimating Android applications' CPU energy usage via bytecode profiling
S Hao, D Li, WGJ Halfond, R Govindan
2012 First international workshop on green and sustainable software (GREENS …, 2012
Automated Energy Optimization of HTTP Requests for Mobile Applications
L Ding, L Yingjun, G Jiaping, H William,G.J.
Proceedings of the 38th International Conference on Software Engineering (ICSE), 2016
{SAQL}: A stream-based query system for {Real-Time} abnormal system behavior detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Detecting display energy hotspots in android apps
M Wan, Y Jin, D Li, J Gui, S Mahajan, WGJ Halfond
Software Testing, Verification and Reliability 27 (6), e1635, 2017
Structural temporal graph neural networks for anomaly detection in dynamic graphs
L Cai, Z Chen, C Luo, J Gui, J Ni, D Li, H Chen
Proceedings of the 30th ACM international conference on Information …, 2021
Heterogeneous graph matching networks
S Wang, Z Chen, X Yu, D Li, J Ni, LA Tang, J Gui, Z Li, H Chen, PS Yu
arXiv preprint arXiv:1910.08074, 2019
Integrated energy-directed test suite optimization
D Li, Y Jin, C Sahin, J Clause, WGJ Halfond
Proceedings of the 2014 International Symposium on Software Testing and …, 2014
String analysis for Java and Android applications
D Li, Y Lyu, M Wan, WGJ Halfond
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
Lightweight measurement and estimation of mobile ad energy consumption
J Gui, D Li, M Wan, WGJ Halfond
Proceedings of the 5th international workshop on green and sustainable …, 2016
Sif: A selective instrumentation framework for mobile applications
S Hao, D Li, WGJ Halfond, R Govindan
Proceeding of the 11th annual international conference on Mobile systems …, 2013
{SIGL}: Securing software installations through deep graph learning
X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen
30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021
The system can't perform the operation now. Try again later.
Articles 1–20