Xusheng Xiao
Cited by
Cited by
WHYPER: Towards Automating Risk Assessment of Mobile Applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the USENIX Security Symposium, 2013., 2013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
Inferring method specifications from natural language API descriptions
R Pandita, X Xiao, H Zhong, T Xie, S Oney, A Paradkar
2012 34th international conference on software engineering (ICSE), 815-825, 2012
Automated Extraction of Security Policies from Natural-Language Software Documents
X Xiao, A Paradkar, S Thummalapenta, T Xie
FSE '12 Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
SUPOR: precise and scalable sensitive user input detection for android apps
J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang
24th USENIX Security Symposium (USENIX Security 2015), 977-992, 2015
Precise identification of problems for structural test generation
X Xiao, T Xie, N Tillmann, J De Halleux
Proceedings of the 33rd International Conference on Software Engineering …, 2011
Context-Sensitive Delta Inference for Identifying Workload-Dependent Performance Bottlenecks
X Xiao, S Han, D Zhang, T Xie
Proceedings of the 2013 International Symposium on Software Testing and …, 2013
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Characteristic Studies of Loop Problems for Structural Test Generation via Symbolic Execution
X Xiao, S Li, T Xie, N Tillmann
Proceedings of the 28th IEEE/ACM International Conference on Automated …, 2013
User-aware privacy control via extended static-information-flow analysis
X Xiao, N Tillmann, M Fahndrich, J De Halleux, M Moskal
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 2018
Relation extraction for inferring access control rules from natural language artifacts
J Slankas, X Xiao, L Williams, T Xie
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018
Measuring code behavioral similarity for programming and software engineering education
S Li, X Xiao, B Bassett, T Xie, N Tillmann
2016 IEEE/ACM 38th International Conference on Software Engineering …, 2016
Behavior query discovery in system-generated temporal graphs
B Zong, X Xiao, Z Li, Z Wu, Z Qian, X Yan, AK Singh, G Jiang
arXiv preprint arXiv:1511.05911, 2015
Cooperative Software Testing and Analysis: Advances and Challenges
T Xie, L Zhang, X Xiao, YF Xiong, D Hao
Journal of Computer Science and Technology 29 (4), 713-723, 2014
Controlling the release of private information using static flow analysis
X Xiao, N Tillmann, MA Fahndrich, JP De Halleux, MJ Moskal
US Patent 9,104,528, 2015
An energy-efficient offloading framework with predictable temporal correctness
Z Dong, Y Liu, H Zhou, X Xiao, Y Gu, L Zhang, C Liu
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, 1-12, 2017
Advances on improving automation in developer testing
X Xiao, S Thummalapenta, T Xie
Advances in Computers 85, 165-212, 2012
Transparent privacy control via static information flow analysis
X Xiao, N Tillmann, M Fahndrich, J de Halleux, M Moskal
Microsoft Technical Report MSR-TR-2011-93, 2011
The system can't perform the operation now. Try again later.
Articles 1–20