Xiaoyong Zhou (周小勇)
Xiaoyong Zhou (周小勇)
Google, Inc
Verified email at - Homepage
Cited by
Cited by
Effective and Efficient Malware Detection at the End Host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium, 351-366, 2009
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
NDSS 11, 17-33, 2011
Learning your identity and disease from research papers: information leaks in genome wide association study
R Wang, YF Li, XF Wang, H Tang, X Zhou
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
Security and Privacy (SP), 2014 IEEE Symposium on, 409-423, 2014
Screenmilker: How to Milk Your Android Screen for Secrets
CC Lin, H Li, X Zhou, XF Wang
Network and Distributed System Security (NDSS) Symposium 2014, 2014
Leave me alone: App-level protection against runtime information gathering on Android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
Security and Privacy (SP), 2015 IEEE Symposium on, 915-930, 2015
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data.
X Zhou, B Peng, YF Li, Y Chen, H Tang, XF Wang
ESORICS 11, 607-627, 2011
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android
M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter
Network and Distributed System Security (NDSS) Symposium 2014, 2014
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps
S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Solving the app-level classification problem of P2P traffic via optimized support vector machines
R Wang, Y Liu, Y Yang, X Zhou
Intelligent Systems Design and Applications, 2006. ISDA'06. Sixth …, 2006
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services
T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
DYDROID: Measuring Dynamic Code Loading and Its Security Implications in Android Applications
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley
Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP …, 2017
Solving p2p traffic identification problems via optimized support vector machines
Y Yang, R Wang, Y Liu, X Zhou
Computer Systems and Applications, 2007. AICCSA'07. IEEE/ACS International …, 2007
External resource control of mobile devices
X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter
US Patent App. 15/547,402, 2018
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness
S Demetriou, N Zhang, Y Lee, X Wang, C Gunter, X Zhou, M Grace
arXiv preprint arXiv:1703.01537, 2017
Ghost Installer in the Shadow: Security Analysis of App Installation on Android
Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ...
Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP …, 2017
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
NDSS, 2015
The system can't perform the operation now. Try again later.
Articles 1–20