Understanding android obfuscation techniques: A large-scale investigation in the wild S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang Security and Privacy in Communication Networks: 14th International …, 2018 | 151 | 2018 |
Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals. F Xu, W Diao, Z Li, J Chen, K Zhang NDSS, 2019 | 52 | 2019 |
Kindness is a Risky Business: On the Usage of the Accessibility {APIs} in Android W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 25 | 2019 |
Android on pc: On the security of end-user android emulators F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 5 | 2021 |
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps J Du, F Xu, C Zhang, Z Zhang, X Liu, P Ren, W Diao, S Guo, K Zhang 2022 19th Annual IEEE International Conference on Sensing, Communication …, 2022 | | 2022 |
Authorisation inconsistency in IoT third‐party integration J Chen, F Xu, S Dong, W Sun, K Zhang IET Information Security 16 (2), 133-143, 2022 | | 2022 |