Understanding android obfuscation techniques: A large-scale investigation in the wild S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang Security and privacy in communication networks: 14th international …, 2018 | 169 | 2018 |
Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals. F Xu, W Diao, Z Li, J Chen, K Zhang NDSS, 2019 | 61 | 2019 |
Kindness is a risky business: On the usage of the accessibility {APIs} in android W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 27 | 2019 |
Android on pc: On the security of end-user android emulators F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 8 | 2021 |
Identifying the ble misconfigurations of iot devices through companion mobile apps J Du, F Xu, C Zhang, Z Zhang, X Liu, P Ren, W Diao, S Guo, K Zhang 2022 19th Annual IEEE International Conference on Sensing, Communication …, 2022 | 2 | 2022 |
Authorisation inconsistency in IoT third‐party integration J Chen, F Xu, S Dong, W Sun, K Zhang IET Information Security 16 (2), 133-143, 2022 | 1 | 2022 |
Living in the Past: Analyzing BLE IoT Devices Based on Mobile Companion Apps in Old Versions J Du, Z Zhang, F Xu, W Diao 2023 19th International Conference on Mobility, Sensing and Networking (MSN …, 2023 | | 2023 |