Dr Xiao Chen

Dr Xiao Chen

Lecturer

School of Information and Physical Sciences (Computing and Information Technology)

Career Summary

Biography

Dr. Xiao Chen currently holds the position of Lecturer within the School of Information and Physical Sciences at The University of Newcastle. Prior to this role, he served as a Research Fellow in the Faculty of Information Technology at Monash University from 2019 onwards. He earned his Ph.D. from Swinburne University of Technology. Xiao's research focuses on enhancing the security of software and machine learning systems. He has published in top software engineering and cybersecurity conferences and journals, including FSE, ASE, ISSTA, TSE, TOSEM, TIFS, and TDSC. He has also contributed as a reviewer for esteemed journals such as TIFS, TDSC, TSE, TOSEM, and ACM CSUR, etc. Additionally, Xiao has actively participated as a Program Committee member for numerous conferences, including ASE, MSR, SANER, MobileSoft, and others.

Qualifications

  • DOCTOR OF PHILOSOPHY, Swinburne University of Technology

Keywords

  • AI Security
  • AI for Software Engineering
  • Digital Health
  • Software Engineering for AI
  • Software Quality Assurance
  • Software Security
  • Trustworthy AI

Languages

  • English (Fluent)
  • Mandarin (Mother)

Fields of Research

Code Description Percentage
460403 Data security and protection 50
460406 Software and application security 50

Professional Experience

UON Appointment

Title Organisation / Department
Lecturer University of Newcastle
School of Information and Physical Sciences
Australia

Academic appointment

Dates Title Organisation / Department
2/12/2019 - 2/2/2024 Research Fellow Monash University
Faculty of Information Technology
Australia

Awards

Nomination

Year Award
2025 Early Career Researcher Excellence
College of Engineering, Science and Environment (CESE), University of Newcastle

Research Award

Year Award
2020 Outstanding HDR Published Award 2020
Swinburne University of Technology

Teaching

Code Course Role Duration
SENG3320 Software Verification and Validation
College of Engineering Science and Environment | the University of Newcastle | Australia
Course Coordinator, Lecturer 26/2/2024 - 7/6/2024
SENG6250 System and Network Security
College of Engineering Science and Environment | the University of Newcastle | Australia
Course Coordinator, Lecturer 22/7/2024 - 1/11/2024
SENG2250 System and Network Security
College of Engineering Science and Environment | the University of Newcastle | Australia
Course Coordinator, Lecturer 22/7/2024 - 1/11/2024
SENG6320 Software Verification and Validation
College of Engineering Science and Environment | the University of Newcastle | Australia
Course Coordinator, Lecturer 26/2/2024 - 7/6/2024
FIT3173 Software Security
Monash University
Lecturer 21/2/2022 - 3/6/2022
Edit

Publications

For publications that are currently unpublished or in-press, details are shown in italics.


Chapter (1 outputs)

Year Citation Altmetrics Link
2025 Hoda R, Zhou W, Chen X, Li A, Kalla M, Wulandari T, Bain C, Chapman W, Georgy S, Franco M, Poon P, 'A Picture Is Worth a ThousandWords: Designing a Tele-Health Solution Using Photo Elicitation', 1180 LNNS, 519-528 (2025) [B1]
DOI 10.1007/978-981-97-9324-2_41

Conference (21 outputs)

Year Citation Altmetrics Link
2025 Liu T, Deng J, Zhao Y, Chen X, Du X, Li L, Wang H, 'Are iOS Apps Immune to Abusive Advertising Practices?', Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 491-502 (2025) [E1]
DOI 10.1145/3696630.3728571
2024 Zhou M, Gao X, Liu P, Grundy J, Chen C, Chen X, Li L, 'Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models', PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 174-185 (2024) [E1]
DOI 10.1145/3650212.3652119
Citations Scopus - 1
2024 Zhou M, Gao X, Chen X, Chen C, Grundy J, Li L, 'DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators', Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 204-215 (2024) [E1]
DOI 10.1145/3691620.3694998
Citations Scopus - 1
2024 Li F, Chen X, Xiao X, Sun X, Chen C, Wang S, Han J, 'Incremental Context-free Grammar Inference in Black Box Settings', Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 1171-1182 (2024) [E1]
DOI 10.1145/3691620.3695494
2023 Zhou M, Gao X, Wu J, Grundy J, Chen X, Chen C, Li L, 'ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems', ISSTA 2023 - Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 1005-1017 (2023) [E1]
DOI 10.1145/3597926.3598113
Citations Scopus - 1
2023 Sun X, Chen X, Liu Y, Grundy J, Li L, 'LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation', ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2127-2131 (2023) [E1]
DOI 10.1145/3611643.3613098
Citations Scopus - 1
2023 Zhang R, Wu T, Chen X, Wen S, Nepal S, Paris C, Xiang Y, 'Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention', ACM Web Conference 2023 - Proceedings of the World Wide Web Conference, WWW 2023, 1604-1615 (2023) [E1]
DOI 10.1145/3543507.3583330
Citations Scopus - 2
2023 Liu Y, Chen X, Liu P, Grundy J, Chen C, Li L, 'ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps', Proceedings 2023 38th IEEE ACM International Conference on Automated Software Engineering Ase 2023, 1390-1402 (2023) [E1]

React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact w... [more]

React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact with native-side code, such as Objective-C/Swift for iOS and Java/Kotlin for Android, via a communication mechanism provided by React Native. However, previous research and tools have overlooked this mechanism, resulting in incomplete analysis of React Native app code. To address this limitation, we have developed REUNIFY, a prototype tool that integrates the JavaScript and native-side code of React Native apps into an intermediate language that can be processed by the Soot static analysis framework. By doing so, REUNIFY enables the generation of a comprehensive model of the app's behavior. Our evaluation indicates that, by leveraging REUNIFY, the Soot-based framework can improve its coverage of static analysis for the 1,007 most popular React Native Android apps, augmenting the number of lines of Jimple code by 70%. Additionally, we observed an average increase of 84% in new nodes reached in the callgraph for these apps, after integrating REUNIFY. When REUNIFY is used for taint flow analysis, an average of two additional privacy leaks were identified. Overall, our results demonstrate that REUNIFY significantly enhances the Soot-based framework's capability to analyze React Native Android apps.

DOI 10.1109/ASE56229.2023.00113
Citations Scopus - 4
2022 Li C, Chen X, Sun R, Xue M, Wen S, Ahmed ME, Camtepe S, Xiang Y, 'Cross-language Android permission specification', ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 772-783 (2022) [E1]
DOI 10.1145/3540250.3549142
Citations Scopus - 8
2022 Sun X, Chen X, Zhao Y, Liu P, Grundy J, Li L, 'Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues', ACM International Conference Proceeding Series (2022)

Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test ... [more]

Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test case coverage rate has led to many compatibility issues that can cause apps to crash at runtime on specific Android devices, resulting in poor user experiences for both apps and the Android ecosystem. To mitigate this impact, various approaches have been proposed to automatically detect such compatibility issues. Unfortunately, these approaches have only focused on detecting signature-induced compatibility issues (i.e., a certain API does not exist in certain Android versions), leaving other equally important types of compatibility issues unresolved. In this work, we propose a novel prototype tool, JUnitTestGen, to fill this gap by mining existing Android API usage to generate unit test cases. After locating Android API usage in given real-world Android apps, JUnitTestGen performs inter-procedural backward data-flow analysis to generate a minimal executable code snippet (i.e., test case). Experimental results on thousands of real-world Android apps show that JUnitTestGen is effective in generating valid unit test cases for Android APIs. We show that these generated test cases are indeed helpful for pinpointing compatibility issues, including ones involving semantic code changes.

DOI 10.1145/3551349.3561151
Citations Scopus - 10
2021 Chen X, Chen W, Liu K, Chen C, Li L, 'A Comparative Study of Smartphone and Smartwatch Apps', 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 1484-1493 (2021)

Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and sm... [more]

Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and smartwatch apps. To fill this gap, we present to the community a comparative study of smartphone and smartwatch apps, aiming at understanding the status quo of cross-phone/watch apps. Specifically, in this work, we first collect a set of cross-phone/watch app pairs and then experimentally look into them to explore their similarities or dissimilarities from different perspectives. Experimental results show that (1) Approximately, up to 40% of resource files, 30% of code methods are reused between smartphone/watch app pairs, (2) Smartphone apps may require more than twice as many as permissions and adopt more than five times as many as user interactions than their watch counterparts, and (3) Smartwatch apps can be released as either standalone (can be run independently) or companion versions (i.e., have to co-work with their smartphone counterparts), for which the former type of apps tends to require more permissions and reuse more code, involve more user interactions than the latter type. Our findings can help developers and researchers understand the ecosystem of smartwatch apps and further gain insight into migrating smartphone apps for smartwatches.

DOI 10.1145/3412841.3442023
Citations Scopus - 1Web of Science - 6
2021 Wang X, Liu X, Li L, Chen X, Liu J, Wu H, 'Time-aware User Modeling with Check-in Time Prediction for Next POI Recommendation', Proceedings - 2021 IEEE International Conference on Web Services, ICWS 2021, 125-134 (2021)

POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks... [more]

POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks. Although significant efforts have been dedicated to learning and recommending users' next POIs based on their historical mobility traces, there still lacks consideration of the discrepancy of users' check-in time preferences and the inherent relationships between POIs and check-in times. To fill this gap, this paper proposes a novel recommendation method which applies multi-task learning over historical user mobility traces known to be sparse. Specifically, we design a cross-graph neural network to obtain time-aware user modeling and control how much information flows across different semantic spaces, which makes up the inadequate representation of existing user modeling methods. In addition, we design a check-in time prediction task to learn users' activities from a time perspective and learn internal patterns between POIs and their check-in times, aiming to reduce the search space to overcome the data sparsity problem. Comprehensive experiments on two real-world public datasets demonstrate that our proposed method outperforms several representative POI recommendation methods with 8.93% to 20.21 % improvement on Recall@1, 5, 10, and 9.25% to 17.56% improvement on Mean Reciprocal Rank.

DOI 10.1109/ICWS53863.2021.00028
Citations Scopus - 1
2021 Sun X, Chen X, Liu K, Wen S, Li L, Grundy J, 'Characterizing Sensor Leaks in Android Apps', Proceedings International Symposium on Software Reliability Engineering ISSRE, 2021-October, 498-509 (2021)

While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experiment... [more]

While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experimentally demonstrated by many state-of-the-art studies. There is hence a strong need to regulate the usage of mobile sensors so as to keep them from being exploited by malicious attackers. However, despite the fact that various efforts have been put in achieving this, i.e., detecting privacy leaks in Android apps, we have not yet found approaches to automatically detect sensor leaks in Android apps. To fill the gap, we designed and implemented a novel prototype tool, Seeker, that extends the famous FlowDroid tool to detect sensor-based data leaks in Android apps. Seeker conducts sensor-focused static taint analyses directly on the Android apps' bytecode and reports not only sensor-triggered privacy leaks but also the sensor types involved in the leaks. Experimental results using over 40,000 real-world Android apps show that Seeker is effective in detecting sensor leaks in Android apps, and malicious apps are more interested in leaking sensor data than benign apps.

DOI 10.1109/ISSRE52982.2021.00058
Citations Scopus - 8
2020 Wang X, Liu J, Li L, Chen X, Liu X, Wu H, 'Detecting and Explaining Self-Admitted Technical Debts with Attention- based Neural Networks', 2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 871-882 (2020)
DOI 10.1145/3324884.3416583
Citations Scopus - 3Web of Science - 23
2020 Li Y, Xiao X, Zhu X, Chen X, Wen S, Zhang B, 'SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge', 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 450-457 (2020)
DOI 10.1109/TrustCom50675.2020.00068
Citations Scopus - 4Web of Science - 1
2019 Shi L, Chen X, Wen S, Xiang Y, 'Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats', CYBERSPACE SAFETY AND SECURITY, PT II, 11983, 588-597 (2019)
DOI 10.1007/978-3-030-37352-8_53
Citations Scopus - 1Web of Science - 4
2019 Zhang R, Chen X, Wen S, Zheng J, 'Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users’ Awareness', Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 11806 LNCS, 378-396 (2019)

Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually ... [more]

Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually come with high privileges and are able to access sensitive system resources. A comprised VA is a stepping stone for attackers to hack into users' phones. Prior work has experimentally demonstrated that VAs can be a promising attack point for HCI tools. However, the state-of-the-art approaches require ad-hoc mechanisms to activate VAs that are non-trivial to trigger in practice and are usually limited to specific mobile platforms. To mitigate the limitations faced by the state-of-the-art, we propose a novel attack approach, namely Vaspy, which crafts the users' "activation voice" by silently listening to users' phone calls. Once the activation voice is formed, Vaspy can select a suitable occasion to launch an attack. Vaspy embodies a machine learning model that learns suitable attacking times to prevent the attack from being noticed by the user. We implement a proof-of-concept spyware and test it on a range of popular Android phones. The experimental results demonstrate that this approach can silently craft the activation voice of the users and launch attacks. In the wrong hands, a technique like Vaspy can enable automated attacks to HCI tools. By raising awareness, we urge the community and manufacturers to revisit the risks of VAs and subsequently revise the activation logic to be resilient to the style of attacks proposed in this work.

DOI 10.1007/978-3-030-30619-9_27
Citations Scopus - 11
2015 Chen C, Zhang J, Chen X, Xiang Y, Zhou W, '6 million spam tweets: A large ground truth for timely Twitter spam detection', IEEE International Conference on Communications, 2015-September, 7065-7070 (2015)

Twitter has changed the way of communication and getting news for people's daily life in recent years. Meanwhile, due to the popularity of Twitter, it also becomes... [more]

Twitter has changed the way of communication and getting news for people's daily life in recent years. Meanwhile, due to the popularity of Twitter, it also becomes a main target for spamming activities. In order to stop spammers, Twitter is using Google SafeBrowsing to detect and block spam links. Despite that blacklists can block malicious URLs embedded in tweets, their lagging time hinders the ability to protect users in real-time. Thus, researchers begin to apply different machine learning algorithms to detect Twitter spam. However, there is no comprehensive evaluation on each algorithms' performance for real-time Twitter spam detection due to the lack of large groundtruth. To carry out a thorough evaluation, we collected a large dataset of over 600 million public tweets. We further labelled around 6.5 million spam tweets and extracted 12 light-weight features, which can be used for online detection. In addition, we have conducted a number of experiments on six machine learning algorithms under various conditions to better understand their effectiveness and weakness for timely Twitter spam detection. We will make our labelled dataset for researchers who are interested in validating or extending our work.

DOI 10.1109/ICC.2015.7249453
Citations Scopus - 112
2014 Wu D, Chen X, Chen C, Zhang J, Xiang Y, Zhou W, 'On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification', NETWORK AND SYSTEM SECURITY, 8792, 138-151 (2014)
Citations Scopus - 1Web of Science - 5
2013 Zhang J, Chen X, Xiang Y, Zhou W, 'Zero-day traffic identification', Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 8300 LNCS, 213-227 (2013)

Recent research on Internet traffic classification has achieved certain success in the application of machine learning techniques into flow statistics based method. How... [more]

Recent research on Internet traffic classification has achieved certain success in the application of machine learning techniques into flow statistics based method. However, existing methods fail to deal with zero-day traffic which are generated by previously unknown applications in a traffic classification system. To tackle this critical problem, we propose a novel traffic classification scheme which has the capability of identifying zero-day traffic as well as accurately classifying the traffic generated by pre-defined application classes. In addition, the proposed scheme provides a new mechanism to achieve fine-grained classification of zero-day traffic through manually labeling very few traffic flows. The preliminary empirical study on a big traffic data show that the proposed scheme can address the problem of zero-day traffic effectively. When zero-day traffic present, the classification performance of the proposed scheme is significantly better than three state-of-the-art methods, random forest classifier, classification with flow correlation, and semi-supervised traffic classification. © Springer International Publishing Switzerland 2013.

DOI 10.1007/978-3-319-03584-0_16
Citations Scopus - 9
2013 Chen X, Zhang J, Xiang Y, Zhou W, 'Traffic Identification in Semi-known Network Environment', 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 572-579 (2013)
DOI 10.1109/CSE.2013.91
Citations Scopus - 4Web of Science - 6
Show 18 more conferences

Journal article (16 outputs)

Year Citation Altmetrics Link
2025 Liu Y, Chen X, Liu Y, Kong P, Bissyandé TF, Klein J, Sun X, Li L, Chen C, Grundy J, 'A comparative study between android phone and TV apps', Automated Software Engineering, 32 (2025) [C1]
DOI 10.1007/s10515-025-00514-8
2025 Liu Y, Chen X, Liu P, Samhi J, Grundy J, Chen C, Li L, 'Demystifying React Native Android Apps for Static Analysis', ACM Transactions on Software Engineering and Methodology, 34 (2025) [C1]
DOI 10.1145/3702977
2025 Zhou W, Zhu X, Han QL, Li L, Chen X, Wen S, Xiang Y, 'The Security of Using Large Language Models: A Survey with Emphasis on ChatGPT', IEEE Caa Journal of Automatica Sinica, 12, 1-26 (2025) [C1]

ChatGPT is a powerful artificial intelligence (AI) language model that has demonstrated significant improvements in various natural language processing (NLP) tasks. How... [more]

ChatGPT is a powerful artificial intelligence (AI) language model that has demonstrated significant improvements in various natural language processing (NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse, attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions. Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.

DOI 10.1109/JAS.2024.124983
Citations Scopus - 10
2025 Chen D, Liu Y, Zhou M, Zhao Y, Wang H, Wang S, Chen X, Bissyandé TF, Klein J, Li L, 'LLM for Mobile: An Initial Roadmap', ACM Transactions on Software Engineering and Methodology, 34 (2025) [C1]
DOI 10.1145/3708528
Citations Scopus - 1
2025 Kalla M, O'Brien T, Metcalf O, Hoda R, Chen X, Li A, Parker C, Franco ME, Georgy S, Huckvale K, Bain C, Poon P, 'Understanding Experiences of Telehealth in Palliative Care: Photo Interview Study', JMIR Hum Factors, 12, e53913-e53913 (2025) [C1]
DOI 10.2196/53913
Citations Scopus - 1
2024 Chen X, Zhou W, Hoda R, Li A, Bain C, Poon P, 'Exploring the opportunities of large language models for summarizing palliative care consultations: A pilot comparative study', DIGITAL HEALTH, 10 (2024) [C1]
DOI 10.1177/20552076241293932
Citations Scopus - 4
2024 Hu H, Wang H, Dong R, Chen X, Chen C, 'Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey', ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 33 (2024) [C1]

Mobile apps are ubiquitous in our daily lives for supporting different tasks such as reading and chatting. Despite the availability of many GUI testing tools, app teste... [more]

Mobile apps are ubiquitous in our daily lives for supporting different tasks such as reading and chatting. Despite the availability of many GUI testing tools, app testers still struggle with low testing code coverage due to tools frequently getting stuck in loops or overlooking activities with concealed entries. This results in a significant amount of testing time being spent on redundant and repetitive exploration of a few GUI pages. To address this, we utilize Android's deep links, which assist in triggering Android intents to lead users to specific pages and introduce a deep link-enhanced exploration method. This approach, integrated into the testing tool Monkey, gives rise to Delm (Deep Link-enhanced Monkey). Delm oversees the dynamic exploration process, guiding the tool out of meaningless testing loops to unexplored GUI pages. We provide a rigorous activity context mock-up approach for triggering existing Android intents to discover more activities with hidden entrances. We conduct experiments to evaluate Delm's effectiveness on activity context mock-up, activity coverage, method coverage, and crash detection. The findings reveal that Delm can mock up more complex activity contexts and significantly outperform state-of-the-art baselines with 27.2% activity coverage, 21.13% method coverage, and 23.81% crash detection.

DOI 10.1145/3664810
Citations Scopus - 4
2024 Tang L, Chen X, Wen S, Li L, Grobler M, Xiang Y, 'Demystifying the Evolution of Android Malware Variants', IEEE Transactions on Dependable and Secure Computing, 21 3324-3341 (2024) [C1]

It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So f... [more]

It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far, researchers mainly rely on dendrogram or family-tree analysis for malware's evolutionary development. However, our research finds that these techniques cannot support comprehensive malware evolution modelling, which provides a detailed explanation for why Android malware samples evolve in specific ways. This shortcoming is mainly caused by the coarse-grained clustering and analysis of malware samples. For example, because these works do not divide malware samples of a family into variant sets and explore the evolution principles among those sets, they usually fail to capture new variants that have been empowered by the feature 'drifting' in evolution. To address this problem, we propose a fine-grained and in-depth analysis of Android malware. Our experimental work systematically reveals the phylogenetic relationships among the variant sets for a deeper malware evolution analysis. We introduce five metrics: silhouette coefficient, creation date, variant labels, the presentativeness of the variant set formula, and the correctness of the linked edges to evaluate the correctness of our analysis. The results show that our variant clustering achieved a high silhouette value at a small sample distance (0.3), a small standard deviation (three months and 16 days) date based on when the malware samples are lastly modified, a high label consistency (91.4%), a high representativeness (93.1%) of the variant set formula. All the linked variant sets are connected based on our PhyloNet construction rules. We further analyse the coding details of Android malware for each variant set and summarise models of their evolutionary development. In this work, we successfully expose two major models of malware evolution: active evolution and passive evolution. We also disclose four technical explanations on the incentives of the two evolution models (two for each model respectively). These findings are valuable for proactive defence against newly emerged malware samples.

DOI 10.1109/TDSC.2023.3325912
Citations Scopus - 2
2024 Tang L, Wu T, Chen X, Wen S, Zhou W, Zhu X, Xiang Y, 'How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse', Connection Science, 36 (2024) [C1]
DOI 10.1080/09540091.2023.2282942
Citations Scopus - 4
2023 Sun X, Chen X, Liu Y, Grundy J, Li L, 'Taming Android Fragmentation Through Lightweight Crowdsourced Testing', IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 49, 3599-3615 (2023) [C1]
DOI 10.1109/TSE.2023.3266324
Citations Scopus - 7Web of Science - 4
2023 Sun X, Chen X, Li L, Cai H, Grundy J, Samhi J, Bissyande T, Klein J, 'Demystifying Hidden Sensitive Operations in Android Apps', ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 32 (2023) [C1]
DOI 10.1145/3574158
Citations Scopus - 7Web of Science - 1
2023 Tang L, Wu T, Chen X, Wen S, Li L, Xia X, Grobler M, Xiang Y, 'How Does Visualisation Help App Practitioners Analyse Android Apps?', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 20, 2238-2255 [C1]
DOI 10.1109/TDSC.2022.3178181
Citations Scopus - 3
2022 Li C, Chen X, Wang D, Wen S, Ahmed ME, Camtepe S, Xiang Y, 'Backdoor Attack on Machine Learning Based Android Malware Detectors', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19, 3357-3370 (2022) [C1]
DOI 10.1109/TDSC.2021.3094824
Citations Scopus - 4Web of Science - 25
2020 Chen X, Li C, Wang D, Wen S, Zhang J, Nepal S, Xiang Y, Ren K, 'Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 15, 987-1001 (2020) [C1]
DOI 10.1109/TIFS.2019.2932228
Citations Scopus - 2Web of Science - 188
2019 Zhang R, Chen X, Wen S, Zheng X, Ding Y, 'Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones', IEEE ACCESS, 7, 153542-153554 (2019) [C1]
DOI 10.1109/ACCESS.2019.2945791
Citations Scopus - 1Web of Science - 6
2015 Zhang J, Chen X, Xiang Y, Zhou W, Wu J, 'Robust Network Traffic Classification', IEEE-ACM TRANSACTIONS ON NETWORKING, 23, 1257-1270 (2015)
DOI 10.1109/TNET.2014.2320577
Citations Scopus - 3Web of Science - 269
Show 13 more journal articles
Edit

Grants and Funding

Summary

Number of grants 4
Total funding $2,038,000

Click on a grant title below to expand the full details for that specific grant.


20251 grants / $15,000

CTF-based Cybersecurity Offensive and Defensive Platform: Development and Evaluation for Higher Education Use$15,000

Funding body: Australasian Council of Deans of Information & Communications Technology

Funding body Australasian Council of Deans of Information & Communications Technology
Project Team

Caslon Chua, Sheng Wen, Xiao Chen, Sky Miao, Wei Zhou, Hao Zhang, Xiaogang Zhu, Cheryl Pope

Scheme ACDICT Learning & Teaching Research Grants Scheme
Role Investigator
Funding Start 2025
Funding Finish 2025
GNo
Type Of Funding C1700 - Aust Competitive - Other
Category 1700
UON N

20242 grants / $23,000

Light-Weight Active Security for Resource-Constrained Devices in Smart Farming$13,000

Funding body: Office of Deputy Vice-Chancellor (Global), Global Engagement and Partnerships Division, University of Newcastle

Funding body Office of Deputy Vice-Chancellor (Global), Global Engagement and Partnerships Division, University of Newcastle
Project Team

Xiao Chen, Farzana Zahid, Shaleeza Sohail, Boyang Li, Melanie Ooi, Harish Devaraj

Scheme The University of Newcastle and The University of Waikato Partnership Seed Fund
Role Lead
Funding Start 2024
Funding Finish 2024
GNo
Type Of Funding Internal
Category INTE
UON N

CESE Start Up$10,000

Funding body: University of Newcastle

Funding body University of Newcastle
Project Team

Xiao Chen

Scheme Academic Appointment Support
Role Lead
Funding Start 2024
Funding Finish 2024
GNo
Type Of Funding Internal
Category INTE
UON N

20211 grants / $2,000,000

Enhanced Telehealth Capabilities for Improved Patient and Clinician Experiences$2,000,000

Deliver enhanced telehealth capabilities (ETHC) to improve patient and clinician experiences of the telehealth delivery method.

This project will make use of an experience-based co-design, prototyping, and evaluation method to enhance telehealth capabilities. By improving the patient experience, as well as the efficiency of telehealth, researchers hope to facilitate a greater uptake of it in the future.

ETHC can improve the technical, as well as the user experience parameters of telehealth. This includes increasing the speed and quality of virtual systems during major events like pandemics, but also providing better and more equitable access to specialist services all the time.

Researchers will apply their methodology to real-world settings and will develop modules for palliative care and mental health as a starting point, while looking to apply their findings across the whole of healthcare in due course.

Funding body: Digital Health CRC

Funding body Digital Health CRC
Scheme Digital Health CRC
Role Investigator
Funding Start 2021
Funding Finish 2024
GNo
Type Of Funding CRC - Cooperative Research Centre
Category 4CRC
UON N
Edit

Research Supervision

Number of supervisions

Completed3
Current6

Current Supervision

Commenced Level of Study Research Title Program Supervisor Type
2025 PhD Integrating Federated Learning and Blockchain in IoT Future Application PhD (Information Technology), College of Engineering, Science and Environment, The University of Newcastle Co-Supervisor
2024 PhD Enhancing Security in Federated Learning: A Research Proposal PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Principal Supervisor
2024 PhD Automatic Code Refactoring Leveraging Large Language Models PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Principal Supervisor
2024 PhD Leveraging Large Language Models for Automated Software Quality Assurance PhD (Computer Science), College of Engineering, Science and Environment, The University of Newcastle Principal Supervisor
2021 PhD Static Analysis in Python Computer Science, Monash University Co-Supervisor
2020 PhD Improving Mobile App Quality through Intelligent Dynamic Analysis Computer Science, Monash University Co-Supervisor

Past Supervision

Year Level of Study Research Title Program Supervisor Type
2025 PhD Cross‑platform Mobile App Analysis Computer Science, Monash University Co-Supervisor
2025 PhD Enhancing Security of On‑device Machine Learning Models Computer Science, Monash University Co-Supervisor
2024 PhD Android App GUI Testing Computer Science, Monash University Co-Supervisor
Edit

Research Opportunities

PhD Student

I’m looking for a self-motivated PhD student to join our research lab, working on topics in LLM for software engineering, software security, AI security and trustworthiness. CSC scholarship available.

PHD

School of Information and Physical Sciences

1/1/2027 - 1/6/2030

Contact

Doctor Xiao Chen
University of Newcastle
School of Information and Physical Sciences
xiao.chen@newcastle.edu.au

Edit

Dr Xiao Chen

Position

Lecturer
School of Information and Physical Sciences
College of Engineering, Science and Environment

Focus area

Computing and Information Technology

Contact Details

Email xiao.chen@newcastle.edu.au

Office

Room SR273
Building Social Science
Location Callaghan Campus
University Drive
Callaghan, NSW 2308
Australia
Edit