| 2026 |
Han S, Tan T, Miao Y, Chen X, Sun N, 'Prompting Instability: An Empirical Study of LLM Robustness in Code Vulnerability Detection', Lecture Notes in Computer Science, 16370 LNAI, 233-245 (2026)
|
|
|
| 2025 |
Chen H, Xu X, Zhu X, Zhou X, Dai F, Gao Y, Chen X, Wang S, Hu H, 'Where Does This Data Come From? Enhanced Source Inference Attacks in Federated Learning', Ijcai International Joint Conference on Artificial Intelligence, 4815-4823 (2025)
|
|
|
| 2025 |
Liu T, Deng J, Zhao Y, Chen X, Du X, Li L, Wang H, 'Are iOS Apps Immune to Abusive Advertising Practices?', Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 491-502 (2025) [E1]
|
|
|
| 2024 |
Zhou M, Gao X, Liu P, Grundy J, Chen C, Chen X, Li L, 'Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models', PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 174-185 (2024) [E1]
|
|
Open Research Newcastle |
| 2024 |
Zhou M, Gao X, Chen X, Chen C, Grundy J, Li L, 'DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators', Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 204-215 (2024) [E1]
|
|
|
| 2024 |
Li F, Chen X, Xiao X, Sun X, Chen C, Wang S, Han J, 'Incremental Context-free Grammar Inference in Black Box Settings', Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 1171-1182 (2024) [E1]
|
|
|
| 2023 |
Zhou M, Gao X, Wu J, Grundy J, Chen X, Chen C, Li L, 'ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems', ISSTA 2023 - Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 1005-1017 (2023) [E1]
|
|
|
| 2023 |
Sun X, Chen X, Liu Y, Grundy J, Li L, 'LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation', ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2127-2131 (2023) [E1]
|
|
|
| 2023 |
Zhang R, Wu T, Chen X, Wen S, Nepal S, Paris C, Xiang Y, 'Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention', ACM Web Conference 2023 - Proceedings of the World Wide Web Conference, WWW 2023, 1604-1615 (2023) [E1]
|
|
|
| 2023 |
Liu Y, Chen X, Liu P, Grundy J, Chen C, Li L, 'ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps', Proceedings 2023 38th IEEE ACM International Conference on Automated Software Engineering Ase 2023, 1390-1402 (2023) [E1]
React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact w... [more]
React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact with native-side code, such as Objective-C/Swift for iOS and Java/Kotlin for Android, via a communication mechanism provided by React Native. However, previous research and tools have overlooked this mechanism, resulting in incomplete analysis of React Native app code. To address this limitation, we have developed REUNIFY, a prototype tool that integrates the JavaScript and native-side code of React Native apps into an intermediate language that can be processed by the Soot static analysis framework. By doing so, REUNIFY enables the generation of a comprehensive model of the app's behavior. Our evaluation indicates that, by leveraging REUNIFY, the Soot-based framework can improve its coverage of static analysis for the 1,007 most popular React Native Android apps, augmenting the number of lines of Jimple code by 70%. Additionally, we observed an average increase of 84% in new nodes reached in the callgraph for these apps, after integrating REUNIFY. When REUNIFY is used for taint flow analysis, an average of two additional privacy leaks were identified. Overall, our results demonstrate that REUNIFY significantly enhances the Soot-based framework's capability to analyze React Native Android apps.
|
|
|
| 2022 |
Li C, Chen X, Sun R, Xue M, Wen S, Ahmed ME, Camtepe S, Xiang Y, 'Cross-language Android permission specification', ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 772-783 (2022) [E1]
|
|
|
| 2022 |
Sun X, Chen X, Zhao Y, Liu P, Grundy J, Li L, 'Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues', ACM International Conference Proceeding Series (2022)
Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test ... [more]
Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test case coverage rate has led to many compatibility issues that can cause apps to crash at runtime on specific Android devices, resulting in poor user experiences for both apps and the Android ecosystem. To mitigate this impact, various approaches have been proposed to automatically detect such compatibility issues. Unfortunately, these approaches have only focused on detecting signature-induced compatibility issues (i.e., a certain API does not exist in certain Android versions), leaving other equally important types of compatibility issues unresolved. In this work, we propose a novel prototype tool, JUnitTestGen, to fill this gap by mining existing Android API usage to generate unit test cases. After locating Android API usage in given real-world Android apps, JUnitTestGen performs inter-procedural backward data-flow analysis to generate a minimal executable code snippet (i.e., test case). Experimental results on thousands of real-world Android apps show that JUnitTestGen is effective in generating valid unit test cases for Android APIs. We show that these generated test cases are indeed helpful for pinpointing compatibility issues, including ones involving semantic code changes.
|
|
|
| 2021 |
Chen X, Chen W, Liu K, Chen C, Li L, 'A Comparative Study of Smartphone and Smartwatch Apps', 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 1484-1493 (2021)
Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and sm... [more]
Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and smartwatch apps. To fill this gap, we present to the community a comparative study of smartphone and smartwatch apps, aiming at understanding the status quo of cross-phone/watch apps. Specifically, in this work, we first collect a set of cross-phone/watch app pairs and then experimentally look into them to explore their similarities or dissimilarities from different perspectives. Experimental results show that (1) Approximately, up to 40% of resource files, 30% of code methods are reused between smartphone/watch app pairs, (2) Smartphone apps may require more than twice as many as permissions and adopt more than five times as many as user interactions than their watch counterparts, and (3) Smartwatch apps can be released as either standalone (can be run independently) or companion versions (i.e., have to co-work with their smartphone counterparts), for which the former type of apps tends to require more permissions and reuse more code, involve more user interactions than the latter type. Our findings can help developers and researchers understand the ecosystem of smartwatch apps and further gain insight into migrating smartphone apps for smartwatches.
|
|
|
| 2021 |
Wang X, Liu X, Li L, Chen X, Liu J, Wu H, 'Time-aware User Modeling with Check-in Time Prediction for Next POI Recommendation', Proceedings - 2021 IEEE International Conference on Web Services, ICWS 2021, 125-134 (2021)
POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks... [more]
POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks. Although significant efforts have been dedicated to learning and recommending users' next POIs based on their historical mobility traces, there still lacks consideration of the discrepancy of users' check-in time preferences and the inherent relationships between POIs and check-in times. To fill this gap, this paper proposes a novel recommendation method which applies multi-task learning over historical user mobility traces known to be sparse. Specifically, we design a cross-graph neural network to obtain time-aware user modeling and control how much information flows across different semantic spaces, which makes up the inadequate representation of existing user modeling methods. In addition, we design a check-in time prediction task to learn users' activities from a time perspective and learn internal patterns between POIs and their check-in times, aiming to reduce the search space to overcome the data sparsity problem. Comprehensive experiments on two real-world public datasets demonstrate that our proposed method outperforms several representative POI recommendation methods with 8.93% to 20.21 % improvement on Recall@1, 5, 10, and 9.25% to 17.56% improvement on Mean Reciprocal Rank.
|
|
|
| 2021 |
Sun X, Chen X, Liu K, Wen S, Li L, Grundy J, 'Characterizing Sensor Leaks in Android Apps', Proceedings International Symposium on Software Reliability Engineering ISSRE, 2021-October, 498-509 (2021)
While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experiment... [more]
While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experimentally demonstrated by many state-of-the-art studies. There is hence a strong need to regulate the usage of mobile sensors so as to keep them from being exploited by malicious attackers. However, despite the fact that various efforts have been put in achieving this, i.e., detecting privacy leaks in Android apps, we have not yet found approaches to automatically detect sensor leaks in Android apps. To fill the gap, we designed and implemented a novel prototype tool, Seeker, that extends the famous FlowDroid tool to detect sensor-based data leaks in Android apps. Seeker conducts sensor-focused static taint analyses directly on the Android apps' bytecode and reports not only sensor-triggered privacy leaks but also the sensor types involved in the leaks. Experimental results using over 40,000 real-world Android apps show that Seeker is effective in detecting sensor leaks in Android apps, and malicious apps are more interested in leaking sensor data than benign apps.
|
|
|
| 2020 |
Wang X, Liu J, Li L, Chen X, Liu X, Wu H, 'Detecting and Explaining Self-Admitted Technical Debts with Attention- based Neural Networks', 2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 871-882 (2020)
|
|
|
| 2020 |
Li Y, Xiao X, Zhu X, Chen X, Wen S, Zhang B, 'SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge', 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 450-457 (2020)
|
|
|
| 2019 |
Shi L, Chen X, Wen S, Xiang Y, 'Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats', CYBERSPACE SAFETY AND SECURITY, PT II, 11983, 588-597 (2019)
|
|
|
| 2019 |
Zhang R, Chen X, Wen S, Zheng J, 'Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users’ Awareness', Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 11806 LNCS, 378-396 (2019)
Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually ... [more]
Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually come with high privileges and are able to access sensitive system resources. A comprised VA is a stepping stone for attackers to hack into users' phones. Prior work has experimentally demonstrated that VAs can be a promising attack point for HCI tools. However, the state-of-the-art approaches require ad-hoc mechanisms to activate VAs that are non-trivial to trigger in practice and are usually limited to specific mobile platforms. To mitigate the limitations faced by the state-of-the-art, we propose a novel attack approach, namely Vaspy, which crafts the users' "activation voice" by silently listening to users' phone calls. Once the activation voice is formed, Vaspy can select a suitable occasion to launch an attack. Vaspy embodies a machine learning model that learns suitable attacking times to prevent the attack from being noticed by the user. We implement a proof-of-concept spyware and test it on a range of popular Android phones. The experimental results demonstrate that this approach can silently craft the activation voice of the users and launch attacks. In the wrong hands, a technique like Vaspy can enable automated attacks to HCI tools. By raising awareness, we urge the community and manufacturers to revisit the risks of VAs and subsequently revise the activation logic to be resilient to the style of attacks proposed in this work.
|
|
|
| 2015 |
Chen C, Zhang J, Chen X, Xiang Y, Zhou W, '6 million spam tweets: A large ground truth for timely Twitter spam detection', IEEE International Conference on Communications, 2015-September, 7065-7070 (2015)
Twitter has changed the way of communication and getting news for people's daily life in recent years. Meanwhile, due to the popularity of Twitter, it also becomes... [more]
Twitter has changed the way of communication and getting news for people's daily life in recent years. Meanwhile, due to the popularity of Twitter, it also becomes a main target for spamming activities. In order to stop spammers, Twitter is using Google SafeBrowsing to detect and block spam links. Despite that blacklists can block malicious URLs embedded in tweets, their lagging time hinders the ability to protect users in real-time. Thus, researchers begin to apply different machine learning algorithms to detect Twitter spam. However, there is no comprehensive evaluation on each algorithms' performance for real-time Twitter spam detection due to the lack of large groundtruth. To carry out a thorough evaluation, we collected a large dataset of over 600 million public tweets. We further labelled around 6.5 million spam tweets and extracted 12 light-weight features, which can be used for online detection. In addition, we have conducted a number of experiments on six machine learning algorithms under various conditions to better understand their effectiveness and weakness for timely Twitter spam detection. We will make our labelled dataset for researchers who are interested in validating or extending our work.
|
|
|
| 2014 |
Wu D, Chen X, Chen C, Zhang J, Xiang Y, Zhou W, 'On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification', NETWORK AND SYSTEM SECURITY, 8792, 138-151 (2014)
|
|
|
| 2013 |
Zhang J, Chen X, Xiang Y, Zhou W, 'Zero-day traffic identification', Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 8300 LNCS, 213-227 (2013)
Recent research on Internet traffic classification has achieved certain success in the application of machine learning techniques into flow statistics based method. How... [more]
Recent research on Internet traffic classification has achieved certain success in the application of machine learning techniques into flow statistics based method. However, existing methods fail to deal with zero-day traffic which are generated by previously unknown applications in a traffic classification system. To tackle this critical problem, we propose a novel traffic classification scheme which has the capability of identifying zero-day traffic as well as accurately classifying the traffic generated by pre-defined application classes. In addition, the proposed scheme provides a new mechanism to achieve fine-grained classification of zero-day traffic through manually labeling very few traffic flows. The preliminary empirical study on a big traffic data show that the proposed scheme can address the problem of zero-day traffic effectively. When zero-day traffic present, the classification performance of the proposed scheme is significantly better than three state-of-the-art methods, random forest classifier, classification with flow correlation, and semi-supervised traffic classification. © Springer International Publishing Switzerland 2013.
|
|
|
| 2013 |
Chen X, Zhang J, Xiang Y, Zhou W, 'Traffic Identification in Semi-known Network Environment', 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 572-579 (2013)
|
|
|