Cited By
View all- Zhang LFu ZShi BLi XLai RYang CZhou AMa XWang SXu MBagchi SZhang Y(2024)More is differentProceedings of the 2024 USENIX Conference on Usenix Annual Technical Conference10.5555/3691992.3692009(285-302)Online publication date: 10-Jul-2024
- Zaidi SKhan SVyas PAafer YFilkov VRay BZhou M(2024)A Longitudinal Analysis Of Replicas in the Wild Wild AndroidProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695546(1821-1833)Online publication date: 27-Oct-2024
- Lian KZhang LYang GMao SWang XZhang YYang M(2024)Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile ApplicationsProceedings of the ACM on Software Engineering10.1145/36437301:FSE(70-91)Online publication date: 12-Jul-2024
- Show More Cited By