Follow
Ye Quanqi
Title
Cited by
Cited by
Year
Towards model checking android applications
G Bai, Q Ye, Y Wu, H Botha, J Sun, Y Liu, JS Dong, W Visser
IEEE Transactions on Software Engineering 44 (6), 595-612, 2017
392017
Formal analysis of a single sign-on protocol implementation for android
Q Ye, G Bai, K Wang, JS Dong
2015 20th International Conference on Engineering of Complex Computer …, 2015
282015
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
222015
Deep review sharing
C Guo, D Huang, N Dong, Q Ye, J Xu, Y Fan, H Yang, Y Xu
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
132019
Deep attentive factorization machine for app recommendation service
C Guo, Y Xu, X Hou, N Dong, J Xu, Q Ye
2019 IEEE International Conference on Web Services (ICWS), 134-138, 2019
122019
Systematic comprehension for developer reply in mobile system forum
C Guo, W Wang, Y Wu, N Dong, Q Ye, J Xu, S Zhang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
72019
Automatic construction of callback model for android application
C Guo, Q Ye, N Dong, G Bai, JS Dong, J Xu
2016 21st International Conference on Engineering of Complex Computer …, 2016
72016
Inferring implicit assumptions and correct usage of mobile payment protocols
Q Ye, G Bai, N Dong, JS Dong
Security and Privacy in Communication Networks: 13th International …, 2018
62018
Position paper: On using trusted execution environment to secure COTS devices for accessing industrial control systems
Q Ye, HC Tan, D Mashima, B Chen, Z Kalbarczyk
Authorea Preprints, 2023
32023
App genome: callback sequencing in Android
C Guo, N Dong, G Bai, Q Ye, J Dong, J Xu, G Si
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
32017
Analyzing security property of android application implementation using formal method
Q Ye
2015 20th International Conference on Engineering of Complex Computer …, 2015
32015
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
Q Ye, Y Zhang, G Bai, N Dong, Z Liang, JS Dong, H Wang
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
22019
GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone
B Gowrisankar, D Mashima, W Ong, Q Ye, E Esiner, B Chen, Z Kalbarczyk
2022 IEEE Conference on Communications and Network Security (CNS), 100-108, 2022
12022
All your sessions are belong to us: Investigating authenticator leakage through backup channels on Android.(2015)
G BAI, J SUN, J WU, Q YE, L LI, JS DONG, S GUO
20th International Conference on Engineering of Complex Computer Systems …, 2015
12015
Analysis of Mobile Security and Privacy
Q Ye
PQDT-Global, 2018
2018
Vulnerable Path Attack and its Detection
C She, W Wen, Q Ye, K Zheng
KSII Transactions on Internet and Information Systems (TIIS) 11 (4), 2149-2170, 2017
2017
ICECCS 2015 Additional Reviewers
R Arshad, C Attiogbe, P Ballarini, JL Béchennec, A Belaggoun, S Bijo, ...
The system can't perform the operation now. Try again later.
Articles 1–17