• Publications
  • Influence
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
TLDR
An app market's vetting process can be found by exploiting the way Android malware is constructed and disseminated, which is typically through repackaging legitimate apps with similar malicious components. Expand
  • 148
  • 20
  • PDF
Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme
TLDR
In this paper, we develop the Fuzzy Attribute-Based Signcryption (FABSC), a novel security mechanism that makes a proper tradeoff between security and elasticity. Expand
  • 123
  • 16
  • PDF
SmartAuth: User-Centered Authorization for the Internet of Things
TLDR
We present a new design that supports user-centric, semantic-based “smart” authorization. Expand
  • 101
  • 14
  • PDF
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android
TLDR
We use an ordinary app, Guardian, which pauses suspicious background processes when the principal is running and resumes them after the security-critical operation is done and the environment is cleaned. Expand
  • 62
  • 10
  • PDF
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
TLDR
We report a study that concludes such remote, large-scale attacks are indeed realistic. Expand
  • 38
  • 8
  • PDF
Polyethylenimine modified biochar adsorbent for hexavalent chromium removal from the aqueous solution.
A chemical modified biochar with abundant amino groups for heavy metal removal was prepared using polyethylenimine (PEI) as a modification reagent, and used as an adsorbent for the removal of Cr(VI)Expand
  • 182
  • 7
Network Slicing for Service-Oriented Networks Under Resource Constraints
TLDR
In this paper, we formulate the network slicing problem as a mixed binary linear program and establish its strong NP-hardness. Expand
  • 42
  • 7
  • PDF
Analysis of resonance mechanism and conditions of train-bridge system
In this paper, the resonance mechanism and conditions of train–bridge system are investigated through theoretical derivations, numerical simulations and experimental data analyses. The resonantExpand
  • 115
  • 6
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations
TLDR
We found the presence of customization errors in the security configurations of device-related files on a large number of Android phones, across multiple OS versions, carriers and regions. Expand
  • 96
  • 4
  • PDF
Computing Optimised Parallel Speeded-Up Robust Features (P-SURF) on Multi-Core Processors
  • N. Zhang
  • Computer Science
  • International Journal of Parallel Programming
  • 1 April 2010
TLDR
This article presents a novel CPU-based parallel algorithm that computes the Speeded-Up Robust Features (SURF), a local descriptor that is able to find point correspondences between images in spite of scaling and rotation. Expand
  • 26
  • 4