Summary: Full Papers in Top-tier Venues (105), CCF A (92), CSRankings (84), Best/Distinguished Paper Award (6)

(s) the student/RA/postdoc I advised or co-advised during the work


    2025

  1. Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs
    Chao Wang(s)#, Yanjie Zhao(s)#, Jiapeng Deng(s), and Haoyu Wang*
    The 46th IEEE Symposium on Security and Privacy (Oakland'25) PDF

  2. Be Careful of What You Embed: Demystifying OLE Vulnerabilities
    Yunpeng Tian(s)#, Feng Dong#, Haoyi Liu(s), Meng Xu, Zhiniang Peng, Zesen Ye, Shenghui Li, Xiapu Luo, and Haoyu Wang
    NDSS 2025 PDF

  3. Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks
    Xiaohui Hu(s), Hang Feng, Pengcheng Xia(s), Gareth Tyson, Lei Wu, Yajin Zhou and Haoyu Wang*
    ACM SIGMETRICS 2025 PDF

  4. Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram
    Yanhui Guo, Dong Wang(s), Liu Wang(s), Yongsheng Fang, Chao Wang(s), Minghui Yang, Tianming Liu*(s) and Haoyu Wang*
    ACM SIGMETRICS 2025 PDF


  5. 2024

  6. Large language models for software engineering: A systematic literature review
    Xinyi Hou(s)#, Yanjie Zhao(s)#, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John Grundy, Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  7. All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts
    Tianle Sun(s), Ningyu He(s), Jiang Xiao, Yinliang Yue, Xiapu Luo, and Haoyu Wang*
    USENIX Security 2024 PDF

  8. Exploring Covert Third-party Identifiers through External Storage in the Android New Era
    Zikan Dong(s)#, Tianming Liu(s)#, Jiapeng Deng(s), Haoyu Wang*, Li Li, Minghui Yang, Meng Wang, Guosheng Xu*, Guoai Xu
    USENIX Security 2024 PDF

  9. Towards Smart Contract Fuzzing on GPU
    Weimin Chen, Xiapu Luo, Haipeng Cai and Haoyu Wang
    The 45th IEEE Symposium on Security and Privacy (Oakland'24) PDF

  10. CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments
    Shenao Wang(s)#, Feng Dong#, Hangfeng Yang, Jingheng Xu*, and Haoyu Wang*
    CCS 2024 PDF

  11. Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
    Pengxiang Ma(s)#, Ningyu He(s)#, Yuhua Huang, Haoyu Wang*, Xiapu Luo
    NDSS 2024 PDF

  12. VETEOS: Statically Vetting EOSIO Contracts for the “Groundhog Day” Vulnerabilities
    Levi Taiji Li, Ningyu He(s), Haoyu Wang, Mu Zhang
    NDSS 2024 PDF

  13. MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots
    Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu
    NDSS 2024 PDF

  14. NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
    Shaofei Li, Feng Dong(s), Ding Li, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen
    NDSS 2024 PDF

  15. WaDec: Decompiling WebAssembly Using Large Language Model
    Xinyu She(s)#, Yanjie Zhao(s)#, and Haoyu Wang*
    ASE 2024 PDF

  16. GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models
    Zhibo Zhang(s), Wuxia Bai(s), Yuxi Li(s), Huasong Meng, Kailong Wang, Ling Shi, Li Li, Jun Wang and Haoyu Wang
    ASE 2024 PDF

  17. Semantic-Enhanced Indirect Call Analysis with Large Language Models
    Baijun Cheng(s), Cen Zhang, Kailong Wang, Ling Shi, Yang Liu, Haoyu Wang, Yao Guo, Xiangqun Chen
    ASE 2024 PDF

  18. GPTZoo: A Large-scale Dataset of GPTs for the Research Community
    Xinyi Hou(s), Yanjie Zhao(s), Shenao Wang(s) and Haoyu Wang
    ASE 2024, The New Ideas and Emerging Results (NIER) Track PDF

  19. Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps
    Zikan Dong(s), Yanjie Zhao(s), Tianming Liu(s), Chao Wang(s), Guosheng Xu, Guoai Xu, Lin Zhang, Haoyu Wang
    ASE 2024 Industry Track PDF

  20. Android Malware Family Labeling: Perspectives from the Industry
    Liu Wang(s), Haoyu Wang, Tao Zhang, Haitao Xu, Guozhu Meng, Peiming Gao, Chen Wei, and Yi Wang
    ASE 2024 Industry Track PDF

  21. Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs
    Jian Zhao(s)#, Shenao Wang(s)#, Yanjie Zhao(s), Xinyi Hou(s), Kailong Wang, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang
    ASE 2024 Industry Track PDF

  22. Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments
    Xinyi Zheng(s), Chen Wei, Shenao Wang(s), Yanjie Zhao(s), Peiming Gao, Yuanchao Zhang, Kailong Wang, Haoyu Wang
    ASE 2024 Industry Track PDF

  23. A First Look at LLM-powered Smartphones
    Liangxuan Wu(s), Yanjie Zhao(s), Chao Wang(s), Tianming Liu(s) and Haoyu Wang
    A-Mobile 2024, Co-located with ASE 2024 PDF

  24. Towards Demystifying Android Adware: Dataset and Payload Location
    Chao Wang(s), Tianming Liu(s), Yanjie Zhao(s), Lin Zhang, Xiaoning Du, Li Li and Haoyu Wang
    A-Mobile 2024, Co-located with ASE 2024 PDF

  25. NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps
    Jikai Wang(s), Haoyu Wang*
    The 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024) PDF

  26. WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation
    Shangtong Cao(s), Ningyu He(s), Xinyu She(s), Yixuan Zhang(s), Mu Zhang, and Haoyu Wang*
    The 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024) PDF

  27. Following the "Thread": Toward Finding Manipulatable Bottlenecks In Blockchain Clients
    Shuohan Wu, Zihao Li, Hao Zhou, Xiapu Luo, Jianfeng Li and Haoyu Wang
    The 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024) PDF

  28. SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries
    Ningyu He(s), Zhehao Zhao, Hanqin Guan, Jikai Wang(s), Shuo Peng(s), Ding Li, Haoyu Wang, Xiangqun Chen, and Yao Guo
    ISSTA 2024, Tool Demo Track PDF

  29. Drowzee: Metamorphic Testing for Fact-conflicting Hallucination Detection in Large Language Models
    Ningke Li(s), Yuekang Li, Yi Liu, Ling Shi, Kailong Wang and Haoyu Wang
    OOPSLA 2024 PDF

  30. Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
    Yuxi Li(s), Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, and Haoyu Wang
    The 2024 ACM International Conference on the Foundations of Software Engineering (FSE 2024) PDF

  31. WASMixer: Binary Obfuscation for WebAssembly
    Shangtong Cao(s)#, Ningyu He(s)#, Yao Guo, and Haoyu Wang*
    The 29th European Symposium on Research in Computer Security (ESORICS 2024) PDF

  32. MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty
    Haodong Li(s), Guosheng Xu*, Liu Wang(s), Xusheng Xiao, Xiapu Luo, Guoai Xu, and Haoyu Wang*
    ICSE 2024 PDF

  33. Miracle or Mirage? A Measurement Study of NFT Rug Pulls
    Jintao Huang(s), Ningyu He(s), Kai Ma(s), Jiang Xiao, Haoyu Wang*
    SIGMETRICS 2024 PDF

  34. ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum
    Taiyu Wong, Chao Zhang, Yuandong Ni, Mingsen Luo, Heying Chen, Yufei Yu, Weilin Li, Xiapu Luo, Haoyu Wang
    INFOCOM 2024 PDF

  35. Unveiling the Paradox of NFT Prosperity
    Jintao Huang(s), Pengcheng Xia(s), Jiefeng Li(s), Kai Ma(s), Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang*
    The Web Conference 2024 (WWW'24) PDF

  36. Is it safe to share your files? An Empirical Security Analysis of Google Workspace
    Liuhuo Wan, Kailong Wang, Haoyu Wang, Guangdong Bai
    The Web Conference 2024 (WWW'24) PDF

  37. Don’t bite off more than you can chew: Investigating Excessive Permission Requests in Trigger-Action Integrations
    Liuhuo Wan, Kailong Wang, Kulani Tharaka Mahadewa, Haoyu Wang, Guangdong Bai
    The Web Conference 2024 (WWW'24) PDF

  38. EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM
    Weimin Chen, Xiapu Luo, Haoyu Wang, Heming Cui, Shuyu Zheng, Xuanzhe Liu
    The 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2024) PDF

  39. Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain
    Kai Ma(s)#, Zhuo Wang(s)#, Yanjie Zhao(s), and Haoyu Wang*
    Internetware 2024 PDF

  40. ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle
    Liangxuan Wu(s), Yanjie Zhao(s), Xinyi Hou(s), Tianming Liu(s), Haoyu Wang*
    The 21st International Conference on Mining Software Repositories (MSR 2024), Mining Challenge PDF

  41. Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity
    Liu Wang(s), Conghui Zheng(s), Haoyu Wang*, Xiapu Luo, Gareth Tyson, Yi Wang*, Shangguang Wang
    The 21st International Conference on Mining Software Repositories (MSR 2024) PDF

  42. MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation
    Guanyu Wang(s), Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang
    The first special event of AI Foundation Models and Software Engineering (FORGE 2024) PDF

  43. Analyzing Excessive Permission Requests in Google Workspace Add-ons
    Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, and Haoyu Wang
    The 28th International Conference on Engineering of Complex Computer Systems (ICECCS 2024) PDF

  44. SoK: On the Security of Non-Fungible Tokens
    Kai Ma(s)#, Jintao Huang(s)#, Ningyu He(s)#, Zhuo Wang, and Haoyu Wang*
    International Conference on Blockchain Research and Applications (BCRA 2024) Best Paper AWARD PDF

  45. VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts
    Yixuan Zhang(s), Shuyu Zheng(s), Haoyu Wang*, Lei Wu, Gang Huang, Xuanzhe Liu
    ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS) PDF

  46. Unearthing Gas-Wasting Code Smells in Smart Contracts with Large Language Models
    Jinan Jiang, Zihao Li, Haoran Qin, Muhui Jiang, Xiapu Luo, Xiaoming Wu, Haoyu Wang, Yutian Tang, Chenxiong Qian, Ting Chen
    IEEE Transactions on Software Engineering (TSE) PDF

  47. Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors
    Baijun Cheng(s), Shengming Zhao(s), Kailong Wang*, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo*, Lei Ma, Haoyu Wang*
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  48. A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation
    Ningyu He(s), Haoyu Wang*, Lei Wu, Xiapu Luo, Yao Guo*, and Xiangqun Chen
    Frontiers of Computer Science PDF

  49. LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types
    Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao
    IEEE Transactions on Software Engineering (TSE) PDF

  50. DefiRanger: Detecting DeFi Price Manipulation Attacks
    Siwei Wu, Zhou Yu(s), Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xiangliang Yuan
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  51. WalletRadar: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets
    Xia. P(s)#, Guo. Y, Lin. Z, Wu. J, Duan. P, He. N, Wang. K, Liu. T, Yue. Y, Xu. G, and Haoyu Wang
    Automated Software Engineering PDF

  52. Characterizing the App Recommendation Relationships in the iOS App Store: A Complex Network's Perspective
    Gang Huang, Fuqin Lin, Yun Ma*, Haoyu Wang*, Qingxiang Wang, Gareth Tyson, and Xuanzhe Liu
    SCIENCE CHINA: Information Sciences PDF


  53. 2023

  54. Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples
    Jingjing Wang(s)#, Liu Wang(s)#, Feng Dong*, Haoyu Wang*
    ACM Internet Measurement Conference 2023 (IMC'23) PDF

  55. TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum
    Bowen He, Yuan Chen, Zhuo chen, Xiaohui Hu(s), Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou
    ACM CCS 2023 PDF

  56. Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
    Feng Dong(s), Shaofei Li, Peng Jiang, Ding Li*, Haoyu Wang*, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen
    ACM CCS 2023 PDF

  57. Characterizing and Detecting WebAssembly Runtime Bugs
    Yixuan Zhang(s), Shangtong Cao(s), Haoyu Wang*, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma*, Gang Huang, Xuanzhe Liu
    ACM Transactions on Software Engineering and Methodology PDF

  58. BREWasm: A General Static Binary Rewriting Framework for WebAssembly
    Shangtong Cao(s)#, Ningyu He(s)#, Yao Guo, and Haoyu Wang*
    The 30th Static Analysis Symposium (SAS 2023) PDF

  59. WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
    S. Meng (s)#, L. Wang(s)#, S. Wang(s), K. Wang*, X. Xiao, G. Bai, and Haoyu Wang*
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023) PDF

  60. WADIFF: A Differential Testing Framework for WebAssembly Runtimes
    Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023) PDF

  61. MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
    Ningke Li(s), Shenao Wang(s), Mingxi Feng(s), Kailong Wang*, Meizhen Wang, Haoyu Wang*
    The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023), Industry Challenge Track (full paper) PDF

  62. Ransomware as a Service: Demystifying Android Ransomware Generators
    Can Tu(s), Liu Wang(s), Yang Xu, Yiping Zhao(s), Haitao Xu, Haoyu Wang*
    SecureComm 2023 PDF

  63. DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
    Feng Dong(s), Liu Wang(s), Xu Nie(s), Fei Shao, Haoyu Wang*, Ding Li, Xiapu Luo and Xusheng Xiao
    USENIX Security 2023 PDF

  64. MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
    Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
    USENIX Security 2023 PDF

  65. Understanding and Tackling Label Errors in Deep Learning-based Vulnerability Detection
    Xu Nie(s)#, Ningke Li(s)#, Kailong Wang*, Shangguang Wang, Xiapu Luo, Haoyu Wang*
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF

  66. Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
    Ningyu He, Zhehao Zhao, Jikai Wang(s), Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, and Yao Guo
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF ACM SIGSOFT Distinguished Paper AWARD

  67. CydiOS: a model-based testing framework for iOS apps
    Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang(s), Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo
    ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023) PDF

  68. ScamRadar: Identifying Blockchain Scams When They are Promoting
    Xinzhe Zheng(s), Pengcheng Xia(s), Kailong Wang and Haoyu Wang*
    BlockSys 2023 PDF Best Student Paper AWARD

  69. A Deep Dive into the Featured iOS Apps
    Liu Wang(s), Haoyu Wang*, Huiyi Wang, Li Li, and Yi Wang*
    The 14th Asia-Pacific Symposium on Internetware (Internetware 2023) PDF

  70. Characterizing Cryptocurrency-themed Malicious Browser Extensions
    Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu(s), Haoyu Wang*, Guangdong Bai*, Beng Chin Ooi, Jin Song Dong
    ACM SIGMETRICS 2023 PDF

  71. Are Mobile Advertisements in Compliance with App’s Age Group?
    Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John Grundy, and Li Li
    The Web Conference 2023 (WWW 2023) PDF

  72. FaaSLite: Application-Level FaaS Optimization for Cold Start Latency in Serverless Computing
    Xuanzhe Liu, Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin
    ACM Transactions on Software Engineering and Methodology
    Selected for ASE 2023 journal-first presentation PDF

  73. Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective
    Xuanzhe Liu, Diandian Gu, Zhenpeng Chen, Jinfeng Wen, Zili Zhang, Yun Ma, Haoyu Wang, Xin Jin
    ACM Transactions on Software Engineering and Methodology
    Selected for ASE 2023 journal-first presentation PDF

  74. On the Usage-scenario-based Data Minimization in Mini Programs
    Shenao Wang(s), Yanjie Zhao(s), Kailong Wang, Haoyu Wang
    The 2023 ACM Workshop on Secure and Trustworthy Superapps (SaTS'23), co-located with CCS'23 PDF

  75. Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins
    Yanjie Zhao(s), Yue Zhang, Haoyu Wang
    The 2023 ACM Workshop on Secure and Trustworthy Superapps (SaTS'23), co-located with CCS'23 PDF


  76. 2022

  77. Challenges in Decentralized Name Management: The Case of ENS
    Pengcheng Xia(s), Haoyu Wang*, Zhou Yu(s), Xinyu Liu(s), Xiapu Luo, Guoai Xu, and Gareth Tyson
    The 2022 ACM Internet Measurement Conference (IMC'22) PDF

  78. MalWhiteout: Reducing Label Errors in Android Malware Detection
    Liu Wang(s), Haoyu Wang*, Xiapu Luo, and Yulei Sui
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) PDF

  79. Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
    Yuxi Ling, Kailong Wang, Guangdong Bai*, Haoyu Wang*, and Jin Song Dong
    The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022) PDF

  80. Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era
    Zikan Dong(s), Liu Wang(s), Hao Xie(s), Guoai Xu and Haoyu Wang*
    A-Mobile Workshop, co-located with ASE'22 PDF

  81. What Did You Pack in My App? A Systematic Analysis of Commercial Android Packers
    Zikan Dong(s), Hongxuan Liu(s), Liu Wang(s), Xiapu Luo, Yao Guo,Guoai Xu, Xusheng Xiao, and Haoyu Wang*
    ESEC/FSE 2022 (Industry Track) PDF

  82. Demystifying "Removed Reviews" in iOS App Store
    Liu Wang(s), Haoyu Wang*, Xiapu Luo, Tao Zhang, Shangguang Wang, and Xuanzhe Liu
    ESEC/FSE 2022 (Industry Track) PDF

  83. Uncovering Intent based Leak of Sensitive Data in Android Framework
    Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai
    The 29th ACM Conference on Computer and Communications Security (CCS 2022) PDF

  84. MalRadar: Demystifying Android Malware in the New Era
    Liu Wang(s), Haoyu Wang*, Ren He(s), Ran Tao(s), Guozhu Meng, Xiapu Luo, Xuanzhe Liu
    ACM SIGMETRICS 2022 (Acceptance Rate = 11%, Winter Deadline) PDF

  85. Path-Sensitive Code Embedding via Contrastive Learning for Software Vulnerability Detection
    Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui
    The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '22) PDF

  86. WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts
    Weimin Chen(s), Zihan Sun(s), Haoyu Wang*, Xiapu Luo*, Haipeng Cai, Lei Wu
    The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA '22) PDF

  87. A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity
    Liu Wang(s), Haoyu Wang*, Yi Wang, Gareth Tyson, Fei Lyu
    The 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems 2022 (MobileSoft 2022) PDF

  88. Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit
    Guosheng Xu, Siyi Li(s), Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu* and Haoyu Wang*
    The ACM Web Conference 2022 (WWW '22) PDF

  89. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors
    Xiao Cheng, Xu Nie(s), Ningke Li(s), Haoyu Wang, Zheng Zheng, Yulei Sui
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  90. APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps
    Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John Grundy
    IEEE Transactions on Software Engineering (TSE) PDF


  91. ===================================================================================================

    ↑ ↑ ↑ ↑ ↑ Publications after Joining HUST ↑ ↑ ↑ ↑ ↑

    ===================================================================================================

  92. Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange
    Pengcheng Xia(s), Haoyu Wang*, Bingyu Gao(s), Weihang Su(s), Zhou Yu(s), Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu
    ACM SIGMETRICS 2022 (Acceptance Rate = 16%, Summer Deadline) PDF

  93. Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
    Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang
    The Network and Distributed System Security Symposium (NDSS 2022) PDF

  94. DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps
    Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang Ye, Xusheng Xiao
    The 44th International Conference on Software Engineering (ICSE 2022) PDF

  95. Promal: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning
    Changlin Liu, Hanlin Wang, Tianming Liu(s), Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao
    The 44th International Conference on Software Engineering (ICSE 2022) PDF

  96. Towards Automatically Localizing Function Errors in Mobile Apps with User Reviews
    Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao
    IEEE Transactions on Software Engineering (TSE) PDF

  97. BATscope: Demystifying Malicious Addresses and Mixing Transactions in Bitcoin (In Chinese)
    WONG Taiyu, YIN Tingting, LI Yun, QIN Siliang, REN Xin, LUO Xiapu, WANG Haoyu, YIN Xia, ZHANG Chao
    Journal of Cyber Security PDF


  98. 2021

  99. Finding the Missing Piece: Permission Specification Analysis for Android NDK
    Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang
    The 36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021) PDF

  100. SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts
    Weimin Chen(s), Xinran Li(s), Yuting Sui(s), Ningyu He(s), Haoyu Wang*, Lei Wu, and Xiapu Luo.
    ACM SIGMETRICS 2021 (Acceptance Rate: 12%, winter deadline), published in ACM POMACS PDF

  101. Tracking Counterfeit Cryptocurrency End-to-end
    Bingyu Gao(s), Haoyu Wang*, Pengcheng Xia(s), Siwei Wu, Yajin Zhou, Xiapu Luo, and Gareth Tyson.
    ACM SIGMETRICS 2021 (Acceptance Rate: 16%, summer deadline), published in ACM POMACS PDF

  102. EOSafe: Security analysis of EOSIO smart contracts
    Ningyu He(s), Ruiyi Zhang, Haoyu Wang*, Lei Wu*, Xiapu Luo, Yao Guo*, Ting Yu, and Xuxian Jiang.
    Proceedings of The 30th USENIX Security Symposium (USENIX Security 2021) PDF

  103. CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies
    Yangyu Hu(s)#, Haoyu Wang*#, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao and Yao Guo.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  104. DeepBackdoor: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
    Yuanchun Li, Jiayi Hua(s), Haoyu Wang*, Chunyang Chen and Yunxin Liu.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  105. An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications
    Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, and Xuanzhe Liu*.
    Proceedings of the 43rd ACM/IEEE International Conference on Software Engineering (ICSE 2021) PDF

  106. Demystifying Illegal Mobile Gambling Apps
    Yuhao Gao(s), Haoyu Wang*, Li Li, Xiapu Luo, Xuanzhe Liu and Guoai Xu*.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  107. A Longitudinal Study of Removed Apps in iOS App Store
    Fuqi Lin(s)#, Haoyu Wang*#, Liu Wang(s) and Xuanzhe Liu*.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  108. Towards Understanding and Demystifying Bitcoin Mixing Services
    Lei Wu, Yufeng Hu, Yajin Zhou*, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang and Kui Ren.
    Proceedings of the 30th The Web Conference (WWW 2021), acceptance rate = 20.6% PDF

  109. Beyond the Virus: A First Look at Coronavirus-themed Android Malware
    Liu Wang(s)#, Ren He(s)#, Haoyu Wang*, Pengcheng Xia(s), Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu.
    Empirical Software Engineering (EMSE) PDF Github Zenodo

  110. DeepWukong: Statically Detecting Software Vulnerabilities using Deep Graph Neural Network
    Xiao Cheng(s), Haoyu Wang*, Jiayi Hua(s), Guoai Xu* and Yulei Sui.
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  111. On the Impact of Sample Duplication in Machine Learning based Android Malware Detection
    Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawende F. Bissyande, Jacques Klein, John Grundy.
    ACM Transactions on Software Engineering and Methodology (TOSEM) PDF

  112. XDebloat: Towards Automated Feature-Oriented App Debloating
    Yutian Tang, Hao Zhou, Xiapu Luo, Ting Chen, Haoyu Wang, Zhou Xu, and Yan Cai
    IEEE Transactions on Software Engineering (TSE) PDF

  113. A Systematic Assessment on Android Third-party Library Detection Tools
    Xian Zhan, Tianming Liu(s), Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo
    IEEE Transactions on Software Engineering (TSE) PDF

  114. A Systematical Study on Application Performance Management Libraries for Apps
    Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung.
    IEEE Transactions on Software Engineering (TSE) PDF

  115. Make Web3.0 Connected
    Zhuotao Liu, Yangxi Xiang(s), Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu.
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  116. Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns
    Pengcheng Xia(s), Mohamed Nabeel, Issa Khalil, Haoyu Wang and Ting Yu.
    Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY 2021) PDF

  117. MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps
    Jiayi Hua(s), Yuanchun Li, Haoyu Wang*.
    Proceedings of the 4th Deep Learning and Security Workshop (DLS 2021), Co-located with S&P 2021 PDF Github

  118. On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection
    Jiayi Hua(s), Haoyu Wang*.
    Proceedings of the 2021 Mining Software Repositories Conference (MSR'21), Mining Challenge Track PDF

  119. Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
    Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang and Kui Ren.
    Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, co-located with ASIACCS'21 PDF

  120. Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms
    Yixue Zhao, Siwei Yin(s), Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang and Nenad Medvidovic.
    MobileSoft'21, co-located with ICSE'21 PDF

  121. Towards Understanding iOS App Store Search Advertising: An Explorative Study
    Siming Su(s), Haoyu Wang* and Guoai Xu.
    MobileSoft'21, co-located with ICSE'21 PDF

  122. A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories
    Liu Wang(s), Ruiqing Li, Jiaxin Zhu, Guangdong Bai and Haoyu Wang*.
    IEEE Computer Society Signature Conference on Computers, Software and Applications (COMPSAC 2021) PDF

  123. Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study
    Liu Wang(s), Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su(s) and Haoyu Wang*.
    The 33rd International Conference on Software Engineering & Knowledge Engineering (SEKE'21) PDF



  124. 2020

  125. Understanding (Mis)Behavior on the EOSIO Blockchain
    Yuheng Huang(s), Haoyu Wang*, Lei Wu*, Gareth Tyson, Xiapu Luo, Run Zhang(s), Xuanzhe Liu, Gang Huang and Xuxian Jiang.
    ACM SIGMETRICS 2020 (Acceptance Rate: 15%), published in ACM POMACS PDF

  126. Flow2Vec: Value-Flow-Based Precise Code Embedding
    Yulei Sui, Xiao Cheng(s), Guanqin Zhang, and Haoyu Wang.
    Proceedings of ACM OOPSLA 2020 PDF ACM SIGPLAN Distinguished Paper AWARD

  127. Mobile App Squatting
    Yangyu Hu(s), Haoyu Wang*, Ren He(s), Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu and Guoai Xu*.
    Proceedings of the Web Conference 2020 (WWW'20), acceptance rate = 19%, Full paper, Oral.
    PDF BEST STUDENT PAPER AWARD (the first award in China)

  128. MadDroid: Characterising and Detecting Devious Ad Content for Android Apps
    Tianming Liu#(s), Haoyu Wang#*, Li Li, Xiapu Luo, Feng Dong(s), Yao Guo, Liu Wang(s), Tegawende F. Bissyande and Jacques Klein
    Proceedings of the Web Conference 2020 (WWW'20), acceptance rate = 19%, Full paper, Oral. PDF

  129. DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts
    Ru Ji(s)#, Ningyu He(s)#, Lei Wu, Haoyu Wang*, Guangdong Bai and Yao Guo.
    Proceedings of the 25th International Conference on Engineering of Complex Computer Systems (ICECCS 2020)
    Media Coverage: CoinDesk, Yahoo Finance, Coin Geek, Publish0x, nasdaq.com, Cryptonews, CoinGenius PDF

  130. Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams
    Pengcheng Xia(s), Haoyu Wang*, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu.
    Proceedings of APWG Symposium on Electronic Crime Research (eCrime 2020) PDF Dataset

  131. Demystifying Diehard Android Apps
    Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue and Ting Wang.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  132. Automated Third-party Library Detection for Android Applications: Are We There Yet?
    Xian Zhan, Lingling Fan, Tianming Liu(s), Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo and Yang Liu.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  133. UI Obfuscation and its Effects on Automated UI Analysis for Android Apps
    Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang and Wei Zhang.
    The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE 2020), acceptance rate = 22.5%. PDF

  134. All Your App Links are Belong to Us: Understanding the Threats of Instant Apps based Attacks
    Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou and Zhou Xu.
    ESEC/FSE 2020. PDF

  135. A Comprehensive Study on Challenges in Deploying Deep Learning Based Software
    Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie and Xuanzhe Liu*.
    ESEC/FSE 2020. PDF

  136. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
    Ningyu He(s), Lei Wu, Haoyu Wang*, Yao Guo*, and Xuxian Jiang.
    The 24th International Conference on Financial Cryptography and Data Security 2020 (FC'20), acceptance rate = 22%. PDF

  137. A3IDENT: A Two-phased Approach to Identify the Leading Authors of Android Apps
    Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge and Xiaohong Li.
    IEEE International Conference on Software Maintenance and Evolution (ICSME 2020) PDF

  138. Characterizing Cryptocurrency Exchange Scams
    Pengcheng Xia(s), Haoyu Wang*, Bowen Zhang(s), Ru Ji(s), Bingyu Gao(s), Lei Wu, Xiapu Luo, and Guoai Xu.
    Elsevier Computers & Security (COSE, IF=3.579) PDF

  139. Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps
    Huiyi Wang(s), Liu Wang(s), and Haoyu Wang*.
    The International Workshop on Advances in Mobile App Analysis (A-Mobile 2020), co-located with ASE 2020 PDF

  140. KnowledgeZooClient: Constructing Knowledge Graph for Android
    Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li and Tegawende F. Bissyande
    The International Workshop on Advances in Mobile App Analysis (A-Mobile 2020), co-located with ASE 2020 PDF

  141. Dissecting Mobile Offerwall Advertisements: An Explorative Study
    Guosheng Xu, Yangyu Hu(s), Qian Guo(s), Ren He(s), Li Li, Guoai Xu, Zhihui Han, Haoyu Wang
    The 20th IEEE International Conference on Software Quality, Reliability, and Security (QRS'20) PDF

  142. Does the Presence of Privacy Relevant Information Affect App Market Choice?
    Maria K Wolters, Shuobing Li, Haoyu Wang, Xinyu Yang(s), and Yao Guo
    The ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), Late-Breaking Work. PDF

  143. Same origin based fine-grained privacy protection for mobile applications
    Wenxiong Lu(s), Haoyu Wang*
    Invited Paper, BIG DATA RESEARCH (in Chinese). PDF



  144. 2019

  145. Automated Deobfuscation of Android Native Binary Code
    Zeliang Kan(s), Haoyu Wang, Lei Wu, Yao Guo, and Xiapu Luo. PDF Tool (Github)

  146. EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level
    Lijin Quan(s), Lei Wu, and Haoyu Wang*. PDF Tool (Github) Demo

  147. DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps
    Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lv.
    The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019) PDF

  148. HyperService: Interoperability and Programmability across Heterogeneous Blockchains
    Zhuotao Liu*, Yangxi Xiang(s), Jian Shi, Peng Gao, Haoyu Wang*, Xusheng Xiao, Bihan Wen, Yih-Chun Hu.
    The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019) PDF

  149. Characterizing Android App Signing Issues
    Haoyu Wang, Hongxuan Liu(s), Xusheng Xiao, Guozhu Meng, and Yao Guo.
    The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), full paper. PDF

  150. DaPanda: Detecting Aggressive Push Notification in Android Apps
    Tianming Liu#(s), Haoyu Wang#*, Li Li, Guangdong Bai, Yao Guo and Guoai Xu.
    The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), full paper. PDF

  151. Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications
    Yangyu Hu(s), Haoyu Wang*, Yajin Zhou*, Yao Guo, Li Li, Bingxuan Luo(s), Fangren Xu(s).
    IEEE Transactions on Dependable and Secure Computing (TDSC) PDF

  152. Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play
    Haoyu Wang, Hao Li and Yao Guo.
    THE WEB CONFERENCE 2019 (WWW 2019), acceptance rate = 18% , full paper. PDF

  153. Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
    Xiao Cheng(s), Haoyu Wang*, Jiayi Hua(s), Miao Zhang, Guoai Xu, Li Yi* and Yulei Sui.
    The 24th International Conference on Engineering of Complex Computer Systems (ICECCS 2019) PDF

  154. AppNet: Understanding App Recommendation in Google Play
    Qian Guo(s), Haoyu Wang, Chenwei Zhang, Yao Guo and Guoai Xu.
    The 3rd International Workshop on App Market Analytics (WAMA 2019), co-located with ESEC/FSE 2019. PDF

  155. LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking
    Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong and Haoyu Wang.
    The 22nd Information Security Conference (ISC 2019) PDF

  156. Deobfuscating Android Native Binary Code
    Zeliang Kan(s), Haoyu Wang, Lei Wu, Yao Guo and Guoai Xu.
    The 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019), Poster Track (Invitation). PDF

  157. Revisiting the Impact of Common Libraries for Android-related Investigations
    Li Li, Timothee Riom, Tegawende F. Bissyande, Haoyu Wang, Jacques Klein, and Yves Le Traonb.
    Journal of Systems and Software (JSS) PDF

  158. Characterizing the Global Mobile App Developers: A Large-scale Empirical Study
    Haoyu Wang, Xupu Wang(s) and Yao Guo.
    IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2019) PDF

  159. RmvDroid: Towards A Reliable Android Malware Dataset with App Metadata
    Haoyu Wang, Junjun Si, Hao Li and Yao Guo.
    The 16th International Conference on Mining Software Repositories (MSR 2019), Data Showcase. PDF

  160. Want to Earn a Few Extra Bucks? A First Look at Money-making Apps
    Yangyu Hu(s), Haoyu Wang*, Li Li, Yao Guo, Guoai Xu* and Ren He(s)
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019) PDF

  161. Knowledge Graphing Git Repositories: A Preliminary Study
    Yanjie Zhao(s), Haoyu Wang*, Lei Ma, Yuxin Liu, Li Li and John Grundy.
    IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2019), ERA Track. PDF

  162. On Identifying and Explaining Similarities in Android Apps
    Li Li, Tegawende F. Bissyande, Haoyu Wang and Jacques Klein.
    Journal of Computer Science and Technology (JCST) PDF

  163. AppAuth: Authorship Attribution for Android App Clones
    Guoai Xu, Chengpeng Zhang(s), Bowen Sun(s), Xinyu Yang(s), Yanhui Guo, Chengze Li(s), Haoyu Wang. PDF

  164. Mobile Device Security
    Miao Zhang, Shuai Shao, Haoyu Wang.
    BOOK (textbook for undergraduate student), BUPT Press

  165. Mobile Application Security
    Haoyu Wang, Guoai Xu, Yao Guo.
    BOOK (textbook for graduate student), BUPT Press



  166. 2018

  167. Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets
    Haoyu Wang, Zhe Liu(s), Jingyue Liang(s), Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu.
    ACM Internet Measurement Conference (IMC 2018), our paper is the only one coming from Asia. PDF

  168. FraudDroid: Automated Ad Fraud Detection for Android Apps
    Feng Dong(s), Haoyu Wang*#, Li Li, Yao Guo, Tegawende F. Bissyande, Tianming Liu(s), Guoai Xu and Jacques Klein
    ESEC/FSE 2018 (acceptance rate of 19%) PDF

  169. CiD: Automating the Detection of API-related Compatibility Issues in Android Apps
    Li Li, Tegawende F. Bissyande, Haoyu Wang, Jacques Klein.
    The 27th International Symposium on Software Testing and Analysis (ISSTA 2018) PDF

  170. How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
    Feng Dong(s), Haoyu Wang*, Li Li, Yao Guo, Guoai Xu, Shaodong Zhang.
    The 19th Workshop on Mobile Computing Systems and Applications (HotMobile 2018) PDF

  171. Why are Android Apps Removed From Google Play? A Large-scale Empirical Study
    Haoyu Wang, Hao Li, Li Li, Yao Guo, Guoai Xu.
    The 15th International Conference on Mining Software Repositories (MSR 2018) PDF

  172. Towards Light-weight Deep Learning based Malware Detection
    Zeliang Kan(s), Haoyu Wang*, Guoai Xu*, Yao Guo, Xiangqun Chen.
    The 42nd IEEE International Conference on Computers, Software & Applications (COMPSAC 2018) PDF

  173. Re-checking App Behavior against App Description in the Context of Third-party Libraries
    Chengpeng Zhang(s), Haoyu Wang*, Ran Wang(s), Yao Guo, Guoai Xu*.
    The 30th International Conference on Software Engineering & Knowledge Engineering (SEKE 2018) PDF



  174. 2017

  175. An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective
    Haoyu Wang, Zhe Liu(s), Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu and Jason Hong.
    Proceedings of the 26th International World Wide Web Conference (WWW 2017) PDF

  176. Understanding the Purpose of Permission Use in Mobile Apps
    Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, Jason Hong.
    ACM Transactions on Information Systems (TOIS) PDF

  177. Understanding Third-party Libraries in Mobile App Analysis
    Haoyu Wang and Yao Guo.
    ICSE 2017, Technical Briefings PDF

  178. Purpose-based Access Control for Android
    Haoyu Wang
    2017 USENIX Summit on Hot Topics in Security (HotSec '17) PDF

  179. CRSPR: PageRank for Android Apps
    Chengze Li(s), Haoyu Wang, Junfeng Wang, Qi Li, Jianbo Yu, Jingyi Guo, Guoai Xu and Yanhui Guo.
    IEEE ACCESS 14(8), 2017 PDF

  180. Automated Detection and Classification of Third-party Libraries in Large Scale Android Apps
    Haoyu Wang, Yao Guo, Ziang Ma and Xiangqun Chen.
    Journal of Software (in Chinese) PDF

  181. Privacy Rating for Mobile Apps based on Crowdsourcing and Machine-learning Techniques
    ZHANG Xianxian(s), WANG Haoyu, GUO Yao and XU Guoai.
    NASAC 2017 (in Chinese) PDF Best Paper Award

  182. Automated Detection of the Inconsistence between App Behavior and Privacy Policy of Android Apps
    WANG Jingyu(s), XU Mingkun, WANG Haoyu and XU Guoai.
    NASAC 2017 (in Chinese) PDF



  183. 2016 and Earlier

  184. Security Analytics for Mobile Apps: Achievements and Challenges
    Wei Yang, Xusheng Xiao, Dengfeng Li, Huoran Li, Xuanzhe Liu, Haoyu Wang, Yao Guo, and Tao Xie.
    Journal of Cyber Security (in Chinese), 1(2), pages 1-14, April 2016. PDF

  185. LibRadar: Detecting Third-party Libraries in Android Apps
    Ziang Ma, Haoyu Wang, Yao Guo and Xiangqun Chen.
    ICSE 2016 (Demo Track) PDF Tool Website

  186. Identifying and Analyzing the Privacy of Apps for Kids
    Minxing Liu, Haoyu Wang, Yao Guo and Jason Hong.
    The 17th International Workshop on Mobile Computing Systems and Applications (HotMobile 2016) PDF

  187. Using Text Mining to Infer the Purpose of Permission Use in Mobile Apps
    Haoyu Wang, Jason Hong and Yao Guo.
    The 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015) PDF

  188. Reevaluating Android Permission Gaps with Static and Dynamic Analysis
    Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai and Xiangqun Chen.
    IEEE GLOBECOM 2015 PDF

  189. WuKong: A Scalable and Accurate Two-Phase Approach to Android App Clone Detection
    Haoyu Wang, Yao Guo, Ziang Ma and Xiangqun Chen.
    International Symposium on Software Testing and Analysis (ISSTA 2015), Baltimore, MD, pp. 71-82. PDF

  190. Similarity-based Web Browser Optimization
    Haoyu Wang, Mengxin Liu, Yao Guo and Xiangqun Chen.
    The 23rd International World Wide Web Conference (WWW 2014), Seoul, Korea, pp 575-584, 2014. (acceptance rate: 12.9%) PDF

  191. Detecting repackaged Android applications based on code clone detection technique
    Haoyu Wang, Zhongyu Wang, Yao Guo and Xiangqun Chen.
    SCIENCE CHINA Information Sciences, 2014, 44 (1): 142-157. (in Chinese) PDF

  192. Mobile Web Browser Optimization in the Cloud Era: A Survey
    Haoyu Wang, Junjun Kong, Yao Guo and Xiangqun Chen.
    IEEE MobileCloud 2013 PDF