Follow
Lingling Fan
Lingling Fan
Associate Professor, Nankai University
Verified email at nankai.edu.cn - Homepage
Title
Cited by
Cited by
Year
Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach
S Chen, M Xue, L Fan, S Hao, LX Xu, H Zhu, L Bo
Proceeding of the Elsevier Computers & Security, 2017
2212017
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
G Chen, S Chen, L Fan, X Du, Z Zhao, F Song, Y Liu
The IEEE Security and Privacy (Oakland'2021), 2021
1902021
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu, Z Su
40th International Conference on Software Engineering (ICSE'2018), 408-419, 2018
1102018
StoryDroid: Automated Generation of Storyboard for Android Apps
S Chen, L Fan, C Chen, T Su, W Li, Y Liu, L Xu
41st International Conference on Software Engineering (ICSE'2019), 2019
942019
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications
X Zhan, L Fan, S Chen, F Wu, T Liu, X Luo, Y Liu
Proceedings of the 43rd International Conference on Software Engineering (ICSE), 2021
732021
An empirical assessment of security risks of global android banking apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
42nd International Conference on Software Engineering (ICSE'2020), 2018
702018
Are Mobile Banking Apps Secure? What Can be Improved?
S Chen, T Su, L Fan, G Meng, M Xue, Y Liu, L Xu
In Proceedings of the 26th ACM Joint European Software Engineering …, 2018
672018
Efficiently Manifesting Asynchronous Programming Errors in Android Apps
L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu
33rd International Conference on Automated Software Engineering (ASE'18 …, 2018
662018
Automated Third-party Library Detection for Android Applications: Are We There Yet?
X Zhan, L Fan, T Liu, S Chen, L Li, H Wang, Y Xu, X Luo, Y Liu
35th International Conference on Automated Software Engineering (ASE'20), 2020
562020
Why an android app is classified as malware: Toward malware classification interpretation
B Wu, S Chen, C Gao, L Fan, Y Liu, W Wen, MR Lyu
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (2), 1-29, 2021
532021
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem
C Liu, S Chen, L Fan, B Chen, Y Liu, X Peng
International Conference on Software Engineering (ICSE'2022), 2022
522022
Why My App Crashes Understanding and Benchmarking Framework-specific Exceptions of Android apps
T Su, L Fan, S Chen, Y Liu, L Xu, G Pu, Z Su
IEEE Transactions on Software Engineering (TSE), 2020
492020
GUI-Squatting Attack: Automated Generation of Android Phishing Apps
S Chen, L Fan, C Chen, M Xue, Y Liu, L Xu
IEEE Transactions on Dependable and Secure Computing (TDSC), 2019
482019
CORE: Automating Review Recommendation for Code Changes
JK Siow, C Gao, L Fan, S Chen, Y Liu
27th edition of the IEEE International Conference on Software Analysis …, 2020
472020
Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers
F Song, Y Lei, S Chen, L Fan, Y Liu
International Journal of Intelligent Systems 36 (9), 5210-5240, 2021
462021
Research on third-party libraries in android apps: A taxonomy and systematic literature review
X Zhan, T Liu, L Fan, L Li, S Chen, X Luo, Y Liu
IEEE Transactions on Software Engineering 48 (10), 4181-4213, 2021
372021
A Large-scale Empirical Study on Industrial Fake Apps
C Tang, S Chen, L Fan, L Xu, Y Liu, Z Tang, L Dou
41st ACM/IEEE International Conference on Software Engineering (ICSE'2019), 2019
372019
Automated cross-platform GUI code generation for mobile apps
S Chen, L Fan, T Su, L Ma, Y Liu, L Xu
2019 IEEE 1st International Workshop on Artificial Intelligence for Mobile …, 2019
362019
Accessible or Not? An Empirical Investigation of Android App Accessibility
S Chen, C Chen, L Fan, M Fan, X Zhan, Y Liu
IEEE Transactions on Software Engineering, 2021
342021
Towards understanding and mitigating audio adversarial examples for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing, 2022
252022
The system can't perform the operation now. Try again later.
Articles 1–20