EASEAndroid: automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning

Dingbang Xu , Peng Ning , William Enck , Xinwen Zhang
usenix security symposium 351 -366

33
2015
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

Xuxian Jiang , Yajin Zhou , Wu Zhou , Zhi Wang
network and distributed system security symposium

1,172
2012
AppInk: watermarking android apps for repackaging deterrence

Wu Zhou , Xinwen Zhang , Xuxian Jiang
computer and communications security 1 -12

88
2013
Learning from Big Malwares

Linhai Song , Heqing Huang , Wu Zhou , Wenfei Wu
asia pacific workshop on systems 12

4
2016
Unsafe exposure analysis of mobile in-app advertisements

Michael C. Grace , Wu Zhou , Xuxian Jiang , Ahmad-Reza Sadeghi
wireless network security 101 -112

661
2012
Android malware development on public malware scanning platforms: A large-scale data-driven study

Heqing Huang , Cong Zheng , Junyuan Zeng , Wu Zhou
2016 IEEE International Conference on Big Data (Big Data) 1090 -1099

12
2016
Always up-to-date: scalable offline patching of VM images in a compute cloud

Wu Zhou , Peng Ning , Xiaolan Zhang , Glenn Ammons
annual computer security applications conference 377 -386

48
2010
DIVILAR: diversifying intermediate language for anti-repackaging on android platform

Wu Zhou , Zhi Wang , Yajin Zhou , Xuxian Jiang
conference on data and application security and privacy 199 -210

30
2014
Fast, scalable detection of "Piggybacked" mobile applications

Wu Zhou , Yajin Zhou , Michael Grace , Xuxian Jiang
Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13 185 -196

308
2013
Detecting repackaged smartphone applications in third-party android marketplaces

Wu Zhou , Yajin Zhou , Xuxian Jiang , Peng Ning
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12 317 -326

847
2012
A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform

Heqing Huang , Cong Zheng , Junyuan Zeng , Wu Zhou
IEEE Transactions on Big Data 1 -1

5
2018
Deep Ground Truth Analysis of Current Android Malware

Yuping Li , Sankardas Roy , Xinming Ou , Wu Zhou
international conference on detection of intrusions and malware, and vulnerability assessment 252 -276

429
2017
Slembunk: An evolving Android Trojan family targeting users of worldwide banking apps

Wu Zhou , Zhaofeng Chen , Jimmy Su , Jing Xie
Retrieved from FireEye: https://www. fireeye. com/blog/threat-research/2015/12/slembunk_an_evolvin. html

3
2015
Repackaged smartphone applications: Threats and defenses

Wu Zhou
North Carolina State University

2
2013
Method and system for implementing watchpoints

Zhou Wu , Dang En Ren , Hong Bo Peng , Jiang Dong Sun

30
2008