Остановите войну!
for scientists:
default search action
Haoyu Wang 0001
Person information
- affiliation: Huazhong University of Science and Technology, Wuhan, China
- affiliation: Beijing University of Posts and Telecommunications, Beijing, China
- affiliation (PhD 2016): Peking University, MOE Key Laboratory of High-Confidence Software Technologies, Beijing, China
Other persons with the same name
- Haoyu Wang (aka: Hao-Yu Wang) — disambiguation page
- Haoyu Wang 0002 — Amazon Alexa, Cambridge, MA, USA (and 1 more)
- Haoyu Wang 0003 — University of Virginia, Charlottesville, VA, USA
- Haoyu Wang 0004 — Purdue University, West Lafayette, IN, USA
- Haoyu Wang 0005 — University of Pennsylvania, PA, USA (and 1 more)
- Haoyu Wang 0006 — University of Ilinois at Chicago, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. ACM Trans. Softw. Eng. Methodol. 33(2): 37:1-37:29 (2024) - [i54]Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang:
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. CoRR abs/2401.02659 (2024) - [i53]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Yulei Sui, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i52]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - 2023
- [j26]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
Miracle or Mirage? A Measurement Study of NFT Rug Pulls. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 51:1-51:25 (2023) - [j25]Xuanzhe Liu, Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin:
FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing. ACM Trans. Softw. Eng. Methodol. 32(5): 119:1-119:29 (2023) - [j24]Xuanzhe Liu, Diandian Gu, Zhenpeng Chen, Jinfeng Wen, Zili Zhang, Yun Ma, Haoyu Wang, Xin Jin:
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective. ACM Trans. Softw. Eng. Methodol. 32(6): 156:1-156:26 (2023) - [j23]Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John C. Grundy:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. IEEE Trans. Software Eng. 49(1): 113-130 (2023) - [j22]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [c95]Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. CCS 2023: 120-134 - [c94]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410 - [c93]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. ICDCS 2023: 1073-1074 - [c92]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. ICSE 2023: 1583-1595 - [c91]Jingjing Wang, Liu Wang, Feng Dong, Haoyu Wang:
Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples. IMC 2023: 253-267 - [c90]Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:
CydiOS: A Model-Based Testing Framework for iOS Apps. ISSTA 2023: 1-13 - [c89]Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). ISSTA 2023: 52-63 - [c88]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. ISSTA 2023: 385-397 - [c87]Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:
WADIFF: A Differential Testing Framework for WebAssembly Runtimes. ASE 2023: 939-950 - [c86]Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. ASE 2023: 1403-1415 - [c85]Ningke Li, Shenao Wang, Mingxi Feng, Kailong Wang, Meizhen Wang, Haoyu Wang:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains. ASE 2023: 1993-2005 - [c84]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
BREWasm: A General Static Binary Rewriting Framework for WebAssembly. SAS 2023: 139-163 - [c83]Shenao Wang, Yanjie Zhao, Kailong Wang, Haoyu Wang:
On the Usage-scenario-based Data Minimization in Mini Programs. SaTS@CCS 2023: 29-32 - [c82]Yanjie Zhao, Yue Zhang, Haoyu Wang:
Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins. SaTS@CCS 2023: 59-64 - [c81]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. SIGMETRICS (Abstracts) 2023: 91-92 - [c80]Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao:
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. USENIX Security Symposium 2023: 6575-6592 - [c79]Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John C. Grundy, Li Li:
Are Mobile Advertisements in Compliance with App's Age Group? WWW 2023: 3132-3141 - [i51]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. CoRR abs/2301.12102 (2023) - [i50]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. CoRR abs/2301.12348 (2023) - [i49]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. CoRR abs/2304.07204 (2023) - [i48]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
A General Static Binary Rewriting Framework for WebAssembly. CoRR abs/2305.01454 (2023) - [i47]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
A Deep Dive into NFT Rug Pulls. CoRR abs/2305.06108 (2023) - [i46]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. CoRR abs/2307.00549 (2023) - [i45]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CoRR abs/2307.08349 (2023) - [i44]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
WASMixer: Binary Obfuscation for WebAssembly. CoRR abs/2308.03123 (2023) - [i43]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - [i42]Xinyu She, Yue Liu, Yanjie Zhao, Yiling He, Li Li, Chakkrit Tantithamthavorn, Zhan Qin, Haoyu Wang:
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey. CoRR abs/2310.17903 (2023) - [i41]Li Li, Xiang Gao, Hailong Sun, Chunming Hu, Xiaoyu Sun, Haoyu Wang, Haipeng Cai, Ting Su, Xiapu Luo, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy, Tao Xie, Haibo Chen, Huaimin Wang:
Software Engineering for OpenHarmony: A Research Roadmap. CoRR abs/2311.01311 (2023) - [i40]Kai Ma, Jintao Huang, Ningyu He, Zhuo Wang, Haoyu Wang:
SoK: On the Security of Non-Fungible Tokens. CoRR abs/2312.08000 (2023) - [i39]Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang:
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation. CoRR abs/2312.10456 (2023) - 2022
- [j21]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. Proc. ACM Meas. Anal. Comput. Syst. 6(2): 40:1-40:27 (2022) - [j20]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [j19]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [j18]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-Party Library Detection Tools. IEEE Trans. Software Eng. 48(11): 4249-4273 (2022) - [j17]Yutian Tang, Hao Zhou, Xiapu Luo, Ting Chen, Haoyu Wang, Zhou Xu, Yan Cai:
XDebloat: Towards Automated Feature-Oriented App Debloating. IEEE Trans. Software Eng. 48(11): 4501-4520 (2022) - [c78]Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai:
Uncovering Intent based Leak of Sensitive Data in Android Framework. CCS 2022: 3239-3252 - [c77]Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang (Fanny) Ye, Xusheng Xiao:
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. ICSE 2022: 685-697 - [c76]Changlin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao:
PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning. ICSE 2022: 1755-1767 - [c75]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu, Gareth Tyson:
Challenges in decentralized name management: the case of ENS. IMC 2022: 65-82 - [c74]Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui:
Path-sensitive code embedding via contrastive learning for software vulnerability detection. ISSTA 2022: 519-531 - [c73]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
WASAI: uncovering vulnerabilities in Wasm smart contracts. ISSTA 2022: 703-715 - [c72]Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. ASE 2022: 10:1-10:12 - [c71]Liu Wang, Haoyu Wang, Xiapu Luo, Yulei Sui:
MalWhiteout: Reducing Label Errors in Android Malware Detection. ASE 2022: 69:1-69:13 - [c70]Zikan Dong, Liu Wang, Hao Xie, Guoai Xu, Haoyu Wang:
Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era. ASE 2022: 203:1-203:6 - [c69]Liu Wang, Haoyu Wang, Yi Wang, Gareth Tyson, Fei Lyu:
A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity. MOBILESoft 2022: 62-72 - [c68]Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang:
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android. NDSS 2022 - [c67]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. SIGMETRICS (Abstracts) 2022: 21-22 - [c66]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. SIGMETRICS (Abstracts) 2022: 23-24 - [c65]Zikan Dong, Hongxuan Liu, Liu Wang, Xiapu Luo, Yao Guo, Guoai Xu, Xusheng Xiao, Haoyu Wang:
What did you pack in my app? a systematic analysis of commercial Android packers. ESEC/SIGSOFT FSE 2022: 1430-1440 - [c64]Liu Wang, Haoyu Wang, Xiapu Luo, Tao Zhang, Shangguang Wang, Xuanzhe Liu:
Demystifying "removed reviews" in iOS app store. ESEC/SIGSOFT FSE 2022: 1489-1499 - [c63]Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu, Haoyu Wang:
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. WWW 2022: 3327-3335 - [i38]Yan Lin, Tianming Liu, Wei Liu, Zhigaoyuan Wang, Li Li, Guoai Xu, Haoyu Wang:
Dataset Bias in Android Malware Detection. CoRR abs/2205.15532 (2022) - [i37]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i36]Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin, Xuanzhe Liu:
LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing. CoRR abs/2207.08175 (2022) - [i35]Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Xiangqun Chen:
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation. CoRR abs/2207.09227 (2022) - 2021
- [j16]Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu:
Beyond the virus: a first look at coronavirus-themed Android malware. Empir. Softw. Eng. 26(4): 82 (2021) - [j15]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 26:1-26:30 (2021) - [j14]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. Proc. ACM Meas. Anal. Comput. Syst. 5(3): 39:1-39:26 (2021) - [j13]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. Proc. ACM Meas. Anal. Comput. Syst. 6(3): 43:1-43:31 (2021) - [j12]Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. IEEE Trans. Dependable Secur. Comput. 18(3): 1033-1050 (2021) - [j11]Xiao Cheng, Haoyu Wang, Jiayi Hua, Guoai Xu, Yulei Sui:
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. ACM Trans. Softw. Eng. Methodol. 30(3): 38:1-38:33 (2021) - [j10]Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. ACM Trans. Softw. Eng. Methodol. 30(3): 40:1-40:38 (2021) - [c62]Pengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang, Ting Yu:
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns. CODASPY 2021: 209-220 - [c61]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang:
A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories. COMPSAC 2021: 914-923 - [c60]Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. ICSE 2021: 263-274 - [c59]Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. ICSE 2021: 674-685 - [c58]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. ICSE 2021: 933-945 - [c57]Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang:
Finding the Missing Piece: Permission Specification Analysis for Android NDK. ASE 2021: 505-516 - [c56]Yixue Zhao, Siwei Yin, Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang, Nenad Medvidovic:
Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms. MOBILESoft@ICSE 2021: 12-23 - [c55]Siming Su, Haoyu Wang, Guoai Xu:
Towards Understanding iOS App Store Search Advertising: An Explorative Study. MOBILESoft@ICSE 2021: 40-51 - [c54]Jiayi Hua, Haoyu Wang:
On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection. MSR 2021: 530-534 - [c53]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su, Haoyu Wang:
Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study. SEKE 2021: 249-254 - [c52]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. SIGMETRICS (Abstracts) 2021: 33-34 - [c51]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. SIGMETRICS (Abstracts) 2021: 35-36 - [c50]Jiayi Hua, Yuanchun Li, Haoyu Wang:
MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps. SP (Workshops) 2021: 71-77 - [c49]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - [c48]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [c47]Fuqi Lin, Haoyu Wang, Liu Wang, Xuanzhe Liu:
A Longitudinal Study of Removed Apps in iOS App Store. WWW 2021: 1435-1446 - [c46]Yuhao Gao, Haoyu Wang, Li Li, Xiapu Luo, Guoai Xu, Xuanzhe Liu:
Demystifying Illegal Mobile Gambling Apps. WWW 2021: 1447-1458 - [i34]Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. CoRR abs/2101.04930 (2021) - [i33]Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. CoRR abs/2101.06896 (2021) - [i32]Liu Wang, Haoyu Wang, Yi Wang, Gareth Tyson, Fei Lyu:
A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity. CoRR abs/2102.06528 (2021) - [i31]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. CoRR abs/2103.00712 (2021) - [i30]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i29]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu:
Ethereum Name Service: the Good, the Bad, and the Ugly. CoRR abs/2104.05185 (2021) - [i28]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-party Library Detection Tools. CoRR abs/2108.01964 (2021) - [i27]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Demystifying Scam Tokens on Uniswap Decentralized Exchange. CoRR abs/2109.00229 (2021) - [i26]Ningyu He, Weihang Su, Zhou Yu, Xinyu Liu, Fengyi Zhao, Haoyu Wang, Xiapu Luo, Gareth Tyson, Lei Wu, Yao Guo:
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO. CoRR abs/2110.07534 (2021) - 2020
- [j9]Pengcheng Xia, Haoyu Wang, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Guoai Xu:
Characterizing cryptocurrency exchange scams. Comput. Secur. 98: 101993 (2020) - [j8]Yulei Sui, Xiao Cheng, Guanqin Zhang, Haoyu Wang:
Flow2Vec: value-flow-based precise code embedding. Proc. ACM Program. Lang. 4(OOPSLA): 233:1-233:27 (2020) - [j7]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. Proc. ACM Meas. Anal. Comput. Syst. 4(2): 37:1-37:28 (2020) - [j6]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. Proc. ACM Meas. Anal. Comput. Syst. 4(3): 50:1-50:28 (2020) - [c45]Maria K. Wolters, Shuobing Li, Haoyu Wang, Xinyu Yang, Yao Guo:
Does the Presence of Privacy Relevant Information Affect App Market Choice? CHI Extended Abstracts 2020: 1-7 - [c44]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. eCrime 2020: 1-14 - [c43]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Financial Cryptography 2020: 654-675 - [c42]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. ICECCS 2020: 125-134 - [c41]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. ICSME 2020: 617-628 - [c40]Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li, Tegawendé F. Bissyandé:
KnowledgeZooClient: constructing knowledge graph for Android. ASE Workshops 2020: 73-78 - [c39]Huiyi Wang, Liu Wang, Haoyu Wang:
Market-level analysis of government-backed COVID-19 contact tracing apps. ASE Workshops 2020: 79-84 - [c38]Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. ASE 2020: 187-198 - [c37]Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. ASE 2020: 199-210 - [c36]Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? ASE 2020: 919-930 - [c35]Xu Xu, Yangyu Hu, Qian Guo, Ren He, Li Li, Guoai Xu, Zhihui Han, Haoyu Wang:
Dissecting Mobile Offerwall Advertisements: An Explorative Study. QRS 2020: 518-526 - [c34]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. SIGMETRICS (Abstracts) 2020: 83-84 - [c33]Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu:
A comprehensive study on challenges in deploying deep learning based software. ESEC/SIGSOFT FSE 2020: 750-762 - [c32]Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. ESEC/SIGSOFT FSE 2020: 914-926 - [c31]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. WWW 2020: 1715-1726 - [c30]Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, Guoai Xu:
Mobile App Squatting. WWW 2020: 1727-1738 - [i25]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. CoRR abs/2002.01656 (2020) - [i24]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Characterizing EOSIO Blockchain. CoRR abs/2002.05369 (2020) - [i23]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - [i22]Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, Guoai Xu:
Characterizing Cryptocurrency Exchange Scams. CoRR abs/2003.07314 (2020) - [i21]Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu:
Understanding Challenges in Deploying Deep Learning Based Software: An Empirical Study. CoRR abs/2005.00760 (2020) - [i20]Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, Guoai Xu:
Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. CoRR abs/2005.14619 (2020) - [i19]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. CoRR abs/2006.06419 (2020) - [i18]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. CoRR abs/2007.13639 (2020) - [i17]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. CoRR abs/2008.13768 (2020) - [i16]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang:
When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories. CoRR abs/2010.12218 (2020) - [i15]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i14]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020) - [i13]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. CoRR abs/2011.02673 (2020) - [i12]Yixue Zhao, Siwei Yin, Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang, Nenad Medvidovic:
Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms. CoRR abs/2011.04654 (2020) - [i11]Jinfeng Wen, Yi Liu, Zhenpeng Chen, Yun Ma, Haoyu Wang, Xuanzhe Liu:
Understanding Characteristics of Commodity Serverless Computing Platforms. CoRR abs/2012.00992 (2020) - [i10]Shuyu Zheng, Haoyu Wang, Lei Wu, Gang Huang, Xuanzhe Liu:
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts. CoRR abs/2012.01032 (2020) - [i9]Huiyi Wang, Liu Wang, Haoyu Wang:
Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps. CoRR abs/2012.10866 (2020) - [i8]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [j5]Guoai Xu, Chengpeng Zhang, Bowen Sun, Xinyu Yang, Yanhui Guo, Chengze Li, Haoyu Wang:
AppAuth: Authorship Attribution for Android App Clones. IEEE Access 7: 141850-141867 (2019) - [j4]Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein:
On Identifying and Explaining Similarities in Android Apps. J. Comput. Sci. Technol. 34(2): 437-455 (2019) - [j3]Li Li, Timothée Riom, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein, Yves Le Traon:
Revisiting the impact of common libraries for android-related investigations. J. Syst. Softw. 154: 157-175 (2019) - [c29]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CCS 2019: 549-566 - [c28]Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c27]Xiao Cheng, Haoyu Wang, Jiayi Hua, Miao Zhang, Guoai Xu, Li Yi, Yulei Sui:
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding. ICECCS 2019: 41-50 - [c26]Haoyu Wang, Xupu Wang, Yao Guo:
Characterizing the global mobile app developers: a large-scale empirical study. MOBILESoft@ICSE 2019: 150-161 - [c25]Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, Guoai Xu:
Deobfuscating Android native binary code. ICSE (Companion Volume) 2019: 322-323 - [c24]Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. ISC 2019: 299-318 - [c23]Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, Guoai Xu:
DaPanda: Detecting Aggressive Push Notifications in Android Apps. ASE 2019: 66-78 - [c22]Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, Yao Guo:
Characterizing Android App Signing Issues. ASE 2019: 280-292 - [c21]Haoyu Wang, Junjun Si, Hao Li, Yao Guo:
RmvDroid: towards a reliable Android malware dataset with app metadata. MSR 2019: 404-408 - [c20]Qian Guo, Haoyu Wang, Chenwei Zhang, Yao Guo, Guoai Xu:
AppNet: understanding app recommendation in Google Play. WAMA@ESEC/SIGSOFT FSE 2019: 19-25 - [c19]Yangyu Hu, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, Ren He:
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps. SANER 2019: 332-343 - [c18]Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, John Grundy:
Knowledge Graphing Git Repositories: A Preliminary Study. SANER 2019: 599-603 - [c17]Haoyu Wang, Hao Li, Yao Guo:
Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play. WWW 2019: 1988-1999 - [i7]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. CoRR abs/1905.00272 (2019) - [i6]Lijin Quan, Lei Wu, Haoyu Wang:
EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. CoRR abs/1906.10362 (2019) - [i5]Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, Daniel Xiapu Luo:
Automated Deobfuscation of Android Native Binary Code. CoRR abs/1907.06828 (2019) - [i4]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CoRR abs/1908.09343 (2019) - 2018
- [c16]Zeliang Kan, Haoyu Wang, Guoai Xu, Yao Guo, Xiangqun Chen:
Towards Light-Weight Deep Learning Based Malware Detection. COMPSAC (1) 2018: 600-609 - [c15]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. Internet Measurement Conference 2018: 293-307 - [c14]Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein:
CiD: automating the detection of API-related compatibility issues in Android apps. ISSTA 2018: 153-163 - [c13]Haoyu Wang, Hao Li, Li Li, Yao Guo, Guoai Xu:
Why are Android apps removed from Google Play?: a large-scale empirical study. MSR 2018: 231-242 - [c12]Chengpeng Zhang, Haoyu Wang, Ran Wang, Yao Guo, Guoai Xu:
Re-checking App Behavior against App Description in the Context of Third-party Libraries. SEKE 2018: 665-664 - [c11]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, Jacques Klein:
FraudDroid: automated ad fraud detection for Android apps. ESEC/SIGSOFT FSE 2018: 257-268 - [c10]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, Shaodong Zhang:
How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries? HotMobile 2018: 75-80 - [i3]Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. CoRR abs/1807.04901 (2018) - [i2]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. CoRR abs/1810.07780 (2018) - 2017
- [j2]Chengze Li, Haoyu Wang, Junfeng Wang, Qi Li, Jianbo Yu, Jingyi Guo, Guoai Xu, Yanhui Guo:
CRSPR: PageRank for Android Apps. IEEE Access 5: 18004-18015 (2017) - [j1]Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, Jason I. Hong:
Understanding the Purpose of Permission Use in Mobile Apps. ACM Trans. Inf. Syst. 35(4): 43:1-43:40 (2017) - [c9]Haoyu Wang, Yao Guo:
Understanding third-party libraries in mobile app analysis. ICSE (Companion Volume) 2017: 515-516 - [c8]Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, Jason I. Hong:
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective. WWW 2017: 163-172 - [i1]Feng Dong, Haoyu Wang, Yuanchun Li, Yao Guo, Li Li, Shaodong Zhang, Guoai Xu:
FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection. CoRR abs/1709.01213 (2017) - 2016
- [c7]Ziang Ma, Haoyu Wang, Yao Guo, Xiangqun Chen:
LibRadar: fast and accurate detection of third-party libraries in Android apps. ICSE (Companion Volume) 2016: 653-656 - [c6]Minxing Liu, Haoyu Wang, Yao Guo, Jason I. Hong:
Identifying and Analyzing the Privacy of Apps for Kids. HotMobile 2016: 105-110 - 2015
- [c5]Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai, Xiangqun Chen:
Reevaluating Android Permission Gaps with Static and Dynamic Analysis. GLOBECOM 2015: 1-6 - [c4]Haoyu Wang, Jason I. Hong, Yao Guo:
Using text mining to infer the purpose of permission use in mobile apps. UbiComp 2015: 1107-1118 - [c3]Haoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen:
WuKong: a scalable and accurate two-phase approach to Android app clone detection. ISSTA 2015: 71-82 - 2014
- [c2]Haoyu Wang, Mengxin Liu, Yao Guo, Xiangqun Chen:
Similarity-based web browser optimization. WWW 2014: 575-584 - 2013
- [c1]Haoyu Wang, Junjun Kong, Yao Guo, Xiangqun Chen:
Mobile Web Browser Optimizations in the Cloud Era: A Survey. SOSE 2013: 527-536
Coauthor Index
aka: Daniel Xiapu Luo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-19 04:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint