Faketagger: Robust safeguards against deepfake dissemination via provenance tracking R Wang, F Juefei-Xu, M Luo, Y Liu, L Wang Proceedings of the 29th ACM International Conference on Multimedia, 3546-3555, 2021 | 45 | 2021 |
Hindsight: Understanding the evolution of ui vulnerabilities in mobile browsers M Luo, O Starov, N Honarmand, N Nikiforakis Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 45 | 2017 |
Time does not heal all wounds: A longitudinal analysis of security-mechanism support in mobile browsers M Luo, P Laperdrix, N Honarmand, N Nikiforakis Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019 | 36 | 2019 |
位置大数据的价值提取与协同挖掘方法 郭迟, 刘经南, 方媛, 罗梦, 崔竞松 软件学报 25 (4), 713-730, 2014 | 25 | 2014 |
Consensus-clustering-based automatic distribution matching for cross-domain image steganalysis J Jia, M Luo, S Ma, L Wang, Y Liu IEEE Transactions on Knowledge and Data Engineering 35 (6), 5665-5679, 2022 | 10 | 2022 |
Where are you taking me? understanding abusive traffic distribution systems J Szurdi, M Luo, B Kondracki, N Nikiforakis, N Christin Proceedings of the Web Conference 2021, 3613-3624, 2021 | 8 | 2021 |
Need for mobile speed: A historical analysis of mobile web performance J Nejati, M Luo, N Nikiforakis, A Balasubramanian TMA, 2020 | 8 | 2020 |
Multiperspective progressive structure adaptation for JPEG steganography detection across domains J Jia, M Luo, J Liu, W Ren, L Wang IEEE Transactions on Neural Networks and Learning Systems 33 (8), 3660-3674, 2021 | 7 | 2021 |
Partial knowledge transfer in visual recognition systems via joint loss-aware consistency learning J Jia, M Luo, S Ma, L Wang IEEE Transactions on Industrial Informatics 18 (11), 7463-7474, 2022 | 4 | 2022 |
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers M Luo, B Feng, L Lu, E Kirda, K Ren IEEE Transactions on Dependable and Secure Computing, 2023 | 3 | 2023 |
Active or inactive: infer private user information in location-based social network G Chi, L Meng, L Xuan, C Jingsong International Journal of Embedded Systems 8 (2-3), 185-195, 2016 | 3 | 2016 |
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis B Feng, M Luo, C Liu, L Lu, E Kirda IEEE Transactions on Dependable and Secure Computing, 2023 | 1 | 2023 |
Evaluating Mobile-Browser Security with Dynamic Analysis Techniques M Luo State University of New York at Stony Brook, 2020 | | 2020 |