default search action
Quanqi Ye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c11]Balachandar Gowrisankar, Daisuke Mashima, Wen Shei Ong, Quanqi Ye, Ertem Esiner, Binbin Chen, Zbigniew Kalbarczyk:
GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone. CNS 2022: 100-108
2010 – 2019
- 2019
- [c10]Chenkai Guo, Yifan Xu, Xiaolei Hou, Naipeng Dong, Jing Xu, Quanqi Ye:
Deep Attentive Factorization Machine for App Recommendation Service. ICWS 2019: 134-138 - [c9]Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. ISC 2019: 299-318 - [c8]Chenkai Guo, Dengrong Huang, Naipeng Dong, Quanqi Ye, Jing Xu, Yaqing Fan, Hui Yang, Yifan Xu:
Deep Review Sharing. SANER 2019: 61-72 - [c7]Chenkai Guo, Weijing Wang, Yanfeng Wu, Naipeng Dong, Quanqi Ye, Jing Xu, Sen Zhang:
Systematic Comprehension for Developer Reply in Mobile System Forum. SANER 2019: 242-252 - 2018
- [j2]Guangdong Bai, Quanqi Ye, Yongzheng Wu, Heila Botha, Jun Sun, Yang Liu, Jin Song Dong, Willem Visser:
Towards Model Checking Android Applications. IEEE Trans. Software Eng. 44(6): 595-612 (2018) - 2017
- [j1]Chuyu She, Wushao Wen, Quanqi Ye, Kesong Zheng:
Vulnerable Path Attack and its Detection. KSII Trans. Internet Inf. Syst. 11(4): 2149-2170 (2017) - [c6]Chenkai Guo, Naipeng Dong, Guangdong Bai, Quanqi Ye, Jin Song Dong, Jing Xu, Guannan Si:
App genome: callback sequencing in Android. ICSE (Companion Volume) 2017: 149-151 - [c5]Quanqi Ye, Guangdong Bai, Naipeng Dong, Jin Song Dong:
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols. SecureComm 2017: 469-488 - 2016
- [c4]Chenkai Guo, Quanqi Ye, Naipeng Dong, Guangdong Bai, Jin Song Dong, Jing Xu:
Automatic Construction of Callback Model for Android Application. ICECCS 2016: 231-234 - 2015
- [c3]Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo:
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. ICECCS 2015: 60-69 - [c2]Quanqi Ye, Guangdong Bai, Kailong Wang, Jin Song Dong:
Formal Analysis of a Single Sign-On Protocol Implementation for Android. ICECCS 2015: 90-99 - [c1]Quanqi Ye:
Analyzing Security Property of Android Application Implementation Using Formal Method. ICECCS 2015: 214-217
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint