6 Publications
Demystifying the Dark Web Opioid Trade: Content Analysis on Anonymous Market Listings and Forum Posts.
Li, ZhengyiDu, XiangyuLiao, XiaojingJiang, Xiaoqian and Champagne-Langabeer, Tiffany
Journal of medical Internet research, vol. 23, (no. 2), pp. e24486, February 17, 2021. | Journal Article
Understanding Illicit UI in iOS apps Through Hidden UI Analysis
Lee, YeonjoonWang, XueqiangLiao, Xiaojing and Wang, XiaoFeng
IEEE Transactions on Dependable and Secure Computing, pp. 1, 20191030. | Journal Article
Cloud repository as a malicious service: challenge, identification and implication
Liao, XiaojingLiao, XiaojingAlrwais, SumayahAlrwais, SumayahYuan, KanYuan, KanXing, LuyiXing, LuyiWang, XiaoFengWang, XiaoFengHao, ShuangHao, ShuangBeyah, Raheem and Beyah, Raheem
Cybersecurity, vol. 1, (no. 1), pp. 18, 20181200. | Journal Article
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos
Bai, XiaolongBai, XiaolongXing, LuyiXing, LuyiZhang, NanZhang, NanWang, XiaoFengWang, XiaoFengLiao, XiaojingLiao, XiaojingLi, TongxinLi, TongxinHu, Shi-Min and Hu, Shi-Min
2017. | Journal Article
Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid
Liao, XiaojingSrinivasan, PreethiFormby, David and Beyah, A. Raheem
IEEE Transactions on Dependable and Secure Computing, pp. 1, 20170621. | Journal Article
Unauthorized Cross-App Resource Access on MAC OS X and iOS
Xing, LuyiXing, LuyiBai, XiaolongBai, XiaolongLi, TongxinLi, TongxinWang, XiaoFengWang, XiaoFengChen, KaiChen, KaiLiao, XiaojingLiao, XiaojingHu, Shi-MinHu, Shi-MinHan, Xinhui and Han, Xinhui
2015-05-26. | Journal Article