Follow
Wu Zhou
Wu Zhou
Didi Labs
Verified email at didichuxing.com
Title
Cited by
Cited by
Year
Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.
Y Zhou, Z Wang, W Zhou, X Jiang
NDSS 25 (4), 50-52, 2012
12422012
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
8962012
Unsafe exposure analysis of mobile in-app advertisements
MC Grace, W Zhou, X Jiang, AR Sadeghi
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
7092012
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
5392017
Fast, scalable detection of" piggybacked" mobile applications
W Zhou, Y Zhou, M Grace, X Jiang, S Zou
Proceedings of the third ACM conference on Data and application security and …, 2013
3212013
AppInk: watermarking android apps for repackaging deterrence
W Zhou, X Zhang, X Jiang
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
1622013
{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning
R Wang, W Enck, D Reeves, X Zhang, P Ning, D Xu, W Zhou, AM Azab
24th USENIX Security Symposium (USENIX Security 15), 351-366, 2015
942015
Always up-to-date: scalable offline patching of vm images in a compute cloud
W Zhou, P Ning, X Zhang, G Ammons, R Wang, V Bala
Proceedings of the 26th annual computer security applications conference …, 2010
682010
Divilar: Diversifying intermediate language for anti-repackaging on android platform
W Zhou, Z Wang, Y Zhou, X Jiang
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
612014
Method and system for implementing watchpoints
Z Wu, DE Ren, HB Peng, JD Sun
US Patent App. 11/944,703, 2008
302008
Android malware development on public malware scanning platforms: A large-scale data-driven study
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang
2016 IEEE International Conference on Big Data (Big Data), 1090-1099, 2016
272016
Learning from big malwares
L Song, H Huang, W Zhou, W Wu, Y Zhang
Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 1-8, 2016
152016
A large-scale study of android malware development phenomenon on public malware submission and scanning platform
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, I Molloy, S Chari, ...
IEEE Transactions on Big Data 7 (2), 255-270, 2018
142018
Slembunk: An evolving Android Trojan family targeting users of worldwide banking apps
W Zhou, Z Chen, J Su, J Xie, H Huang
Retrieved from FireEye: https://www. fireeye. com/blog/threat-research/2015 …, 2015
32015
System and method for program security protection
W Zhou
US Patent 10,089,448, 2018
22018
Repackaged smartphone applications: Threats and defenses
W Zhou
North Carolina State University, 2013
22013
System and method for program security protection
W Zhou
US Patent 10,853,457, 2020
2020
Unsafe Exposure Analysis of Mobile In-App Advertisements
X Jiang, M Grace, AR Sadeghi, W Zhou
ACM, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–18