BibTeX records: Daoyuan Wu

download as .bib file

@inproceedings{DBLP:conf/eurosp/ZhangMWGYCWJ24,
  author       = {Zicheng Zhang and
                  Haoyu Ma and
                  Daoyuan Wu and
                  Debin Gao and
                  Xiao Yi and
                  Yufan Chen and
                  Yan Wu and
                  Lingxiao Jiang},
  title        = {MtdScout: Complementing the Identification of Insecure Methods in
                  Android Apps via Source-to-Bytecode Signature Generation and Tree-based
                  Layered Search},
  booktitle    = {9th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2024, Vienna, Austria, July 8-12, 2024},
  pages        = {724--740},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuroSP60621.2024.00045},
  doi          = {10.1109/EUROSP60621.2024.00045},
  timestamp    = {Thu, 05 Sep 2024 16:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ZhangMWGYCWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LiW0L0WG024,
  author       = {Zongjie Li and
                  Chaozheng Wang and
                  Pingchuan Ma and
                  Chaowei Liu and
                  Shuai Wang and
                  Daoyuan Wu and
                  Cuiyun Gao and
                  Yang Liu},
  title        = {On Extracting Specialized Code Abilities from Large Language Models:
                  {A} Feasibility Study},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {74:1--74:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3639091},
  doi          = {10.1145/3597503.3639091},
  timestamp    = {Mon, 24 Jun 2024 15:20:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LiW0L0WG024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/0001WXLWXX024,
  author       = {Yuqiang Sun and
                  Daoyuan Wu and
                  Yue Xue and
                  Han Liu and
                  Haijun Wang and
                  Zhengzi Xu and
                  Xiaofei Xie and
                  Yang Liu},
  title        = {GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining
                  {GPT} with Program Analysis},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {166:1--166:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3639117},
  doi          = {10.1145/3597503.3639117},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/0001WXLWXX024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuW0WL0C24,
  author       = {Han Liu and
                  Daoyuan Wu and
                  Yuqiang Sun and
                  Haijun Wang and
                  Kaixuan Li and
                  Yang Liu and
                  Yixiang Chen},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {Using My Functions Should Follow My Checks: Understanding and Detecting
                  Insecure OpenZeppelin Code in Smart Contracts},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/liu-han},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiuW0WL0C24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-16185,
  author       = {Yuqiang Sun and
                  Daoyuan Wu and
                  Yue Xue and
                  Han Liu and
                  Wei Ma and
                  Lyuye Zhang and
                  Miaolei Shi and
                  Yang Liu},
  title        = {LLM4Vuln: {A} Unified Evaluation Framework for Decoupling and Enhancing
                  LLMs' Vulnerability Reasoning},
  journal      = {CoRR},
  volume       = {abs/2401.16185},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.16185},
  doi          = {10.48550/ARXIV.2401.16185},
  eprinttype    = {arXiv},
  eprint       = {2401.16185},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-16185.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15727,
  author       = {Daoyuan Wu and
                  Shuai Wang and
                  Yang Liu and
                  Ning Liu},
  title        = {LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner:
                  {A} Vision Paper},
  journal      = {CoRR},
  volume       = {abs/2402.15727},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15727},
  doi          = {10.48550/ARXIV.2402.15727},
  eprinttype    = {arXiv},
  eprint       = {2402.15727},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15727.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-02716,
  author       = {Xiuting Ge and
                  Chunrong Fang and
                  Quanjun Zhang and
                  Daoyuan Wu and
                  Bowen Yu and
                  Qirui Zheng and
                  An Guo and
                  Shangwei Lin and
                  Zhihong Zhao and
                  Yang Liu and
                  Zhenyu Chen},
  title        = {Pre-trained Model-based Actionable Warning Identification: {A} Feasibility
                  Study},
  journal      = {CoRR},
  volume       = {abs/2403.02716},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.02716},
  doi          = {10.48550/ARXIV.2403.02716},
  eprinttype    = {arXiv},
  eprint       = {2403.02716},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-02716.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-06838,
  author       = {Lyuye Zhang and
                  Kaixuan Li and
                  Kairan Sun and
                  Daoyuan Wu and
                  Ye Liu and
                  Haoye Tian and
                  Yang Liu},
  title        = {{ACFIX:} Guiding LLMs with Mined Common {RBAC} Practices for Context-Aware
                  Repair of Access Control Vulnerabilities in Smart Contracts},
  journal      = {CoRR},
  volume       = {abs/2403.06838},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.06838},
  doi          = {10.48550/ARXIV.2403.06838},
  eprinttype    = {arXiv},
  eprint       = {2403.06838},
  timestamp    = {Wed, 28 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-06838.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-16073,
  author       = {Wei Ma and
                  Daoyuan Wu and
                  Yuqiang Sun and
                  Tianwen Wang and
                  Shangqing Liu and
                  Jian Zhang and
                  Yue Xue and
                  Yang Liu},
  title        = {Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract
                  Auditing with Justifications},
  journal      = {CoRR},
  volume       = {abs/2403.16073},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.16073},
  doi          = {10.48550/ARXIV.2403.16073},
  eprinttype    = {arXiv},
  eprint       = {2403.16073},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-16073.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-13945,
  author       = {Liwen Wang and
                  Yuanyuan Yuan and
                  Ao Sun and
                  Zongjie Li and
                  Pingchuan Ma and
                  Daoyuan Wu and
                  Shuai Wang},
  title        = {How do LLMs Support Deep Learning Testing? {A} Comprehensive Study
                  Through the Lens of Image Mutation},
  journal      = {CoRR},
  volume       = {abs/2404.13945},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.13945},
  doi          = {10.48550/ARXIV.2404.13945},
  eprinttype    = {arXiv},
  eprint       = {2404.13945},
  timestamp    = {Sat, 25 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-13945.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-17833,
  author       = {Zhenlan Ji and
                  Daoyuan Wu and
                  Pingchuan Ma and
                  Zongjie Li and
                  Shuai Wang},
  title        = {Testing and Understanding Erroneous Planning in {LLM} Agents through
                  Synthesized User Inputs},
  journal      = {CoRR},
  volume       = {abs/2404.17833},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.17833},
  doi          = {10.48550/ARXIV.2404.17833},
  eprinttype    = {arXiv},
  eprint       = {2404.17833},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-17833.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-02580,
  author       = {Ye Liu and
                  Yue Xue and
                  Daoyuan Wu and
                  Yuqiang Sun and
                  Yi Li and
                  Miaolei Shi and
                  Yang Liu},
  title        = {PropertyGPT: LLM-driven Formal Verification of Smart Contracts through
                  Retrieval-Augmented Property Generation},
  journal      = {CoRR},
  volume       = {abs/2405.02580},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.02580},
  doi          = {10.48550/ARXIV.2405.02580},
  eprinttype    = {arXiv},
  eprint       = {2405.02580},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-02580.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-05498,
  author       = {Xunguang Wang and
                  Daoyuan Wu and
                  Zhenlan Ji and
                  Zongjie Li and
                  Pingchuan Ma and
                  Shuai Wang and
                  Yingjiu Li and
                  Yang Liu and
                  Ning Liu and
                  Juergen Rahmel},
  title        = {SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical
                  Manner},
  journal      = {CoRR},
  volume       = {abs/2406.05498},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.05498},
  doi          = {10.48550/ARXIV.2406.05498},
  eprinttype    = {arXiv},
  eprint       = {2406.05498},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-05498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/FangWYWCCLJ23,
  author       = {Yuzhou Fang and
                  Daoyuan Wu and
                  Xiao Yi and
                  Shuai Wang and
                  Yufan Chen and
                  Mengjie Chen and
                  Yang Liu and
                  Lingxiao Jiang},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {Beyond "Protected" and "Private": An Empirical
                  Security Analysis of Custom Function Modifiers in Smart Contracts},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {1157--1168},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598125},
  doi          = {10.1145/3597926.3598125},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/FangWYWCCLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YiFWJ23,
  author       = {Xiao Yi and
                  Yuzhou Fang and
                  Daoyuan Wu and
                  Lingxiao Jiang},
  title        = {BlockScope: Detecting and Investigating Propagated Vulnerabilities
                  in Forked Blockchain Projects},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/blockscope-detecting-and-investigating-propagated-vulnerabilities-in-forked-blockchain-projects/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/YiFWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-03012,
  author       = {Zongjie Li and
                  Chaozheng Wang and
                  Pingchuan Ma and
                  Chaowei Liu and
                  Shuai Wang and
                  Daoyuan Wu and
                  Cuiyun Gao},
  title        = {On the Feasibility of Specialized Ability Extracting for Large Language
                  Code Models},
  journal      = {CoRR},
  volume       = {abs/2303.03012},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.03012},
  doi          = {10.48550/ARXIV.2303.03012},
  eprinttype    = {arXiv},
  eprint       = {2303.03012},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-03012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-03314,
  author       = {Yuqiang Sun and
                  Daoyuan Wu and
                  Yue Xue and
                  Han Liu and
                  Haijun Wang and
                  Zhengzi Xu and
                  Xiaofei Xie and
                  Yang Liu},
  title        = {When {GPT} Meets Program Analysis: Towards Intelligent Detection of
                  Smart Contract Logic Vulnerabilities in GPTScan},
  journal      = {CoRR},
  volume       = {abs/2308.03314},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.03314},
  doi          = {10.48550/ARXIV.2308.03314},
  eprinttype    = {arXiv},
  eprint       = {2308.03314},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-03314.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-01432,
  author       = {Zongjie Li and
                  Chaozheng Wang and
                  Pingchuan Ma and
                  Daoyuan Wu and
                  Shuai Wang and
                  Cuiyun Gao and
                  Yang Liu},
  title        = {Split and Merge: Aligning Position Biases in Large Language Model
                  based Evaluators},
  journal      = {CoRR},
  volume       = {abs/2310.01432},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.01432},
  doi          = {10.48550/ARXIV.2310.01432},
  eprinttype    = {arXiv},
  eprint       = {2310.01432},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-01432.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00324,
  author       = {Xiuting Ge and
                  Chunrong Fang and
                  Xuanye Li and
                  Weisong Sun and
                  Daoyuan Wu and
                  Juan Zhai and
                  Shangwei Lin and
                  Zhihong Zhao and
                  Yang Liu and
                  Zhenyu Chen},
  title        = {Machine Learning for Actionable Warning Identification: {A} Comprehensive
                  Survey},
  journal      = {CoRR},
  volume       = {abs/2312.00324},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00324},
  doi          = {10.48550/ARXIV.2312.00324},
  eprinttype    = {arXiv},
  eprint       = {2312.00324},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00324.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-04087,
  author       = {Zongjie Li and
                  Chaozheng Wang and
                  Chaowei Liu and
                  Pingchuan Ma and
                  Daoyuan Wu and
                  Shuai Wang and
                  Cuiyun Gao},
  title        = {{VRPTEST:} Evaluating Visual Referring Prompting in Large Multimodal
                  Models},
  journal      = {CoRR},
  volume       = {abs/2312.04087},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.04087},
  doi          = {10.48550/ARXIV.2312.04087},
  eprinttype    = {arXiv},
  eprint       = {2312.04087},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-04087.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaLGWJJ22,
  author       = {Haoyu Ma and
                  Shijia Li and
                  Debin Gao and
                  Daoyuan Wu and
                  Qiaowen Jia and
                  Chunfu Jia},
  title        = {Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3508--3520},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3100877},
  doi          = {10.1109/TDSC.2021.3100877},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaLGWJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SunSRWZ22,
  author       = {Menghan Sun and
                  Zirui Song and
                  Xiaoxi Ren and
                  Daoyuan Wu and
                  Kehuan Zhang},
  title        = {LiCA: {A} Fine-grained and Path-sensitive Linux Capability Analysis
                  Framework},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {364--379},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545966},
  doi          = {10.1145/3545948.3545966},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SunSRWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/YiWJFZZ22,
  author       = {Xiao Yi and
                  Daoyuan Wu and
                  Lingxiao Jiang and
                  Yuzhou Fang and
                  Kehuan Zhang and
                  Wei Zhang},
  editor       = {Abhik Roychoudhury and
                  Cristian Cadar and
                  Miryung Kim},
  title        = {An empirical study of blockchain system vulnerabilities: modules,
                  types, and patterns},
  booktitle    = {Proceedings of the 30th {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022},
  pages        = {709--721},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3540250.3549105},
  doi          = {10.1145/3540250.3549105},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/YiWJFZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-13356,
  author       = {Xu Yang and
                  Daoyuan Wu and
                  Xiao Yi and
                  Jimmy H. M. Lee and
                  Tan Lee},
  title        = {iExam: {A} Novel Online Exam Monitoring and Analysis System Based
                  on Face Detection and Recognition},
  journal      = {CoRR},
  volume       = {abs/2206.13356},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.13356},
  doi          = {10.48550/ARXIV.2206.13356},
  eprinttype    = {arXiv},
  eprint       = {2206.13356},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-13356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-00205,
  author       = {Xiao Yi and
                  Yuzhou Fang and
                  Daoyuan Wu and
                  Lingxiao Jiang},
  title        = {BlockScope: Detecting and Investigating Propagated Vulnerabilities
                  in Forked Blockchain Projects},
  journal      = {CoRR},
  volume       = {abs/2208.00205},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.00205},
  doi          = {10.48550/ARXIV.2208.00205},
  eprinttype    = {arXiv},
  eprint       = {2208.00205},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-00205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01568,
  author       = {Zicheng Zhang and
                  Daoyuan Wu and
                  Lixiang Li and
                  Debin Gao},
  title        = {On the Usability (In)Security of In-App Browsing Interfaces in Mobile
                  Apps},
  journal      = {CoRR},
  volume       = {abs/2209.01568},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01568},
  doi          = {10.48550/ARXIV.2209.01568},
  eprinttype    = {arXiv},
  eprint       = {2209.01568},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/WuGL21,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  David Lo},
  title        = {Scalable online vetting of Android apps for measuring declared {SDK}
                  versions and their consistency with {API} calls},
  journal      = {Empir. Softw. Eng.},
  volume       = {26},
  number       = {1},
  pages        = {7},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10664-020-09897-6},
  doi          = {10.1007/S10664-020-09897-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/WuGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MaTQLGWJB21,
  author       = {Haoyu Ma and
                  Jianwen Tian and
                  Kefan Qiu and
                  David Lo and
                  Debin Gao and
                  Daoyuan Wu and
                  Chunfu Jia and
                  Thar Baker},
  title        = {Deep-Learning-Based App Sensitive Behavior Surveillance for Android
                  Powered Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {8},
  pages        = {5840--5850},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3038745},
  doi          = {10.1109/TII.2020.3038745},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/MaTQLGWJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WuGDC21,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Robert H. Deng and
                  Rocky K. C. Chang},
  title        = {When Program Analysis Meets Bytecode Search: Targeted and Efficient
                  Inter-procedural Analysis of Modern Android Apps in BackDroid},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {543--554},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00063},
  doi          = {10.1109/DSN48987.2021.00063},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WuGDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-06454,
  author       = {Mengjie Chen and
                  Daoyuan Wu and
                  Xiao Yi and
                  Jianliang Xu},
  title        = {AGChain: {A} Blockchain-based Gateway for Permanent, Distributed,
                  and Secure App Delegation from Existing Mobile App Markets},
  journal      = {CoRR},
  volume       = {abs/2101.06454},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.06454},
  eprinttype    = {arXiv},
  eprint       = {2101.06454},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-06454.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-12162,
  author       = {Xiao Yi and
                  Daoyuan Wu and
                  Lingxiao Jiang and
                  Kehuan Zhang and
                  Wei Zhang},
  title        = {Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain
                  System Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/2110.12162},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.12162},
  eprinttype    = {arXiv},
  eprint       = {2110.12162},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-12162.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/HeWD20,
  author       = {En He and
                  Daoyuan Wu and
                  Robert H. Deng},
  editor       = {Cl{\'{e}}mentine Maurice and
                  Leyla Bilge and
                  Gianluca Stringhini and
                  Nuno Neves},
  title        = {Understanding Android VoIP Security: {A} System-Level Vulnerability
                  Assessment},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 17th International Conference, {DIMVA} 2020, Lisbon, Portugal, June
                  24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12223},
  pages        = {110--131},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-52683-2\_6},
  doi          = {10.1007/978-3-030-52683-2\_6},
  timestamp    = {Sun, 25 Jul 2021 11:49:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/HeWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11527,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Robert H. Deng and
                  Rocky K. C. Chang},
  title        = {When Program Analysis Meets Bytecode Search: Targeted and Efficient
                  Inter-procedural Analysis of Modern Android Apps in BackDroid},
  journal      = {CoRR},
  volume       = {abs/2005.11527},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11527},
  eprinttype    = {arXiv},
  eprint       = {2005.11527},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11527.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuGCCJD19,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Eric K. T. Cheng and
                  Yichen Cao and
                  Jintao Jiang and
                  Robert H. Deng},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Towards Understanding Android System Vulnerabilities: Techniques and
                  Insights},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {295--306},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329831},
  doi          = {10.1145/3321705.3329831},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuGCCJD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZhangLWJCGWM19,
  author       = {Shiwei Zhang and
                  Weichao Li and
                  Daoyuan Wu and
                  Bo Jin and
                  Rocky K. C. Chang and
                  Debin Gao and
                  Yi Wang and
                  Ricky K. P. Mok},
  title        = {An empirical study of mobile network behavior and application performance
                  in the wild},
  booktitle    = {Proceedings of the International Symposium on Quality of Service,
                  IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3326285.3329039},
  doi          = {10.1145/3326285.3329039},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/ZhangLWJCGWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuGCHCD19,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Rocky K. C. Chang and
                  En He and
                  Eric K. T. Cheng and
                  Robert H. Deng},
  title        = {Understanding Open Ports in Android Applications: Discovery, Diagnosis,
                  and Security Assessment},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/understanding-open-ports-in-android-applications-discovery-diagnosis-and-security-assessment/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WuGCHCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12982,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  David Lo},
  title        = {Scalable Online Vetting of Android Apps for Measuring Declared {SDK}
                  Versions and Their Consistency with {API} Calls},
  journal      = {CoRR},
  volume       = {abs/1912.12982},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12982},
  eprinttype    = {arXiv},
  eprint       = {1912.12982},
  timestamp    = {Sat, 04 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12982.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiWCM18,
  author       = {Weichao Li and
                  Daoyuan Wu and
                  Rocky K. C. Chang and
                  Ricky K. P. Mok},
  title        = {Toward Accurate Network Delay Measurement on Android Phones},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {717--732},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMC.2017.2737990},
  doi          = {10.1109/TMC.2017.2737990},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LiWCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/WuCGLD18,
  author       = {Daoyuan Wu and
                  Yao Cheng and
                  Debin Gao and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking
                  in Android Applications},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {299--306},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176336},
  doi          = {10.1145/3176258.3176336},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/WuCGLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Tang0WG18,
  author       = {Xiaoxiao Tang and
                  Yan Lin and
                  Daoyuan Wu and
                  Debin Gao},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Towards Dynamically Monitoring Android Applications on Non-rooted
                  Devices in the Wild},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {212--223},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212504},
  doi          = {10.1145/3212480.3212504},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Tang0WG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-04372,
  author       = {Daoyuan Wu and
                  Yao Cheng and
                  Debin Gao and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {SCLib: {A} Practical and Lightweight Defense against Component Hijacking
                  in Android Applications},
  journal      = {CoRR},
  volume       = {abs/1801.04372},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.04372},
  eprinttype    = {arXiv},
  eprint       = {1801.04372},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-04372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/WuCLCG17,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang and
                  Weichao Li and
                  Eric K. T. Cheng and
                  Debin Gao},
  editor       = {Dilma Da Silva and
                  Bryan Ford},
  title        = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance},
  booktitle    = {Proceedings of the 2017 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {445--457},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/wu},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/WuCLCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/WuLXLG17,
  author       = {Daoyuan Wu and
                  Ximing Liu and
                  Jiayun Xu and
                  David Lo and
                  Debin Gao},
  editor       = {Liran Ma and
                  Abdallah Khreishah and
                  Yan Zhang and
                  Mingyuan Yan},
  title        = {Measuring the Declared {SDK} Versions and Their Consistency with {API}
                  Calls in Android Apps},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 12th International
                  Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10251},
  pages        = {678--690},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60033-8\_58},
  doi          = {10.1007/978-3-319-60033-8\_58},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/WuLXLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLXLG17,
  author       = {Daoyuan Wu and
                  Ximing Liu and
                  Jiayun Xu and
                  David Lo and
                  Debin Gao},
  title        = {Measuring the Declared {SDK} Versions and Their Consistency with {API}
                  Calls in Android Apps},
  journal      = {CoRR},
  volume       = {abs/1702.04872},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.04872},
  eprinttype    = {arXiv},
  eprint       = {1702.04872},
  timestamp    = {Sat, 15 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLXLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuCLCG17,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang and
                  Weichao Li and
                  Eric K. T. Cheng and
                  Debin Gao},
  title        = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance},
  journal      = {CoRR},
  volume       = {abs/1703.07551},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.07551},
  eprinttype    = {arXiv},
  eprint       = {1703.07551},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuCLCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/LiWCM16,
  author       = {Weichao Li and
                  Daoyuan Wu and
                  Rocky K. C. Chang and
                  Ricky K. P. Mok},
  editor       = {Athina Markopoulou and
                  Michalis Faloutsos and
                  Vyas Sekar and
                  Dejan Kostic},
  title        = {Demystifying and Puncturing the Inflated Delay in Smartphone-based
                  WiFi Network Measurement},
  booktitle    = {Proceedings of the 12th International on Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA,
                  December 12-15, 2016},
  pages        = {497--504},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2999572.2999595},
  doi          = {10.1145/2999572.2999595},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/LiWCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuGLD16,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {SecComp: Towards Practically Defending Against Component Hijacking
                  in Android Applications},
  journal      = {CoRR},
  volume       = {abs/1609.03322},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.03322},
  eprinttype    = {arXiv},
  eprint       = {1609.03322},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuGLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLCG16,
  author       = {Daoyuan Wu and
                  Weichao Li and
                  Rocky K. C. Chang and
                  Debin Gao},
  title        = {MopEye: Monitoring Per-app Network Performance with Zero Measurement
                  Traffic},
  journal      = {CoRR},
  volume       = {abs/1610.01282},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.01282},
  eprinttype    = {arXiv},
  eprint       = {1610.01282},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiangMWTGPJZ15,
  author       = {Yu Liang and
                  Xinjie Ma and
                  Daoyuan Wu and
                  Xiaoxiao Tang and
                  Debin Gao and
                  Guojun Peng and
                  Chunfu Jia and
                  Huanguo Zhang},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Stack Layout Randomization with Minimal Rewriting of Android Binaries},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {229--245},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_15},
  doi          = {10.1007/978-3-319-30840-1\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiangMWTGPJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiMWC15,
  author       = {Weichao Li and
                  Ricky K. P. Mok and
                  Daoyuan Wu and
                  Rocky K. C. Chang},
  title        = {On the accuracy of smartphone-based mobile network measurement},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {370--378},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218402},
  doi          = {10.1109/INFOCOM.2015.7218402},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiMWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuC15,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang},
  title        = {Indirect File Leaks in Mobile Applications},
  journal      = {CoRR},
  volume       = {abs/1511.00104},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00104},
  eprinttype    = {arXiv},
  eprint       = {1511.00104},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WuC14,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Analyzing Android Browser Apps for file: // Vulnerabilities},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {345--363},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_20},
  doi          = {10.1007/978-3-319-13257-0\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuC14,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang},
  title        = {Analyzing Android Browser Apps for file: // Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/1404.4553},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.4553},
  eprinttype    = {arXiv},
  eprint       = {1404.4553},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLC14,
  author       = {Daoyuan Wu and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  title        = {A Sink-driven Approach to Detecting Exposed Component Vulnerabilities
                  in Android Apps},
  journal      = {CoRR},
  volume       = {abs/1405.6282},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.6282},
  eprinttype    = {arXiv},
  eprint       = {1405.6282},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}