


default search action
Ming Fan 0002
Person information
- affiliation: Xi'an Jiaotong University, China
Other persons with the same name
- Ming Fan — disambiguation page
- Ming Fan 0001 — Broadcom Ltd., San Jose, CA, USA (and 1 more)
- Ming Fan 0003 ![0000-0002-5626-7076 [0000-0002-5626-7076]](https://dblp.dagstuhl.de/img/orcid-mark.12x12.png) — Hangzhou Dianzi University, Hangzhou, China — Hangzhou Dianzi University, Hangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j20]Songyang Yan [j20]Songyang Yan , Xiaodong Zhang , Xiaodong Zhang , Kunkun Hao , Kunkun Hao , Haojie Xin , Haojie Xin , Yonggang Luo , Yonggang Luo , Jucheng Yang , Jucheng Yang , Ming Fan , Ming Fan , Chao Yang , Chao Yang , Jun Sun , Jun Sun , Zijiang Yang , Zijiang Yang : :
 On-Demand Scenario Generation for Testing Automated Driving Systems. Proc. ACM Softw. Eng. 2(FSE): 86-105 (2025)
 [c37]Nan Hu, Ming Fan, Jingyi Lei, Jiaying He, Zhe Hou: [c37]Nan Hu, Ming Fan, Jingyi Lei, Jiaying He, Zhe Hou:
 ELDetector: An Automated Approach Detecting Endless-loop in Mini Programs. Forge@ICSE 2025: 104-112
 [c36]Wuxia Jin, Jiaowei Shang, Jianguo Zheng, Mengjie Sun, Zhenyu Huang, Ming Fan, Ting Liu: [c36]Wuxia Jin, Jiaowei Shang, Jianguo Zheng, Mengjie Sun, Zhenyu Huang, Ming Fan, Ting Liu:
 The Design Smells Breaking the Boundary between Android Variants and AOSP. ICSE 2025: 2764-2776
 [i19]Jiali Wei, Ming Fan, Xicheng Zhang, Wenjing Jiao, Haijun Wang, Ting Liu: [i19]Jiali Wei, Ming Fan, Xicheng Zhang, Wenjing Jiao, Haijun Wang, Ting Liu:
 Stealthy Backdoor Attack to Real-world Models in Android Apps. CoRR abs/2501.01263 (2025)
 [i18]Songyang Yan, Xiaodong Zhang, Kunkun Hao, Haojie Xin, Yonggang Luo, Jucheng Yang, Ming Fan, Chao Yang, Jun Sun, Zijiang Yang: [i18]Songyang Yan, Xiaodong Zhang, Kunkun Hao, Haojie Xin, Yonggang Luo, Jucheng Yang, Ming Fan, Chao Yang, Jun Sun, Zijiang Yang:
 On-Demand Scenario Generation for Testing Automated Driving Systems. CoRR abs/2505.14053 (2025)
 [i17]Hao Wu, Haijun Wang, Shangwang Li, Yin Wu, Ming Fan, Yitao Zhao, Ting Liu: [i17]Hao Wu, Haijun Wang, Shangwang Li, Yin Wu, Ming Fan, Yitao Zhao, Ting Liu:
 Detecting State Manipulation Vulnerabilities in Smart Contracts Using LLM and Static Analysis. CoRR abs/2506.08561 (2025)
 [i16]Yu Wang, Shiwan Zhao, Zhihu Wang, Yubo Zhang, Xicheng Zhang, Zhengfan Wang, Heyuan Huang, Ming Fan, Ting Liu: [i16]Yu Wang, Shiwan Zhao, Zhihu Wang, Yubo Zhang, Xicheng Zhang, Zhengfan Wang, Heyuan Huang, Ming Fan, Ting Liu:
 RAG+: Enhancing Retrieval-Augmented Generation with Application-Aware Reasoning. CoRR abs/2506.11555 (2025)
 [i15]Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu: [i15]Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu:
 ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis. CoRR abs/2506.15790 (2025)
 [i14]Hao Wu, Haijun Wang, Shangwang Li, Yin Wu, Ming Fan, Wuxia Jin, Yitao Zhao, Ting Liu: [i14]Hao Wu, Haijun Wang, Shangwang Li, Yin Wu, Ming Fan, Wuxia Jin, Yitao Zhao, Ting Liu:
 RPHunter: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis. CoRR abs/2506.18398 (2025)
- 2024
 [j19]Yin Wang, Ming Fan, Junjie Tao, Jingyi Lei, Wuxia Jin, Deqiang Han, Ting Liu: [j19]Yin Wang, Ming Fan, Junjie Tao, Jingyi Lei, Wuxia Jin, Deqiang Han, Ting Liu:
 Compliance Detection Method for Mobile Application Privacy Policy Statement. Int. J. Softw. Informatics 14(3): 277-299 (2024)
 [j18]Jiali Wei [j18]Jiali Wei , Ming Fan , Ming Fan , Wenjing Jiao , Wenjing Jiao , Wuxia Jin , Wuxia Jin , Ting Liu , Ting Liu : :
 BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing. IEEE Trans. Inf. Forensics Secur. 19: 4285-4300 (2024)
 [j17]Jingwen Liu [j17]Jingwen Liu , Wuxia Jin , Wuxia Jin , Junhui Zhou , Junhui Zhou , Qiong Feng , Qiong Feng , Ming Fan , Ming Fan , Haijun Wang , Haijun Wang , Ting Liu , Ting Liu : :
 3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency. IEEE Trans. Software Eng. 50(10): 2633-2655 (2024)
 [j16]Yin Wang [j16]Yin Wang , Ming Fan , Ming Fan , Junfeng Liu , Junfeng Liu , Junjie Tao , Junjie Tao , Wuxia Jin , Wuxia Jin , Haijun Wang , Haijun Wang , Qi Xiong , Qi Xiong , Ting Liu , Ting Liu : :
 Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. IEEE Trans. Software Eng. 50(12): 3225-3248 (2024)
 [c35]Wuxia Jin [c35]Wuxia Jin , Shuo Xu , Shuo Xu , Dawei Chen , Dawei Chen , Jiajun He , Jiajun He , Dinghong Zhong , Dinghong Zhong , Ming Fan , Ming Fan , Hongxu Chen , Hongxu Chen , Huijia Zhang , Huijia Zhang , Ting Liu , Ting Liu : :
 PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code. ICSE 2024: 112:1-112:12
 [c34]Ang Jia [c34]Ang Jia , Ming Fan , Ming Fan , Xi Xu , Xi Xu , Wuxia Jin , Wuxia Jin , Haijun Wang , Haijun Wang , Ting Liu , Ting Liu : :
 Cross-Inlining Binary Function Similarity Detection. ICSE 2024: 223:1-223:13
 [c33]Yin Wang [c33]Yin Wang , Ming Fan , Ming Fan , Xicheng Zhang , Xicheng Zhang , Jifei Shi , Jifei Shi , Zhaoyu Qiu , Zhaoyu Qiu , Haijun Wang , Haijun Wang , Ting Liu , Ting Liu : :
 LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication. Internetware 2024
 [c32]Jingyi Lei, Yi Wu, Nan Hu, Junjie Tao, Yin Wang, Haijun Wang, Ming Fan: [c32]Jingyi Lei, Yi Wu, Nan Hu, Junjie Tao, Yin Wang, Haijun Wang, Ming Fan:
 Dynamic Testing for Mobile Privacy Compliance. ISSRE (Workshops) 2024: 113-114
 [c31]Yin Wu, Haijun Wang, Yuanhui Zhang, Xitao Li, Hao Wu [c31]Yin Wu, Haijun Wang, Yuanhui Zhang, Xitao Li, Hao Wu , Ming Fan, Ting Liu: , Ming Fan, Ting Liu:
 Business Compliance Detection of Smart Contracts in Electricity and Carbon Trading Scenarios. ISSRE (Workshops) 2024: 177-178
 [c30]Yin Wu [c30]Yin Wu , Xiaofei Xie , Xiaofei Xie , Chenyang Peng, Dijun Liu , Chenyang Peng, Dijun Liu , Hao Wu , Hao Wu , Ming Fan, Ting Liu , Ming Fan, Ting Liu , Haijun Wang: , Haijun Wang:
 AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. ASE 2024: 1019-1031
 [c29]Haijun Wang, Yurui Hu, Hao Wu [c29]Haijun Wang, Yurui Hu, Hao Wu , Dijun Liu , Dijun Liu , Chenyang Peng, Yin Wu , Chenyang Peng, Yin Wu , Ming Fan, Ting Liu , Ming Fan, Ting Liu : :
 Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. ASE 2024: 1570-1582
 [c28]Ming Fan, Jifei Shi [c28]Ming Fan, Jifei Shi , Yin Wang , Yin Wang , Le Yu , Le Yu , Xicheng Zhang, Haijun Wang, Wuxia Jin , Xicheng Zhang, Haijun Wang, Wuxia Jin , Ting Liu , Ting Liu : :
 Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps. ASE 2024: 1595-1606
 [c27]Yin Wang [c27]Yin Wang , Ming Fan, Hao Zhou , Ming Fan, Hao Zhou , Haijun Wang, Wuxia Jin , Haijun Wang, Wuxia Jin , Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang , Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang , Deqiang Han, Ting Liu: , Deqiang Han, Ting Liu:
 MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs. ASE 2024: 1667-1679
 [i13]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu: [i13]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu:
 Cross-Inlining Binary Function Similarity Detection. CoRR abs/2401.05739 (2024)
 [i12]Yu Wang, Shiwan Zhao, Zhihu Wang, Heyuan Huang, Ming Fan, Yubo Zhang, Zhixing Wang, Haijun Wang, Ting Liu: [i12]Yu Wang, Shiwan Zhao, Zhihu Wang, Heyuan Huang, Ming Fan, Yubo Zhang, Zhixing Wang, Haijun Wang, Ting Liu:
 Strategic Chain-of-Thought: Guiding Accurate Reasoning in LLMs through Strategy Elicitation. CoRR abs/2409.03271 (2024)
- 2023
 [j15]Yao Li [j15]Yao Li , Zhi Xiong, Tao Zhang , Zhi Xiong, Tao Zhang , Qinkun Zhang, Ming Fan, Lei Xue: , Qinkun Zhang, Ming Fan, Lei Xue:
 Ensemble Framework Combining Family Information for Android Malware Detection. Comput. J. 66(11): 2721-2740 (2023)
 [j14]Kunsong Zhao, Zhou Xu, Meng Yan [j14]Kunsong Zhao, Zhou Xu, Meng Yan , Tao Zhang , Tao Zhang , Lei Xue, Ming Fan, Jacky Keung , Lei Xue, Ming Fan, Jacky Keung : :
 The impact of class imbalance techniques on crashing fault residence prediction models. Empir. Softw. Eng. 28(2): 49 (2023)
 [j13]Kaidi Jin [j13]Kaidi Jin , Tianwei Zhang , Tianwei Zhang , Chao Shen , Chao Shen , Yufei Chen , Yufei Chen , Ming Fan , Ming Fan , Chenhao Lin , Chenhao Lin , Ting Liu , Ting Liu : :
 Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? IEEE Trans. Dependable Secur. Comput. 20(4): 2867-2881 (2023)
 [j12]Ang Jia [j12]Ang Jia , Ming Fan , Ming Fan , Wuxia Jin , Wuxia Jin , Xi Xu , Xi Xu , Zhaohui Zhou , Zhaohui Zhou , Qiyi Tang , Qiyi Tang , Sen Nie , Sen Nie , Shi Wu , Shi Wu , Ting Liu , Ting Liu : :
 1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis. ACM Trans. Softw. Eng. Methodol. 32(4): 87:1-87:26 (2023)
 [j11]Xi Xu [j11]Xi Xu , Qinghua Zheng, Zheng Yan , Qinghua Zheng, Zheng Yan , Ming Fan , Ming Fan , Ang Jia , Ang Jia , Zhaohui Zhou , Zhaohui Zhou , Haijun Wang , Haijun Wang , Ting Liu , Ting Liu : :
 PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. IEEE Trans. Software Eng. 49(12): 5279-5294 (2023)
 [c26]Weixu Zhang, Yu Wang, Ming Fan: [c26]Weixu Zhang, Yu Wang, Ming Fan:
 Towards Robustness of Large Language Models on Text-to-SQL Task: An Adversarial and Cross-Domain Investigation. ICANN (5) 2023: 181-192
 [c25]Wuxia Jin, Yitong Dai, Jianguo Zheng, Yu Qu [c25]Wuxia Jin, Yitong Dai, Jianguo Zheng, Yu Qu , Ming Fan, Zhenyu Huang, Dezhi Huang, Ting Liu: , Ming Fan, Zhenyu Huang, Dezhi Huang, Ting Liu:
 Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization. ICSE 2023: 1674-1686
 [c24]Weipeng Fuzzy Huang [c24]Weipeng Fuzzy Huang , Junjie Tao, Changbo Deng, Ming Fan, Wenqiang Wan, Qi Xiong, Guangyuan Piao: , Junjie Tao, Changbo Deng, Ming Fan, Wenqiang Wan, Qi Xiong, Guangyuan Piao:
 Rényi Divergence Deep Mutual Learning. ECML/PKDD (2) 2023: 156-172
 [c23]Junjie Tao [c23]Junjie Tao , Jifei Shi , Jifei Shi , Ming Fan , Ming Fan , Yin Wang , Yin Wang , Junfeng Liu , Junfeng Liu , Ting Liu , Ting Liu : :
 JSLibD: Reliable and Heuristic Detection of Third-party Libraries in Miniapps. SaTS@CCS 2023: 11-16
 [c22]Ziqiang Yan [c22]Ziqiang Yan , Ming Fan , Ming Fan , Yin Wang , Yin Wang , Jifei Shi , Jifei Shi , Haoran Wang , Haoran Wang , Ting Liu , Ting Liu : :
 MUID: Detecting Sensitive User Inputs in Miniapp Ecosystems. SaTS@CCS 2023: 17-21
 [c21]Wuxia Jin, Yuyun Zhang, Jiaowei Shang, Yi Hou, Ming Fan, Ting Liu: [c21]Wuxia Jin, Yuyun Zhang, Jiaowei Shang, Yi Hou, Ming Fan, Ting Liu:
 Identifying Code Changes for Architecture Decay via a Metric Forest Structure. TechDebt@ICSE 2023: 62-71
 [i11]Jiali Wei, Ming Fan, Wenjing Jiao, Wuxia Jin, Ting Liu: [i11]Jiali Wei, Ming Fan, Wenjing Jiao, Wuxia Jin, Ting Liu:
 BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing. CoRR abs/2301.10412 (2023)
 [i10]Yin Wang, Ming Fan, Junfeng Liu, Junjie Tao, Wuxia Jin, Qi Xiong, Yuhao Liu, Qinghua Zheng, Ting Liu: [i10]Yin Wang, Ming Fan, Junfeng Liu, Junjie Tao, Wuxia Jin, Qi Xiong, Yuhao Liu, Qinghua Zheng, Ting Liu:
 Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. CoRR abs/2302.13860 (2023)
- 2022
 [j10]Xiao Liu, Zhou Xu [j10]Xiao Liu, Zhou Xu , Dan Yang, Meng Yan , Dan Yang, Meng Yan , Weihan Zhang, Haohan Zhao , Weihan Zhang, Haohan Zhao , Lei Xue, Ming Fan: , Lei Xue, Ming Fan:
 An unsupervised cross project model for crashing fault residence identification. IET Softw. 16(6): 630-646 (2022)
 [j9]Yang Liu [j9]Yang Liu , Zisen Xu, Ming Fan , Zisen Xu, Ming Fan , Yu Hao , Yu Hao , Kai Chen, Hao Chen, Yan Cai , Kai Chen, Hao Chen, Yan Cai , Zijiang Yang, Ting Liu , Zijiang Yang, Ting Liu : :
 ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs. IEEE Trans. Reliab. 71(2): 1174-1188 (2022)
 [c20]Shuyue Li, Jiaqi Guo, Jian-Guang Lou, Ming Fan, Ting Liu, Dongmei Zhang: [c20]Shuyue Li, Jiaqi Guo, Jian-Guang Lou, Ming Fan, Ting Liu, Dongmei Zhang:
 Testing Machine Learning Systems in Industry: An Empirical Study. ICSE (SEIP) 2022: 263-272
 [c19]Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu: [c19]Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu:
 Explanation-Guided Fairness Testing through Genetic Algorithm. ICSE 2022: 871-882
 [c18]Ming Fan, Jiali Wei, Wuxia Jin, Zhou Xu, Wenying Wei, Ting Liu: [c18]Ming Fan, Jiali Wei, Wuxia Jin, Zhou Xu, Wenying Wei, Ting Liu:
 One step further: evaluating interpreters using metamorphic testing. ISSTA 2022: 327-339
 [c17]Songyang Yan, Ming Fan: [c17]Songyang Yan, Ming Fan:
 AdaFrenetic at the SBST 2022 Tool Competition. SBST@ICSE 2022: 41-42
 [i9]Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu: [i9]Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu:
 Explanation-Guided Fairness Testing through Genetic Algorithm. CoRR abs/2205.08335 (2022)
 [i8]Weipeng Fuzzy Huang, Junjie Tao, Changbo Deng, Ming Fan, Wenqiang Wan, Qi Xiong, Guangyuan Piao: [i8]Weipeng Fuzzy Huang, Junjie Tao, Changbo Deng, Ming Fan, Wenqiang Wan, Qi Xiong, Guangyuan Piao:
 Rényi Divergence Deep Mutual Learning. CoRR abs/2209.05732 (2022)
 [i7]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Qiyi Tang, Sen Nie, Shi Wu, Ting Liu: [i7]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Qiyi Tang, Sen Nie, Shi Wu, Ting Liu:
 Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining. CoRR abs/2210.15159 (2022)
- 2021
 [j8]Ming Fan [j8]Ming Fan , Wenying Wei, Xiaofei Xie , Wenying Wei, Xiaofei Xie , Yang Liu , Yang Liu , Xiaohong Guan, Ting Liu , Xiaohong Guan, Ting Liu : :
 Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. IEEE Trans. Inf. Forensics Secur. 16: 838-853 (2021)
 [j7]Ming Fan [j7]Ming Fan , Ziliang Si , Ziliang Si , Xiaofei Xie , Xiaofei Xie , Yang Liu , Yang Liu , Ting Liu , Ting Liu : :
 Text Backdoor Detection Using an Interpretable RNN Abstract Model. IEEE Trans. Inf. Forensics Secur. 16: 4117-4132 (2021)
 [c16]Jiaqi Guo, Ziliang Si, Yu Wang, Qian Liu, Ming Fan, Jian-Guang Lou, Zijiang Yang, Ting Liu: [c16]Jiaqi Guo, Ziliang Si, Yu Wang, Qian Liu, Ming Fan, Jian-Guang Lou, Zijiang Yang, Ting Liu:
 Chase: A Large-Scale and Pragmatic Chinese Dataset for Cross-Database Context-Dependent Text-to-SQL. ACL/IJCNLP (1) 2021: 2316-2331
 [c15]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu: [c15]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
 Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. ICSE 2021: 873-884
 [c14]Wuxia Jin, Dinghong Zhong, Zifan Ding, Ming Fan, Ting Liu: [c14]Wuxia Jin, Dinghong Zhong, Zifan Ding, Ming Fan, Ting Liu:
 Where to Start: Studying Type Annotation Practices in Python. ASE 2021: 529-541
 [c13]Kunsong Zhao, Zhou Xu, Meng Yan [c13]Kunsong Zhao, Zhou Xu, Meng Yan , Yutian Tang , Yutian Tang , Ming Fan, Gemma Catolino: , Ming Fan, Gemma Catolino:
 Just-in-time defect prediction for Android apps via imbalanced deep learning model. SAC 2021: 1447-1454
 [i6]Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye, Ting Liu: [i6]Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye, Ting Liu:
 From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies? CoRR abs/2103.08924 (2021)
 [i5]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu: [i5]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
 Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. CoRR abs/2103.10126 (2021)
 [i4]Ang Jia, Ming Fan, Wuxia Jin, Xi Xu, Ting Liu: [i4]Ang Jia, Ming Fan, Wuxia Jin, Xi Xu, Ting Liu:
 One-to-One or One-to-many? What function inlining brings to binary2source similarity analysis. CoRR abs/2112.12928 (2021)
- 2020
 [j6]Ming Fan [j6]Ming Fan , Xiapu Luo , Xiapu Luo , Jun Liu, Chunyin Nong , Jun Liu, Chunyin Nong , Qinghua Zheng, Ting Liu , Qinghua Zheng, Ting Liu : :
 CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis. IEEE Trans. Reliab. 69(1): 124-138 (2020)
 [c12]Shuyue Li, Jiaqi Guo [c12]Shuyue Li, Jiaqi Guo , Ming Fan, Jian-Guang Lou, Qinghua Zheng, Ting Liu: , Ming Fan, Jian-Guang Lou, Qinghua Zheng, Ting Liu:
 Automated bug reproduction from user reviews for Android applications. ICSE (SEIP) 2020: 51-60
 [c11]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu [c11]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu , Jun Liu, Ting Liu: , Jun Liu, Ting Liu:
 An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. ISSRE 2020: 253-264
 [c10]Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye [c10]Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye , Ting Liu: , Ting Liu:
 From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies? MSR 2020: 288-299
 [c9]Jiali Wei, Ming Fan, Xi Xu, Ang Jia, Zhou Xu, Lei Xue: [c9]Jiali Wei, Ming Fan, Xi Xu, Ang Jia, Zhou Xu, Lei Xue:
 Interpretation Area-Guided Detection of Adversarial Samples. QRS Companion 2020: 245-248
 [c8]Xi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan [c8]Xi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan , Qinghua Zheng, Ting Liu: , Qinghua Zheng, Ting Liu:
 Revisiting the Challenges and Opportunities in Software Plagiarism Detection. SANER 2020: 537-541
 [i3]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu: [i3]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
 A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020)
 [i2]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu: [i2]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
 An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. CoRR abs/2008.05864 (2020)
 [i1]Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu: [i1]Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu:
 Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. CoRR abs/2008.05895 (2020)
2010 – 2019
- 2019
 [c7]Ming Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, Ting Liu: [c7]Ming Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, Ting Liu:
 Graph embedding based familial analysis of Android malware using unsupervised learning. ICSE 2019: 771-782
- 2018
 [j5]Ming Fan [j5]Ming Fan , Jun Liu, Xiapu Luo , Jun Liu, Xiapu Luo , Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu , Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu : :
 Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 13(8): 1890-1905 (2018)
 [j4]Zhenzhou Tian [j4]Zhenzhou Tian , Ting Liu, Qinghua Zheng, Eryue Zhuang, Ming Fan, Zijiang Yang: , Ting Liu, Qinghua Zheng, Eryue Zhuang, Ming Fan, Zijiang Yang:
 Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection. IEEE Trans. Software Eng. 44(5): 491-511 (2018)
- 2017
 [j3]Ming Fan [j3]Ming Fan , Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu , Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu : :
 DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 12(8): 1772-1785 (2017)
- 2016
 [j2]Zhenzhou Tian [j2]Zhenzhou Tian , Ting Liu, Qinghua Zheng, Ming Fan, Eryue Zhuang, Zijiang Yang: , Ting Liu, Qinghua Zheng, Ming Fan, Eryue Zhuang, Zijiang Yang:
 Exploiting thread-related system calls for plagiarism detection of multithreaded programs. J. Syst. Softw. 119: 136-148 (2016)
 [c6]Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei Tong, Ming Fan, Zijiang Yang: [c6]Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei Tong, Ming Fan, Zijiang Yang:
 A new thread-aware birthmark for plagiarism detection of multithreaded programs. ICSE (Companion Volume) 2016: 734-736
 [c5]Ming Fan, Jun Liu, Xiapu Luo [c5]Ming Fan, Jun Liu, Xiapu Luo , Kai Chen, Tianyi Chen , Kai Chen, Tianyi Chen , Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu: , Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu:
 Frequent Subgraph Based Familial Classification of Android Malware. ISSRE 2016: 24-35
 [c4]Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Lechen Yu [c4]Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Lechen Yu , Ming Fan, Ting Liu: , Ming Fan, Ting Liu:
 Debugging Multithreaded Programs as if They Were Sequential. SATE 2016: 78-83
- 2015
 [j1]Zhenzhou Tian, Qinghua Zheng, Ting Liu, Ming Fan, Eryue Zhuang, Zijiang Yang: [j1]Zhenzhou Tian, Qinghua Zheng, Ting Liu, Ming Fan, Eryue Zhuang, Zijiang Yang:
 Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences. IEEE Trans. Software Eng. 41(12): 1217-1235 (2015)
- 2014
 [c3]Zhenzhou Tian [c3]Zhenzhou Tian , Qinghua Zheng, Ting Liu, Ming Fan, Xiaodong Zhang, Zijiang Yang: , Qinghua Zheng, Ting Liu, Ming Fan, Xiaodong Zhang, Zijiang Yang:
 Plagiarism detection for multithreaded software based on thread-aware software birthmarks. ICPC 2014: 304-313
 [c2]Zhenzhou Tian, Qinghua Zheng, Ming Fan, Eryue Zhuang, Haijun Wang, Ting Liu: [c2]Zhenzhou Tian, Qinghua Zheng, Ming Fan, Eryue Zhuang, Haijun Wang, Ting Liu:
 DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool. SEKE 2014: 740-741
- 2013
 [c1]Zhenzhou Tian [c1]Zhenzhou Tian , Qinghua Zheng, Ting Liu, Ming Fan: , Qinghua Zheng, Ting Liu, Ming Fan:
 DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection. HPCC/EUC 2013: 619-627
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-24 21:57 CEST by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







