Publications

You can also find my articles on my Google Scholar profile or DBLP


  • Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang and Congyi Li, "Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing," in The ACM Conference on Computer and Communications Security (CCS), Copenhagen, Denmark, 2023.   (To appear)

  • Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, and Chunyang Chen, "Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities," in Proceedings of the 32nd USENIX Security Symposium (USENIX), ANAHEIM, CA, USA, 2023.  [ PDF | BIB ]

  • Chengan Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, and Peizhuo Lv, "Aliasing Backdoor Attacks on Pre-trained Models," in Proceedings of the 32nd USENIX Security Symposium (USENIX), ANAHEIM, CA, USA, 2023.  [ PDF | BIB ]

  • Shangqing Liu, Bozhi Wu, Xiaofei Xie, Guozhu Meng, and Yang Liu, "ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning," in The 45th International Conference on Software Engineering (ICSE), Melbourne, Australia, 2023.  [ PDF | BIB ]

  • Shangqing Liu, Xiaofei Xie, Jingkai Siow, Lei Ma, Guozhu Meng, and Yang Liu, "GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search," in IEEE Transactions on Software Engineering (TSE), 2023.  [ PDF | BIB ]

  • Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu and Yao Cheng, "Understanding Real-world Threats to Deep Learning Models in Android Apps," in The ACM Conference on Computer and Communications Security (CCS), Los Angeles, USA, 2022, pp. 785-799.  [ PDF | BIB ]   Second Prize of Tool Demo in ChinaSoft 2022

  • Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen and Yang Liu, "TransRepair: Context-aware Program Repair for Compilation Errors," in The 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), Michigan, USA, 2022.  [ PDF | BIB ]

  • Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo and Xuanzhe Liu, "MalRadar: Demystifying Android Malware in the New Era," in ACM SIGMETRICS / IFIP PERFORMANCE 2022 (SIGMETRICS 2022), Mumbai, India, 2022.  [ PDF | BIB ]

  • Siow Jing Kai, Shangqing Liu, Xiaofei Xie, Guozhu Meng and Yang Liu, "Learning Program Semantics with Code Representations: An Empirical Study," in 29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022), Hawaii, 2022.  [ PDF | BIB ]

  • Xingbo Hu, Yibing Lan, Ruimin Gao, Guozhu Meng, and Kai Chen, "Why is Your Trojan NOT Responding? A Quantitative Analysis of Failures in Backdoor Attacks of Neural Networks," in The 21st International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2021), Xiamen, China, 2021.  [ PDF | BIB ]

  • Yuekang Li, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie, Haijun Wang and Yang Liu, "VALL-NUT: Principled Anti-Greybox-Fuzzing," in The 32nd International Symposium on Software Reliability Engineering (ISSRE 2021), Wuhan, China, 2021.  [ PDF | BIB ]

  • Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, and Xingbo Hu, "DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks," in Proceedings of the 30th USENIX Security Symposium (USENIX), Vancouver, B.C., Canada, 2021.  [ PDF | BIB ]

  • Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee and Wenchang Shi, "SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization," in Proceedings of the 30th The Web Conference (WWW), Ljubljana, Slovenia, 2021.  [ PDF | BIB ]

  • Shuang Liu, Baiyang Zhao, Renjie Guo, Guozhu Meng, Fan Zhang and Meishan Zhang, "Have You been Properly Notified? Automatic Compliance Analysis of Privacy Policy Text with GDPR Article 13," in Proceedings of the 30th The Web Conference (WWW), Ljubljana, Slovenia, 2021.  [ PDF | BIB ]

  • Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, and Jinwen He, "Towards Security Threats of Deep Learning Systems: A Survey," in IEEE Transactions on Software Engineering, 2020.  [ PDF | BIB ]

  • Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, and Yang Liu, "A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices," in IEEE Transactions on Information Forensics and Security, 2020.  [ PDF | BIB ]

  • Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, and Xiaohong Li, "A3IDENT: A Two-phased Approach to Identify the Leading Authors of Android Apps," in 36th IEEE International Conference on Software Maintenance and Evolution (ICSME), Adelaide, Austalia, 2020, pp. 617--628.  [ PDF | BIB ]

  • Bingchang Liu, Guozhu Meng, Wei Zou, Feng Li, Qi Gong, Min Lin, Dandan Sun, Wei Huo, and Chao Zhang, "A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned," in The 42nd International Conference on Software Engineering (ICSE), Seoul, South Korean, 2020, pp. 1547-–1559.  [ PDF | BIB ]

  • Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu, "An Empirical Assessment of Security Risks of Global Android Banking Apps," in The 42nd International Conference on Software Engineering (ICSE), Seoul, South Korean, 2020, pp. 1310--1322.  [ PDF | BIB ]

  • Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou and Kai Chen, "RoLMA: A Practical Adversarial Attack against Deep Learning-based LPR Systems," in The 15th International Conference on Information Security and Cryptology, Nanjing, China, 2019, pp. 101-117.  [ PDF | BIB ]

  • Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, and Yao Guo, "Characterizing Android App Signing Issues," in The 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), San Diego, CA, USA, 2019, pp. 280-292.  [ PDF | BIB ]

  • Xiang Chen, Yingquan Zhao, Zhanqi Cui, Guozhu Meng, Yang Liu, and Zan Wang, "Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods," in IEEE Transactions on Reliability, vol. 69, issue 1, 2020, pp. 70--87.  [ PDF | BIB ]

  • Zhushou Tang, Minhui Xue, Guozhu Meng, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu and Yang Liu, "Securing Android Applications via Edge Assistant Third-party Library Detection," in Computers & Security, vol. 80, 2019, pp. 257--272.  [ PDF | BIB ]

  • Guozhu Meng, Matthew Patrick, Yinxing Xue, Yang Liu and Jie Zhang, "Securing Android App Markets via Modelling and Predicting Malware Spread between Markets," in IEEE Transactions on Information Forensics and Security, vol. 14, issue 7, 2019, pp. 1944 - 1959.  [ PDF | BIB ]

  • Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu and Lihua Xu, "Are Mobile Banking Apps Secure? What can be Improved?," in Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Florida, USA, 2018, pp. 797--802.  [ PDF | BIB ]

  • Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, and Geguang Pu, "Efficiently Manifesting Asynchronous Programming Errors in Android Apps," in The 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), Montpellier, France, 2018, pp. 486--497.  [ PDF | BIB ]

  • Guozhu Meng, Ruitao Feng, Guangdong Bai, Kai Chen, and Yang Liu, "DroidEcho: An In-depth Dissection of Malicious Behaviors in Android Applications," in Cybersecurity, vol. 1, issue 1, 2018, pp. 1--17.  [ PDF | BIB ]

  • Chunyang Chen, Ting Su, Guozhu Meng, Zhenchang Xing and Yang Liu, "From UI Design Image to GUI Skeleton: A Neural Machine Translator to Bootstrap Mobile GUI Implementation," in The 40th International Conference on Software Engineering (ICSE), Gothenburg, Sweden, 2018, pp. 665-676.  [ PDF | BIB ]

  • Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu and Zhendong Su, "Large-Scale Analysis of Framework-Specific Exceptions in Android Apps," in The 40th International Conference on Software Engineering (ICSE), Gothenburg, Sweden, 2018, pp. 408--419.  [ PDF | BIB ]   ACM SIGSOFT Distinguished Paper Award

  • Guozhu Meng, Yinxing Xue, Jing Kai Siow, Ting Su, Annamalai Narayanan and Yang Liu, "AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis," in CoRR abs/1711.07451, 2017.  [ PDF | BIB ]

  • Yun Lin, Guozhu Meng, Yinxing Xue, Zhenchang Xing, Jun Sun, Xin Peng, Yang Liu, Wenyun Zhao, and Jinsong Dong, "Mining Implicit Design Templates for Actionable Code Reuse," in The 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), Urbana-Champaign, Illinois, USA, 2017, pp. 394--404.  [ PDF | BIB ]

  • Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, and Zhendong Su, "Guided, Stochastic Model-Based GUI Testing of Android Apps," in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE), Paderborn, Germany, 2017, pp. 245--256.  [ PDF | BIB ]   First Prize of Tool Demo in NASAC 2017

  • Liang He, Guozhu Meng, Yu Gu, Cong Liu, Jun Sun, Ting Zhu, Yang Liu, and Kang G Shin, "Battery-Aware Mobile Data Service," in IEEE Transactions on Mobile Computing (TMC), vol. 16, issue 6, 2017, pp. 1544--1558.  [ PDF | BIB ]

  • Liang He, Eugene Kim, Kang G Shin, Guozhu Meng, and Tian He, "Battery State-of-Health Estimation for Mobile Devices," in Proceedings of the 8th International Conference on Cyber-Physical System (ICCPS), Pittsburgh, Pennsylvania, USA, 2017, pp. 51--60.  [ PDF | BIB ]

  • Yinxing Xue, Guozhu Meng, Yang Liu, Tian Huat Tan, Hongxu Chen, Jun Sun, and Jie Zhang, "Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique," in IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, issue 7, 2017, pp. 1529--1544.  [ PDF | BIB ]

  • Annamalai Narayanan, Guozhu Meng, Liu Yang, Jinliang Liu, and Lihui Chen, "Contextual Weisfeiler-Lehman Graph Kernel for Malware Detection," in 2016 Internationl Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada, 2016, pp. 4701--4708.  [ PDF | BIB ]

  • Guozhu Meng, Yinxing Xue, Zhengzi Xu, Yang Liu, Jie Zhang, and Annamalai Narayanan, "Semantic Modelling of Android Malware for Effective Malware Comprehension, Detection, and Classification," in The International Symposium on Software Testing and Analysis (ISSTA), Saarbrücken, Germany, 2016, pp. 306--317.  [ PDF | BIB ]

  • Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu, Jie Zhang, and Tieming Chen, "Mystique: Evolving Android Malware for Auditing Anti-Malware Tools," in ACM Asia Conference on Computer and Communicatoins Security (AsiaCCS), Xi'an, China, 2016, pp. 365--376.  [ PDF | BIB ]

  • Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, and Raouf Boutaba, "Collaborative Security: A Survey and Taxonomy," in ACM Computing Surveys (CSUR), vol. 48, issue 1, 2015, pp. 1--42.  [ PDF | BIB ]

  • Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, and Jin Song Dong, "AuthScan: Automatic Extraction of Web Authentication Protocols from Implementations," in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, 2013.  [ PDF | BIB ]