Xiaohan Zhang

ORCID: 0000-0002-1118-7582
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Software Testing and Debugging Techniques
  • Microplastics and Plastic Pollution
  • Pharmaceutical and Antibiotic Environmental Impacts
  • Software Engineering Research
  • biodegradable polymer synthesis and properties
  • Toxic Organic Pollutants Impact
  • Recycling and Waste Management Techniques
  • Adipokines, Inflammation, and Metabolic Diseases
  • Personal Information Management and User Behavior
  • Security and Verification in Computing
  • Oceanographic and Atmospheric Processes
  • Environmental Chemistry and Analysis
  • Data Quality and Management
  • Web Application Security Vulnerabilities
  • User Authentication and Security Systems
  • Electrocatalysts for Energy Conversion
  • Adipose Tissue and Metabolism
  • Antibiotic Resistance in Bacteria
  • Fuel Cells and Related Materials
  • Privacy, Security, and Data Protection
  • Constraint Satisfaction and Optimization
  • Infant Health and Development
  • Forensic Anthropology and Bioarchaeology Studies
  • Advanced Graph Neural Networks

Fudan University
2018-2025

Xidian University
2025

Tianjin University
2023-2024

Shandong University
2024

Affiliated Hospital of Xuzhou Medical College
2023

Xuzhou Medical College
2023

Beijing University of Chemical Technology
2023

Soochow University
2021-2023

University of Louisiana at Lafayette
2023

Renmin University of China
2023

Machine learning (ML) classifiers have been widely deployed to detect Android malware, but at the same time application of ML also faces an emerging problem. The performance such degrades---or called ages---significantly over given malware evolution. Prior works proposed use retraining or active reverse and improve aged models. However, underlying classifier itself is still blind, unaware Unsurprisingly, evolution-insensitive comes a price, i.e., labeling tens thousands samples cost...

10.1145/3372297.3417291 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

The shortage of fossil fuels and freshwater resources has become a serious global issue. Using solar energy to extract clean water with photothermal conversion technology is green sustainable desalination method. Integrated electricity generation during the process maximizes utilization efficiency. Herein, solar-driven steam (SSEG) system based on an all-in-one evaporator prepared via scalable technology. Carbon black selected as absorber for harvesting well functional substance simultaneous...

10.1002/smtd.202300227 article EN Small Methods 2023-05-30

Third-party libraries are widely used in Android applications to ease development and enhance functionalities. However, the incorporated also bring new security & privacy issues host application, blur accounting between application code library code. Under this situation, a precise reliable detector is highly desirable. In fact, may be customized by developers during integration dead eliminated obfuscators build process. existing research on detection has not gracefully handled these...

10.1109/saner.2018.8330204 article EN 2018-03-01

Abstract The development of highly active and acid‐stable electrocatalysts for oxygen evolution reaction (OER) is great significance water electrolysis technology. Herein, a efficient molybdenum‐doped mesoporous ruthenium dioxide sphere (Mo‐RuO 2 ) catalyst fabricated by facile impregnation post‐calcination method using carbon spheres to template the mesostructure. optimal Mo 0.15 ‐RuO with doping amount 15 mol.% exhibits significantly low overpotential 147 mV at 10 mA cm −2 , small Tafel...

10.1002/smll.202305889 article EN Small 2023-11-08

Open-source kernels have been adopted by massive downstream vendors on billions of devices. However, these often omit or delay the adoption patches released in mainstream version. Even worse, many are not publicizing patching progress even disclosing misleading information. status is critical for groups (e.g., governments and enterprise users) that keen to security threats. Such a practice motivates need reliable patch presence testing kernels. Currently, best means examine existence target...

10.1145/3372297.3417240 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

Android system provides application developers with the ability to define custom permissions, which serve regulate sharing of resources and functionalities other applications. However, developers' improper development practices can render permission mechanism ineffective, facilitating easy exploitation by attackers. This paper presents a comprehensive examination problematic surrounding permissions employed developers, referred as Bad Practices Custom Permissions (BPCP issues). To accomplish...

10.1109/tdsc.2024.3525049 article EN IEEE Transactions on Dependable and Secure Computing 2025-01-01

Isthmin-1 (ISM1), a secretory protein predominantly derived from brown adipose tissue, enhances glucose tolerance and attenuates hepatic steatosis. However, its potential involvement in white tissue remodelling remains elusive, which profoundly impacts adipocyte insulin sensitivity consequently alters systemic metabolic homeostasis. ISM1 expression profiles human mouse were systematically characterized using Tabula Sapiens. With the intervention of expression, preadipocyte cell lines...

10.1111/dom.16310 article EN Diabetes Obesity and Metabolism 2025-03-07

As Android platform evolves in a fast pace, API-related compatibility issues become significant challenge for developers. To handle an incompatible API invocation, developers mainly have two choices: merely performing sufficient checks to avoid invoking APIs on platforms that do not support them, or gracefully providing replacement implementations those platforms. more consistent app behaviors, the latter one is recommended and challenging adopt. However, it still unknown how these are...

10.1145/3377811.3380357 article EN 2020-06-27

Learning-based malware detectors are widely used in practice to safeguard real-world computers. One major challenge is known as model aging, where the effectiveness of these models drops drastically variants keep evolving. To tackle most existing works choose label new samples retrain aged models. However, such data-perspective methods often require excessive costs labeling and retraining. In this article, we observe that during evolution, preserve similar malicious semantics while switching...

10.1109/tdsc.2022.3144697 article EN IEEE Transactions on Dependable and Secure Computing 2022-01-25

Interactions between human and objects are influenced not only by the object's pose shape, but also physical attributes such as object mass surface friction. They introduce important motion nuances that essential for diversity realism. Despite advancements in recent kinematics-based methods, this aspect has been overlooked. Generating nuanced presents two challenges. First, it is non-trivial to learn from multi-modal information derived both non-physical attributes. Second, there exists no...

10.48550/arxiv.2403.11237 preprint EN arXiv (Cornell University) 2024-03-17
Coming Soon ...