Publications in topics beyond systems and security

  1. PromoGuardian: Detecting Promotion Abuse Fraud with Multi-Relation Fused Graph Neural Networks.

    Shaofei Li, Xiao Han, Ziqi Zhang, Zhenkai Liang, Yao Guo, Xiangqun Chen, Ding Li, Shuli Gao, and Minyao Hua.

    In the 47th IEEE Symposium on Security and Privacy (S&P), 2026.

  2. Propagation-Based Vulnerability Impact Assessment for Software Supply Chains.

    Bonan Ruan, Zhiwei Lin, Jiahao Liu, Chuqi Zhang, Kaihang Ji, and Zhenkai Liang.

    In the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2025.

  3. PsyScam: A Benchmark for Psychological Techniques in Real-World Scams.

    Shang Ma, Tianyi Ma, Jiahao Liu, Wei Song, Zhenkai Liang, Xusheng Xiao, and Yanfang Ye.

    In the 2025 Conference on Empirical Methods in Natural Language Processing (EMNLP), 2025.

  4. TANS: A Chess-Inspired Notation System for Strategy Analysis of Tennis Games.

    Yuexi Song, Chuanfei Li, Hao Cao, Ling Wu, Huanhuan Zheng, and Zhenkai Liang.

    In the 2nd International Sports Analytics Conference and Exhibition (ISACE), 2025.

    Distinguished Paper Award
  5. UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation.

    Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, and Zhenkai Liang.

    In the 33rd USENIX Security Symposium, 2024.

  6. Robust Detection of Android UI Similarity.

    Jian Mao, Jingdong Bian, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, and Xuxian Jiang.

    In IEEE International Conference on Communications (ICC), 2018.

  7. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.

    Jian Mao, Jingdong Bian, Wenqian Tian, Pei Li, Tao Wei, and Zhenkai Liang.

    In IEEE Access, Volume 5, 2017.

  8. Tool, Technique, and Tao in Computer Security Education.

    Zhenkai Liang, and Jian Mao.

    In IEEE Reliability Newsletter Special Issues, 2015.