Welcome to My World!

{ } About me

I’m a PhD student at Stevens Institue, supervised by Prof. Koskinen

Research Interests
Formal Verification, Program Languages, Systems and Security, Artificial Intelligence as well as theories and applications in practical problems.

Before Stevens
I like mathematical modeling, which transforms pracrical problem into abstract mathematical model, solving it in math and then back to the real problem, making the reality more interpretable.

Information and Computing Science, as my undergraduate subject, it gave me an opportunity to walk through the icy beauty of mathematics. Experienced both national and international mathematical contests in modeling, I learned how to apply the theory into a practical scenario. During my graduate study in Information Security, I encountered tremendous engineering problems, realized that I need to explore more and pursue deeper both in academics and engineering practices, which lead my path to PhD study. I want to be a Dr., not for the title, rather as a doctor of information system, dioagnosing and curing all the sicking programs/systems.

On the personal side I enjoy sports (workout, running, skiing, swimming), dancing to music, reading, and traveling to interesting cities.

Blog

/> Projects ==>

2018-Present
Automatically Verifying Temporal Alignment of Transformed Software.
2015-2017
Mobile Application Data Analysis, SITIS 2016, SmartData IEEE
2014-2015
Mobile Network Security Authentication System, My Contribution
2014
Personal Tour Sites Planning System, GitHub
2013
Mathematical Contest in Modeling 2013, MCM/ICM Our Paper

/> Activities

Oct 2020 Artifact Evaluation Committee CGO 2021

July 2018 Parallelism and Concurrency OPLSS 2018

June 2018 Student Volunteer PLDI 2018

/> Publications

2017
Yuandong Liu, Yanwei Li, Yanhui Guo and Miao Zhang, "Stratify Mobile App Reviews: E-LDA Model Based on Hot Entity Discovery", confernce: SITIS 2016
2017
Shiting Xu, Yuandong Liu, Xinyu Ma, Qiang Sheng, "Malicious Application Dynamic Detection In Real-Time API Analysis", conference: Smart Data 2016
2015
Wang Sai, Guo Yanhui, Wu Qiuxin, Liu Yuandong, "A detection method of Android application malicious behaviors based on Xposed framework", Sciencepaper Online 12: 1264

/> Mobile Application Data Analysis

When you click the button on your app, what is it really doing?

The mobile data we are studying here is mainly focused on mobile application online reviews, and mobile App API data. Our laboratory have years of experiences in software security analysis, including malicious software detection, code security audit and security reinforcement in software etc.. We thus have collected huge data about the software stored in our local server, and we find out these data are becoming heavier and noiser, in which itself have a great value in informaiton reuse. In this situation, we start this project to clean and reuse the data we have, to make a deeper analysis on these data in different angles, urshering in a new way to study mobile app security.

Users download apps from app stores, and write reviews to share their experiences about the app performance, these reviews contain valuable information for app developers, also attract to latent users. Our work on reivews analysis include features extraction and text classification, as well as sentiment computation etc. With respect to App API, we parse the log file and record the parameter values of API, feeding them with proper mathematical models, by doing this, we propose a novel approach to detect malicious apps, distinguished from our previous works which focus on code analysis.

Facing the huge data computing that consumes great resources, I am also doing some research on algorithm optimization in machine learning, trying to improve the simultaneous matrix diagonalization in principal component analysis(PCA).

Related Work:

  • Yuandong Liu, Yanwei Li, Yanhui Guo and Miao Zhang, "Stratify Mobile App Reviews: E-LDA Model Based on Hot Entity Discovery", confernce: SITIS 2016
  • Shiting Xu, Yuandong, Liu, Yanhui Guo, Guoai Xu, "Malicious Application Dynamic Detection In Real-Time API Analysis", conference: Smart Data 2016

/> Mobile Network Security Authentication System

Is the app safe before it is uploaded to App stores?

Although there are 460 million Adroid active users in China, making it the world's largest Andriod population, only 30% of them can access to Google Play, therefore 70% of users discover daily Android apps through third-party app stores. Android developers are free to distribute their apps in any intended approaches, including publishing into third-party app stores. There are more than ten third-party app stores in China used by local people every day, as a result, the trustworthiness of app stores in China is an open question. This project detect each APK file and repackage it with an authentic signature before upoading to app stores.

The whole procedure of APK detection includes static analysis and dynamic analysis, as well as malicious app searching engine etc.. I am responsible for Android dynamic analysis, based on an open source project Xposed Framework, I developed an Android system API monitor module . The module can record and modified the parameters of API involked by the running app, it can also notify users the details of app behaviors, e.g., text sending, internet connecting, audio recording, camera involking etc..

More Reading:

  • The source code in my charge can be downloaded here
  • I also co-authored a Chinese paper, "A detection method of Android application malicious behaviors based on Xposed framework", Sciencepaper Online 12: 1264

/> Personal Tour Sites Planning System

When you are going to travel places with which you are unfamiliar, how can you schedule your tour sites using your time and money to the limit? Would you like to share your findings with other tourists who haven't been there during your trip?

This project provide tourists a tool to organize their trips according to their personal prefernce, and a community to communicate with people who are mutually fond of same tour sites. The system is designed in three-layer web structure: Business Logic Layer(BLL), Data Access Layer(DAL), User Interface(UI). We build B/S database application system, implemented the system with ASP.net framwork in Visual Studio. We also developed an algorithem to optimize the route for users, presenting the tour sites dynamically on the map by invoking Baidu map API.


The source code can be found here

/> Mathematical Contest in Modeling 2013

How can we determine an effective, feasible, and cost-efficient water strategy to meet the projected water needs of a country in 2025?

At present, the shortage of fresh water resources has seriously restricted the development of many countries in the world, so it is particularly important to develop rational and effective water resources strategies. In order to meet the water demand by 2025, this paper takes China as the research object, analyzes its water resources data, combines with China's economic, ecological and environmental factors, and finally establishes freshwater resources strategic planning model.

In order to solve the problems in the water storage and transportation, seawater desalinization and water resources protection, we made maximization of social benefits S(X) and economic benefits J(X) as the goal, the water storage, transportation, desalinization and water resources protection as the constraint conditions, and set up a multiple objectives programming model. In solving the model, we made the social benefit as the constraint conditions, and then transformed it into a single objective programming model. After the model was solved, the optimal allocation of water resources was achieved. In particular, the application field of the water resources optimal allocation model can be cities, countries and even the whole planet. The model has general applicability. Meanwhile, the model is also applicable to allocation of other resources, such as oil, natural gas, minerals etc..


Full Paper