You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: people/youwei/index_english.html
+150Lines changed: 150 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -132,6 +132,156 @@ <h2>Publications</h2>
132
132
133
133
<div>
134
134
<ul>
135
+
<li>
136
+
<b>
137
+
<ahref="papers/CCS23.pdf">A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifiers</a>
138
+
</b>
139
+
<br>
140
+
Changqing Miao,
141
+
Jianan Feng,
142
+
<b>Wei You</b>
143
+
Wenchang Shi,
144
+
<b>Jianjun Huang*</b>,
145
+
<b>Bin Liang*</b>
146
+
<br>
147
+
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (<b>CCS 2023</b>) (CCF A)
148
+
</li>
149
+
150
+
<li>
151
+
<b>
152
+
<ahref="https://doi.org/10.1109/ICSE48619.2023.00020">Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers</a>
153
+
</b>
154
+
<br>
155
+
Suyue Guo, Xinyu Wan,
156
+
<b>Wei You*</b>
157
+
<b>Bin Liang</b>
158
+
Wenchang Shi,
159
+
Yiwei Zhang,
160
+
<b>Jianjun Huang</b>,
161
+
Jian Zhang
162
+
<br>
163
+
2023 IEEE/ACM 45th International Conference on Software Engineering (<b>ICSE 2023</b>) (CCF A)
164
+
</li>
165
+
166
+
<li>
167
+
<b>
168
+
<ahref="papers/TSE2022.pdf">Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering</a>
169
+
</b>
170
+
<br>
171
+
<b>Jianjun Huang</b>,
172
+
Bo Xue,
173
+
Jiasheng Jiang,
174
+
<b>Wei You</b>,
175
+
<b>Bin Liang*</b>,
176
+
Jingzheng Wu,
177
+
Yanjun Wu
178
+
<br>
179
+
IEEE Transactions on Software Engineering, vol. 49, issue 4, pp. 2272-2284, 01 Apr. 2023. (<b>TSE 2023</b>) (CCF A)
180
+
</li>
181
+
182
+
<li>
183
+
<b>
184
+
<ahref="papers/TC2021b.pdf">Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts</a>
185
+
</b>
186
+
<br>
187
+
<b>Jianjun Huang</b>,
188
+
Jiasheng Jiang,
189
+
<b>Wei You</b>,
190
+
<b>Bin Liang*</b>
191
+
<br>
192
+
IEEE Transactions on Computers, vol. 71, no. 7, pp. 1551-1563, 01 Jul. 2022. (<b>TC 2022</b>) (CCF A)
193
+
</li>
194
+
195
+
<li>
196
+
<b>
197
+
<ahref="papers/ISSTA2022.pdf">Hunting Bugs with Accelerated Optimal Graph Vertex Matching</a>
198
+
</b>
199
+
<br>
200
+
Xiaohui Zhang,
201
+
Yuanjun Gong,
202
+
<b>Bin Liang*</b>,
203
+
<b>Jianjun Huang</b>,
204
+
<b>Wei You</b>,
205
+
Wenchang Shi,
206
+
Jian Zhang
207
+
<br>
208
+
The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (<b>ISSTA 2022</b>) (CCF A)
209
+
</li>
210
+
211
+
<li>
212
+
<b>
213
+
<ahref="papers/TDSC2021.pdf">Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction</a>
214
+
</b>
215
+
<br>
216
+
<b>Bin Liang</b>,
217
+
Hongcheng Li,
218
+
Miaoqiang Su,
219
+
Xirong Li,
220
+
Wenchang Shi,
221
+
Xiaofeng Wang
222
+
<br>
223
+
IEEE Transactions on Dependable and Secure Computing, vol. 18, pp. 72-85, 15 Jan. 2021. (<b>TDSC 2021</b>) (CCF A)
224
+
</li>
225
+
226
+
<li>
227
+
<b>
228
+
<ahref="papers/TIFS2021.pdf">Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching</a>
229
+
</b>
230
+
<br>
231
+
<b>Jianjun Huang</b>,
232
+
Songming Han,
233
+
<b>Wei You</b>,
234
+
Wenchang Shi,
235
+
<b>Bin Liang*</b>,
236
+
Jingzheng Wu,
237
+
Yanjun Wu
238
+
<br>
239
+
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2144-2156. (<b>TIFS 2021</b>) (CCF A)
240
+
<li>
241
+
<b>
242
+
<ahref="papers/TC2021a.pdf">Detecting the Capacitance-based Gamepad for Protecting Mobile Game Fairness</a>
243
+
</b>
244
+
<br>
245
+
Shilei Bai,
246
+
<b>Bin Liang*</b>,
247
+
<b>Jianjun Huang</b>,
248
+
<b>Wei You</b>,
249
+
Jiachun Li,
250
+
Yaping Li,
251
+
Wenchang Shi
252
+
<br>
253
+
IEEE Transactions on Computers, vol. 70, no. 9, pp. 1374-1387, 01 Sept. 2021. (<b>TC 2021</b>) (CCF A)
254
+
</li>
255
+
256
+
<li>
257
+
<b>
258
+
<ahref="papers/SECURITY2021.pdf">Android SmartTVs Vulnerability Discovery via Log-guided Fuzzing</a>
259
+
</b>
260
+
<br>
261
+
Yousra Aafer,
262
+
<b>Wei You*</b>,
263
+
Yi Sun,
264
+
Yu Shi,
265
+
Xiangyu Zhang,
266
+
Heng Yin
267
+
<br>
268
+
Proceedings of the 30th Usenix Security Symposium (<b>SECURITY 2021</b>) (CCF A)
269
+
</li>
270
+
271
+
<li>
272
+
<b>
273
+
<ahref="papers/FSE2020.pdf">SinkFinder: Harvesting Hundreds of Unknown Interesting Function Pairs with Just One Seed</a>
274
+
</b>
275
+
<br>
276
+
Pan Bian,
277
+
<b>Bin Liang*</b>,
278
+
<b>Jianjun Huang</b>,
279
+
Wenchang Shi,
280
+
Xidong Wang,
281
+
Jian Zhang
282
+
<br>
283
+
Proceedings of the 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (<b>ESEC/FSE 2020</b>) (CCF A)
0 commit comments