Skip to content

Commit 3097bd7

Browse files
authored
Update index_english.html
update UV
1 parent c384bc1 commit 3097bd7

File tree

1 file changed

+150
-0
lines changed

1 file changed

+150
-0
lines changed

people/youwei/index_english.html

Lines changed: 150 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,156 @@ <h2>Publications</h2>
132132

133133
<div>
134134
<ul>
135+
<li>
136+
<b>
137+
<a href="papers/CCS23.pdf">A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifiers</a>
138+
</b>
139+
<br>
140+
Changqing Miao,
141+
Jianan Feng,
142+
<b>Wei You</b>
143+
Wenchang Shi,
144+
<b>Jianjun Huang*</b>,
145+
<b>Bin Liang*</b>
146+
<br>
147+
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (<b>CCS 2023</b>) (CCF A)
148+
</li>
149+
150+
<li>
151+
<b>
152+
<a href="https://doi.org/10.1109/ICSE48619.2023.00020">Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers</a>
153+
</b>
154+
<br>
155+
Suyue Guo, Xinyu Wan,
156+
<b>Wei You*</b>
157+
<b>Bin Liang</b>
158+
Wenchang Shi,
159+
Yiwei Zhang,
160+
<b>Jianjun Huang</b>,
161+
Jian Zhang
162+
<br>
163+
2023 IEEE/ACM 45th International Conference on Software Engineering (<b>ICSE 2023</b>) (CCF A)
164+
</li>
165+
166+
<li>
167+
<b>
168+
<a href="papers/TSE2022.pdf">Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering</a>
169+
</b>
170+
<br>
171+
<b>Jianjun Huang</b>,
172+
Bo Xue,
173+
Jiasheng Jiang,
174+
<b>Wei You</b>,
175+
<b>Bin Liang*</b>,
176+
Jingzheng Wu,
177+
Yanjun Wu
178+
<br>
179+
IEEE Transactions on Software Engineering, vol. 49, issue 4, pp. 2272-2284, 01 Apr. 2023. (<b>TSE 2023</b>) (CCF A)
180+
</li>
181+
182+
<li>
183+
<b>
184+
<a href="papers/TC2021b.pdf">Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts</a>
185+
</b>
186+
<br>
187+
<b>Jianjun Huang</b>,
188+
Jiasheng Jiang,
189+
<b>Wei You</b>,
190+
<b>Bin Liang*</b>
191+
<br>
192+
IEEE Transactions on Computers, vol. 71, no. 7, pp. 1551-1563, 01 Jul. 2022. (<b>TC 2022</b>) (CCF A)
193+
</li>
194+
195+
<li>
196+
<b>
197+
<a href="papers/ISSTA2022.pdf">Hunting Bugs with Accelerated Optimal Graph Vertex Matching</a>
198+
</b>
199+
<br>
200+
Xiaohui Zhang,
201+
Yuanjun Gong,
202+
<b>Bin Liang*</b>,
203+
<b>Jianjun Huang</b>,
204+
<b>Wei You</b>,
205+
Wenchang Shi,
206+
Jian Zhang
207+
<br>
208+
The 31st ACM SIGSOFT International Symposium on Software Testing and Analysis (<b>ISSTA 2022</b>) (CCF A)
209+
</li>
210+
211+
<li>
212+
<b>
213+
<a href="papers/TDSC2021.pdf">Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction</a>
214+
</b>
215+
<br>
216+
<b>Bin Liang</b>,
217+
Hongcheng Li,
218+
Miaoqiang Su,
219+
Xirong Li,
220+
Wenchang Shi,
221+
Xiaofeng Wang
222+
<br>
223+
IEEE Transactions on Dependable and Secure Computing, vol. 18, pp. 72-85, 15 Jan. 2021. (<b>TDSC 2021</b>) (CCF A)
224+
</li>
225+
226+
<li>
227+
<b>
228+
<a href="papers/TIFS2021.pdf">Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching</a>
229+
</b>
230+
<br>
231+
<b>Jianjun Huang</b>,
232+
Songming Han,
233+
<b>Wei You</b>,
234+
Wenchang Shi,
235+
<b>Bin Liang*</b>,
236+
Jingzheng Wu,
237+
Yanjun Wu
238+
<br>
239+
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2144-2156. (<b>TIFS 2021</b>) (CCF A)
240+
<li>
241+
<b>
242+
<a href="papers/TC2021a.pdf">Detecting the Capacitance-based Gamepad for Protecting Mobile Game Fairness</a>
243+
</b>
244+
<br>
245+
Shilei Bai,
246+
<b>Bin Liang*</b>,
247+
<b>Jianjun Huang</b>,
248+
<b>Wei You</b>,
249+
Jiachun Li,
250+
Yaping Li,
251+
Wenchang Shi
252+
<br>
253+
IEEE Transactions on Computers, vol. 70, no. 9, pp. 1374-1387, 01 Sept. 2021. (<b>TC 2021</b>) (CCF A)
254+
</li>
255+
256+
<li>
257+
<b>
258+
<a href="papers/SECURITY2021.pdf">Android SmartTVs Vulnerability Discovery via Log-guided Fuzzing</a>
259+
</b>
260+
<br>
261+
Yousra Aafer,
262+
<b>Wei You*</b>,
263+
Yi Sun,
264+
Yu Shi,
265+
Xiangyu Zhang,
266+
Heng Yin
267+
<br>
268+
Proceedings of the 30th Usenix Security Symposium (<b>SECURITY 2021</b>) (CCF A)
269+
</li>
270+
271+
<li>
272+
<b>
273+
<a href="papers/FSE2020.pdf">SinkFinder: Harvesting Hundreds of Unknown Interesting Function Pairs with Just One Seed</a>
274+
</b>
275+
<br>
276+
Pan Bian,
277+
<b>Bin Liang*</b>,
278+
<b>Jianjun Huang</b>,
279+
Wenchang Shi,
280+
Xidong Wang,
281+
Jian Zhang
282+
<br>
283+
Proceedings of the 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (<b>ESEC/FSE 2020</b>) (CCF A)
284+
</li>
135285

136286
<li>
137287
<b>

0 commit comments

Comments
 (0)