Shuai Wang
Shuai Wang
Verified email at - Homepage
Cited by
Cited by
Libd: Scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
Reassembleable disassembling
S Wang, P Wang, D Wu
24th {USENIX} Security Symposium ({USENIX} Security 15), 627-642, 2015
CacheD: Identifying Cache-Based Timing Channels in Production Software
S Wang, P Wang, X Liu, D Zhang, D Wu
26th USENIX Security Symposium. USENIX Association, 2017
Uroboros: Instrumenting stripped binaries with static reassembling
S Wang, P Wang, D Wu
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
Metamorphic Testing and Certified Mitigation of Fairness Violations in NLP Models
P Ma, S Wang, J Liu
29th International Joint Conference on Artificial Intelligence, 2020
In-memory fuzzing for binary code similarity analysis
S Wang, D Wu
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
Detecting nondeterministic payment bugs in ethereum smart contracts
S Wang, C Zhang, Z Su
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
S Wang, Y Bao, X Liu, P Wang, D Zhang, D Wu
arXiv preprint arXiv:1905.13332, 2019
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation
S Wang, Y Bao, X Liu, P Wang, D Zhang, D Wu
Usenix Security 2019, 2019
Metamorphic object insertion for testing object detection systems
S Wang, Z Su
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
Automatic grading of programming assignments: an approach based on formal semantics
X Liu, S Wang, P Wang, D Wu
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
RedDroid: Android Application Redundancy Customization Based on Static Analysis
Y Jiang, Q Bao, S Wang, X Liu, D Wu
Proceedings of the 29th IEEE International Symposium on Software Reliability …, 2018
Semantics-aware machine learning for function recognition in binary code
S Wang, P Wang, D Wu
2017 IEEE International Conference on Software Maintenance and Evolution …, 2017
Smoking selfies: using Instagram to explore young women’s smoking behaviors
DK Cortese, G Szczypka, S Emery, S Wang, E Hair, D Vallone
Social Media+ Society 4 (3), 2056305118790762, 2018
Translingual obfuscation
P Wang, S Wang, J Ming, Y Jiang, D Wu
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 128-144, 2016
How far we have come: Testing decompilation correctness of C decompilers
Z Liu, S Wang
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
Software protection on the go: A large-scale empirical study on mobile app obfuscation
P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu
Proceedings of the 40th International Conference on Software Engineering, 26-36, 2018
Metamorphic testing for object detection systems
S Wang, Z Su
arXiv preprint arXiv:1912.12162, 2019
Perception matters: Detecting perception failures of vqa models using metamorphic testing
Y Yuan, S Wang, M Jiang, TY Chen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
Modeling review spam using temporal patterns and co-bursting behaviors
H Li, G Fei, S Wang, B Liu, W Shao, A Mukherjee, J Shao
arXiv preprint arXiv:1611.06625, 2016
The system can't perform the operation now. Try again later.
Articles 1–20