Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary J Gao, X Yang, Y Fu, Y Jiang, J Sun Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018 | 174 | 2018 |
Evmfuzzer: detect evm vulnerabilities via fuzz testing Y Fu, M Ren, F Ma, H Shi, X Yang, Y Jiang, H Li, X Shi Proceedings of the 2019 27th ACM joint meeting on european software …, 2019 | 104* | 2019 |
EVM: From offline detection to online reinforcement for Ethereum virtual machine F Ma, Y Fu, M Ren, M Wang, Y Jiang, K Zhang, H Li, X Shi 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 62 | 2019 |
Vulseeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation J Gao, X Yang, Y Fu, Y Jiang, H Shi, J Sun Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018 | 39 | 2018 |
Security reinforcement for Ethereum virtual machine F Ma, M Ren, Y Fu, M Wang, H Li, H Song, Y Jiang Information Processing & Management 58 (4), 102565, 2021 | 30 | 2021 |
Industry practice of coverage-guided enterprise linux kernel fuzzing H Shi, R Wang, Y Fu, M Wang, X Shi, X Jiao, H Song, Y Jiang, J Sun Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 27 | 2019 |
Making smart contract development more secure and easier M Ren, F Ma, Z Yin, Y Fu, H Li, W Chang, Y Jiang Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021 | 25 | 2021 |
Gasfuzz: Generating high gas consumption inputs to avoid out-of-gas vulnerability F Ma, Y Fu, M Ren, W Sun, Z Liu, Y Jiang, J Sun, J Sun arXiv preprint arXiv:1910.02945 1, 7, 2019 | 19 | 2019 |
Vulnerable code clone detection for operating system through correlation-induced learning H Shi, R Wang, Y Fu, Y Jiang, J Dong, K Tang, J Sun IEEE Transactions on Industrial Informatics 15 (12), 6551-6559, 2019 | 17 | 2019 |
Scstudio: a secure and efficient integrated development environment for smart contracts M Ren, F Ma, Z Yin, H Li, Y Fu, T Chen, Y Jiang Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021 | 12 | 2021 |
Industry practice of configuration auto-tuning for cloud applications and services R Wang, Q Wang, Y Hu, H Shi, Y Shen, Y Zhan, Y Fu, Z Liu, X Shi, Y Jiang Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 7 | 2022 |
Hyperattack: Multi-gradient-guided white-box adversarial structure attack of hypergraph neural networks C Hu, R Yu, B Zeng, Y Zhan, Y Fu, Q Zhang, R Liu, H Shi arXiv preprint arXiv:2302.12407, 2023 | 6 | 2023 |
V-gas: Generating high gas consumption inputs to avoid out-of-gas vulnerability F Ma, Y Fu, M Ren, W Sun, H Song, Y Jiang, J Sun, J Sun arXiv preprint arXiv:1910.02945, 2019 | 4 | 2019 |
Cube-evo: A query-efficient black-box attack on video classification system Y Zhan, Y Fu, L Huang, J Guo, H Shi, H Song, C Hu IEEE Transactions on Reliability, 2023 | 2 | 2023 |
Abaci-finder: Linux kernel crash classification through stack trace similarity learning H Shi, G Wang, Y Fu, C Hu, H Song, J Dong, K Tang, K Liang Journal of Parallel and Distributed Computing 168, 70-79, 2022 | 2 | 2022 |
THANOS: DBMS Bug Detection via Storage Engine Rotation Based Differential Testing Y Fu, Z Wu, Y Zhang, J Liang, J Fu, Y Jiang, S Li, X Liao Proceedings of the IEEE/ACM 47th International Conference on Software …, 2025 | 1 | 2025 |
MissConf: LLM-Enhanced Reproduction of Configuration-Triggered Bugs Y Fu, T Wang, S Li, J Ding, S Zhou, Z Jia, W Li, Y Jiang, X Liao Proceedings of the 2024 IEEE/ACM 46th International Conference on Software …, 2024 | | 2024 |