Follow
Ying Fu
Ying Fu
Verified email at nudt.edu.cn
Title
Cited by
Cited by
Year
Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary
J Gao, X Yang, Y Fu, Y Jiang, J Sun
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
1742018
Evmfuzzer: detect evm vulnerabilities via fuzz testing
Y Fu, M Ren, F Ma, H Shi, X Yang, Y Jiang, H Li, X Shi
Proceedings of the 2019 27th ACM joint meeting on european software …, 2019
104*2019
EVM: From offline detection to online reinforcement for Ethereum virtual machine
F Ma, Y Fu, M Ren, M Wang, Y Jiang, K Zhang, H Li, X Shi
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
622019
Vulseeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation
J Gao, X Yang, Y Fu, Y Jiang, H Shi, J Sun
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
392018
Security reinforcement for Ethereum virtual machine
F Ma, M Ren, Y Fu, M Wang, H Li, H Song, Y Jiang
Information Processing & Management 58 (4), 102565, 2021
302021
Industry practice of coverage-guided enterprise linux kernel fuzzing
H Shi, R Wang, Y Fu, M Wang, X Shi, X Jiao, H Song, Y Jiang, J Sun
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
272019
Making smart contract development more secure and easier
M Ren, F Ma, Z Yin, Y Fu, H Li, W Chang, Y Jiang
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
252021
Gasfuzz: Generating high gas consumption inputs to avoid out-of-gas vulnerability
F Ma, Y Fu, M Ren, W Sun, Z Liu, Y Jiang, J Sun, J Sun
arXiv preprint arXiv:1910.02945 1, 7, 2019
192019
Vulnerable code clone detection for operating system through correlation-induced learning
H Shi, R Wang, Y Fu, Y Jiang, J Dong, K Tang, J Sun
IEEE Transactions on Industrial Informatics 15 (12), 6551-6559, 2019
172019
Scstudio: a secure and efficient integrated development environment for smart contracts
M Ren, F Ma, Z Yin, H Li, Y Fu, T Chen, Y Jiang
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
122021
Industry practice of configuration auto-tuning for cloud applications and services
R Wang, Q Wang, Y Hu, H Shi, Y Shen, Y Zhan, Y Fu, Z Liu, X Shi, Y Jiang
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
72022
Hyperattack: Multi-gradient-guided white-box adversarial structure attack of hypergraph neural networks
C Hu, R Yu, B Zeng, Y Zhan, Y Fu, Q Zhang, R Liu, H Shi
arXiv preprint arXiv:2302.12407, 2023
62023
V-gas: Generating high gas consumption inputs to avoid out-of-gas vulnerability
F Ma, Y Fu, M Ren, W Sun, H Song, Y Jiang, J Sun, J Sun
arXiv preprint arXiv:1910.02945, 2019
42019
Cube-evo: A query-efficient black-box attack on video classification system
Y Zhan, Y Fu, L Huang, J Guo, H Shi, H Song, C Hu
IEEE Transactions on Reliability, 2023
22023
Abaci-finder: Linux kernel crash classification through stack trace similarity learning
H Shi, G Wang, Y Fu, C Hu, H Song, J Dong, K Tang, K Liang
Journal of Parallel and Distributed Computing 168, 70-79, 2022
22022
THANOS: DBMS Bug Detection via Storage Engine Rotation Based Differential Testing
Y Fu, Z Wu, Y Zhang, J Liang, J Fu, Y Jiang, S Li, X Liao
Proceedings of the IEEE/ACM 47th International Conference on Software …, 2025
12025
MissConf: LLM-Enhanced Reproduction of Configuration-Triggered Bugs
Y Fu, T Wang, S Li, J Ding, S Zhou, Z Jia, W Li, Y Jiang, X Liao
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–17