wei huo
Citado por
Citado por
Level by level: making flow-and context-sensitive pointer analysis scalable for millions of lines of code
H Yu, J Xue, W Huo, X Feng, Z Zhang
Proceedings of the 8th annual IEEE/ACM international symposium on Code …, 2010
Libd: Scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
αdiff: cross-version binary code similarity detection with dnn
B Liu, W Huo, C Zhang, W Li, F Li, A Piao, W Zou
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
{MVP}: Detecting vulnerabilities using patch-enhanced vulnerability signatures
Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 1165-1182, 2020
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2793-2810, 2020
1dvul: Discovering 1-day vulnerabilities through binary patches
J Peng, F Li, B Liu, L Xu, B Liu, K Chen, W Huo
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
Locating software faults based on minimum debugging frontier set
F Li, Z Li, W Huo, X Feng
IEEE Transactions on Software Engineering 43 (8), 760-776, 2016
Can we make it faster? Efficient may-happen-in-parallel analysis revisited
C Chen, W Huo, L Li, X Feng, K Xing
2012 13th International Conference on Parallel and Distributed Computing …, 2012
Static race detection of interrupt-driven programs
W Huo, H Yu, X Feng, Z Zhang
Journal of Computer Research and Development 48 (12), 2290-2299, 2011
A large-scale empirical study on vulnerability distribution within projects and the lessons learned
B Liu, G Meng, W Zou, Q Gong, F Li, M Lin, D Sun, W Huo, C Zhang
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
SrFuzzer: An automatic fuzzing framework for physical soho router devices to discover multi-type vulnerabilities
Y Zhang, W Huo, K Jian, J Shi, H Lu, L Liu, C Wang, D Sun, C Zhang, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Large-scale third-party library detection in Android markets
M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou
IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018
Making it practical and effective: fast and precise may-happen-in-parallel analysis
C Chen, W Huo, X Feng
2012 21st International Conference on Parallel Architectures and Compilation …, 2012
Open-source license violations of binary software at large scale
M Feng, W Mao, Z Yuan, Y Xiao, G Ban, W Wang, S Wang, Q Tang, J Xu, ...
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
Effective fault localization based on minimum debugging frontier set
F Li, W Huo, C Chen, L Zhong, X Feng, Z Li
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation …, 2013
Constructing benchmarks for supporting explainable evaluations of static application security testing tools
G Hao, F Li, W Huo, Q Sun, W Wang, X Li, W Zou
2019 International Symposium on Theoretical Aspects of Software Engineering …, 2019
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
Z Yuan, M Feng, F Li, G Ban, Y Xiao, S Wang, Q Tang, H Su, C Yu, J Xu, ...
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
L Xu, M Xu, F Li, W Huo
Cybersecurity 3 (1), 1-19, 2020
Survey of Scheduling Policies for Co-Run Degradation
L Fang, C Huimin, H Wei, F Xiaobing
Journal of Computer Research and Development 51 (1), 17, 2014
Parallelizing a machine translation decoder for multicore computer
L Chen, W Huo, H Mi, Z Zhang, X Feng, Z Li
2011 Seventh International Conference on Natural Computation 4, 2220-2225, 2011
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20