2025
LuaTaint: A Static Analysis System for Web Configuration Interface Vulnerability of Internet of Things Devices.
IEEE Internet Things J., March, 2025

BinEGA: Enhancing DNN-based Binary Code Similarity Detection through Efficient Graph Alignment.
Proceedings of the IEEE International Conference on Software Analysis, 2025

2024
Understanding the AI-powered Binary Code Similarity Detection.
CoRR, 2024

Exploring ChatGPT's Capabilities on Vulnerability Management.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Segmentation of brain tumor MRI image based on improved attention module Unet network.
Signal Image Video Process., July, 2023

How ChatGPT is Solving Vulnerability Management Problem.
CoRR, 2023

How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

JACO: JAva Code Layout Optimizer Enabling Continuous Optimization without Pausing Application Services.
Proceedings of the IEEE International Conference on Cluster Computing, 2023

2022
Focus : Function clone identification on cross-platform.
Int. J. Intell. Syst., 2022

Attention mechanism combined with residual recurrent neural network for sound event detection and localization.
EURASIP J. Audio Speech Music. Process., 2022

2021
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Prudent Practices for Designing Virtual Desktop Experiments.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019