LuaTaint: A Static Analysis System for Web Configuration Interface Vulnerability of Internet of Things Devices.
IEEE Internet Things J., March, 2025
BinEGA: Enhancing DNN-based Binary Code Similarity Detection through Efficient Graph Alignment.
Proceedings of the IEEE International Conference on Software Analysis, 2025
Understanding the AI-powered Binary Code Similarity Detection.
CoRR, 2024
Exploring ChatGPT's Capabilities on Vulnerability Management.
Proceedings of the 33rd USENIX Security Symposium, 2024
Segmentation of brain tumor MRI image based on improved attention module Unet network.
Signal Image Video Process., July, 2023
How ChatGPT is Solving Vulnerability Management Problem.
CoRR, 2023
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
JACO: JAva Code Layout Optimizer Enabling Continuous Optimization without Pausing Application Services.
Proceedings of the IEEE International Conference on Cluster Computing, 2023
Focus : Function clone identification on cross-platform.
Int. J. Intell. Syst., 2022
Attention mechanism combined with residual recurrent neural network for sound event detection and localization.
EURASIP J. Audio Speech Music. Process., 2022
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020
Prudent Practices for Designing Virtual Desktop Experiments.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019