Haoyu Wang
Orcid: 0000-0003-1100-8633Affiliations:
- Huazhong University of Science and Technology, Wuhan, China
- Beijing University of Posts and Telecommunications, Beijing, China
- Peking University, MOE Key Laboratory of High-Confidence Software Technologies, Beijing, China (PhD 2016)
According to our database1,
Haoyu Wang
authored at least 212 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Software Eng., June, 2024
ACM Trans. Softw. Eng. Methodol., June, 2024
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts.
ACM Trans. Model. Perform. Evaluation Comput. Syst., June, 2024
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024
ACM Trans. Softw. Eng. Methodol., February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors.
IEEE Trans. Dependable Secur. Comput., 2024
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection.
Proc. ACM Softw. Eng., 2024
Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models.
Proc. ACM Program. Lang., 2024
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models.
CoRR, 2024
CoRR, 2024
PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach.
CoRR, 2024
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs.
CoRR, 2024
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments.
CoRR, 2024
Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks.
CoRR, 2024
CoRR, 2024
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models.
CoRR, 2024
CoRR, 2024
NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing.
CoRR, 2024
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing.
CoRR, 2024
CoRR, 2024
Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum.
CoRR, 2024
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards.
CoRR, 2024
HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models.
CoRR, 2024
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis.
CoRR, 2024
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts.
Proceedings of the 33rd USENIX Security Symposium, 2024
Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024
NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Engineering of Complex Computer Systems - 28th International Conference, 2024
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proc. ACM Meas. Anal. Comput. Syst., December, 2023
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective.
ACM Trans. Softw. Eng. Methodol., November, 2023
<i>FaaSLight</i>: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing.
ACM Trans. Softw. Eng. Methodol., September, 2023
IEEE Trans. Software Eng., April, 2023
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps.
IEEE Trans. Software Eng., 2023
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation.
CoRR, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Proceedings of the Static Analysis - 30th International Symposium, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023
Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
Proc. ACM Meas. Anal. Comput. Syst., 2022
CoRR, 2022
LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing.
CoRR, 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity.
Proceedings of the 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2022
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Path-sensitive code embedding via contrastive learning for software vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection.
ACM Trans. Softw. Eng. Methodol., 2021
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
Empir. Softw. Eng., 2021
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO.
CoRR, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Proceedings of the 18th IEEE/ACM International Conference on Mining Software Repositories, 2021
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem.
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts.
CoRR, 2020
CoRR, 2020
When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories.
CoRR, 2020
CoRR, 2020
Understanding Challenges in Deploying Deep Learning Based Software: An Empirical Study.
CoRR, 2020
CoRR, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
All your app links are belong to us: understanding the threats of instant apps based attacks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020
A<sup>3</sup>Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
2019
J. Syst. Softw., 2019
J. Comput. Sci. Technol., 2019
EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level.
CoRR, 2019
Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play.
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
Proceedings of the 3rd ACM SIGSOFT International Workshop on App Market Analytics, 2019
Proceedings of the 16th International Conference on Mining Software Repositories, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Proceedings of the 15th International Conference on Mining Software Repositories, 2018
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
ACM Trans. Inf. Syst., 2017
CoRR, 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
2016
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
2015
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Proceedings of the 23rd International World Wide Web Conference, 2014
2013
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013