Hongfa Xue

Orcid: 0000-0003-1904-5586

According to our database1, Hongfa Xue authored at least 13 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Integrated Reasoning Engine for Pointer-related Code Clone Detection.
CoRR, 2021

2020
CHOP: Bypassing runtime bounds checking through convex hull Optimization.
Comput. Secur., 2020

Twin-Finder: Integrated Reasoning Engine for Pointer-Related Code Clone Detection.
Proceedings of the IEEE 14th International Workshop on Software Clones, 2020

2019
AMASS: Automated Software Mass Customization via Feature Identification and Tailoring.
EAI Endorsed Trans. Security Safety, 2019

Twin-Finder: Integrated Reasoning Engine for Pointer-related Code Clone Detection.
CoRR, 2019

Machine Learning-Based Analysis of Program Binaries: A Comprehensive Study.
IEEE Access, 2019

Hecate: Automated Customization of Program and Communication Features to Reduce Attack Surfaces.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
Clone-hunter: accelerated bound checks elimination via binary code clone detection.
Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, 2018

Clone-Slicer: Detecting Domain Specific Binary Code Clones through Program Slicing.
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, 2018

MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2014
Personal Attributes Extraction Based on the Combination of Trigger Words, Dictionary and Rules.
Proceedings of The Third CIPS-SIGHAN Joint Conference on Chinese Language Processing, 2014


  Loading...