Jiaguang Sun

Orcid: 0000-0002-5884-7939

According to our database1, Jiaguang Sun authored at least 71 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
PATA: Fuzzing with Path Aware Taint Analysis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
RIFF: Reduced Instruction Footprint for Coverage-Guided Fuzzing.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

2020
Multi-Task Learning of Generalizable Representations for Video Action Recognition.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

A Multi-Player Minimax Game for Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

2019
Industry practice of coverage-guided enterprise Linux kernel fuzzing.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Enabling clone detection for ethereum via smart contract birthmarks.
Proceedings of the 27th International Conference on Program Comprehension, 2019

Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Go-clone: graph-embedding based clone detector for Golang.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

VFQL: combinational static analysis as query language.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Engineering a Better Fuzzer with Synergically Integrated Optimizations.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Vetting API usages in C programs with IMChecker.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

A Sensor Attack Detection Method in Intelligent Vehicle with Multiple Sensors.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
EClone: detect semantic clones in Ethereum via symbolic transaction sketch.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

PAFL: extend fuzzing optimizations of single mode to industrial parallel mode.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

DLFuzz: differential fuzzing testing of deep learning systems.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

S-gram: towards semantic-aware security auditing for Ethereum smart contracts.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

SAFL: increasing and accelerating testing coverage with symbolic execution and guided fuzzing.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Weak-assert: a weakness-oriented assertion recommendation toolkit for program analysis.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Scalable and Extensible Static Memory Safety Analysis with Summary over Access Path.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

Scalable Verification Framework for C Program.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
A language model for statements of software code.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

A static analysis tool with optimizations for reachability determination.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

IntPTI: automatic integer error repair with proper-type inference.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Vertex-Weighted Hypergraph Learning for Multi-View Object Classification.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Stochastic optimization of program obfuscation.
Proceedings of the 39th International Conference on Software Engineering, 2017

Dependable integrated clinical system architecture with runtime verification.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

Assertion Recommendation for Formal Program Verification.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A Constraint-Pattern Based Method for Reachability Determination.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Tsmart-BIPEX: An Integrated Graphical Design Toolkit for Software Systems.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

C Code Verification based on the Extended Labeled Transition System Model.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

Taming Interrupts for Verifying Industrial Multifunction Vehicle Bus Controllers.
Proceedings of the FM 2016: Formal Methods, 2016

Safety-Assured Formal Model-Driven Design of the Multifunction Vehicle Bus Controller.
Proceedings of the FM 2016: Formal Methods, 2016

Automatic Fix for C Integer Errors by Precision Improvement.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
PLC programs' checking method and strategy based on module state transfer.
Proceedings of the IEEE International Conference on Information and Automation, 2015

2014
Application-Specific Architecture Selection for Embedded Systems via Schedulability Analysis.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Matching heterogeneous events with patterns.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Transfer Joint Matching for Unsupervised Domain Adaptation.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

2013
System reliability calculation based on the run-time analysis of ladder program.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Design and optimization of multi-clocked embedded systems using formal technique.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Transfer Feature Learning with Joint Distribution Adaptation.
Proceedings of the IEEE International Conference on Computer Vision, 2013

Transfer Sparse Coding for Robust Image Representation.
Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013

Verification and Implementation of the Protocol Standard in Train Control System.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Sequential dependency and reliability analysis of embedded systems.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

2012
Modeling and Validation of PLC-Controlled Systems: A Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Uncertain Model and Algorithm for Hardware/Software Partitioning.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

Automatic image annotation using tag-related random search over visual neighbors.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Proving Computational Geometry Algorithms in TLA+2.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Parallel Spatial Hashing for Collision Detection of Deformable Surfaces.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011

2010
Reconstructing 3D Objects from 2D Sectional Views of Engineering Drawings Using Volume-Based Method.
Proceedings of the SMI 2010, 2010

2008
Towards trace semantics for WS-CDL with alignments.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

2007
Mining Invisible Tasks from Event Logs.
Proceedings of the Advances in Data and Web Management, 2007

A machine learning approach to semi-automating workflow staff assignment.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Using Decision Tree Learning to Predict Workflow Activity Time Consumption.
Proceedings of the ICEIS 2007, 2007

Effective heuristics for counterexample-guided abstraction refinement.
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007

Intersection Testing between an Ellipsoid and an Algebraic Surface.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

2006
Constrained Delaunay Triangulation Using Delaunay Visibility.
Proceedings of the Advances in Visual Computing, Second International Symposium, 2006

Optimal Parameterizations of Bézier Surfaces.
Proceedings of the Advances in Visual Computing, Second International Symposium, 2006

Using <i>pi</i>-Calculus to Formalize Domain Administration of RBAC.
Proceedings of the Information Security Practice and Experience, 2006

A Distributed Domain Administration of RBAC Model in Collaborative Environments.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Synthesizing 2D directional moving texture.
Proceedings of the Spring Conference on Computer Graphics, 2005

Secure Anonymous Communication with Conditional Traceability.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Segmented channel routing with pin rearrangements via satisfiability.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Information Push-Delivery for User-Centered and Personalized Service.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...