Zhen Huang

Orcid: 0000-0002-7684-8388

Affiliations:
  • DePaul University, Chicago, IL, USA
  • University of Toronto, Department of Electrical and Computer Engineering, ON, Canada (former)


According to our database1, Zhen Huang authored at least 20 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Path-wise Vulnerability Mitigation.
CoRR, 2024

Vulnerability Detection in C/C++ Code with Deep Learning.
CoRR, 2024

A New Pipeline for Knowledge Graph Reasoning Enhanced by Large Language Models Without Fine-Tuning.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
Multiclass Classification of Software Vulnerabilities with Deep Learning.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

2022
Mitigating Vulnerabilities in Closed Source Software.
EAI Endorsed Trans. Security Safety, 2022

Runtime Recovery for Integer Overflows.
Proceedings of the 6th International Conference on System Reliability and Safety, 2022

Learning-based Vulnerability Detection in Binary Code.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

Semantic-Aware Vulnerability Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Detecting Software Vulnerabilities Using Neural Networks.
Proceedings of the ICMLC 2021: 13th International Conference on Machine Learning and Computing, 2021

Fine-grained Program Partitioning for Security.
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

Integer Overflow Detection with Delayed Runtime Test.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Using Safety Properties to Generate Vulnerability Patches.
login Usenix Mag., 2020

2017
Senx: Sound Patch Generation for Security Vulnerabilities.
CoRR, 2017

SAIC: Identifying Configuration Files for System Configuration Management.
CoRR, 2017

BinPro: A Tool for Binary Source Code Provenance.
CoRR, 2017

2016
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

LMP: light-weighted memory protection with hardware assistance.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2014
Ocasta: Clustering Configuration Settings for Error Recovery.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2012
PScout: analyzing the Android permission specification.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Short paper: a look at smartphone permission models.
Proceedings of the SPSM'11, 2011


  Loading...