Memlock: Memory usage guided fuzzing C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 126 | 2020 |
CDGDroid: Android malware detection based on deep learning using CFG and DFG Z Xu, K Ren, S Qin, F Craciun International Conference on Formal Engineering Methods, 177-193, 2018 | 64 | 2018 |
Set-theoretic foundation of parametric polymorphism and subtyping G Castagna, Z Xu Proceedings of the 16th ACM SIGPLAN international conference on Functional …, 2011 | 60 | 2011 |
Polymorphic functions with set-theoretic types: part 1: syntax, semantics, and evaluation G Castagna, K Nguyen, Z Xu, H Im, S Lenglet, L Padovani Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of …, 2014 | 56 | 2014 |
Polymorphic Functions with Set-Theoretic Types: Part 2: Local Type Inference and Type Reconstruction G Castagna, K Nguyen, Z Xu, P Abate Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015 | 49 | 2015 |
Android malware family classification and characterization using CFG and DFG XU Zhiwu, K Ren, F Song 2019 International Symposium on Theoretical Aspects of Software Engineering …, 2019 | 47 | 2019 |
Bidirectional stochastic configuration network for regression problems W Cao, Z Xie, J Li, Z Xu, Z Ming, X Wang Neural Networks 140, 237-246, 2021 | 41 | 2021 |
A toolkit for generating sentences from context-free grammars Z Xu, L Zheng, H Chen International Journal of Software and Informatics 5 (4), 659-676, 2011 | 27 | 2011 |
A toolkit for generating sentences from context-free grammars Z Xu, L Zheng, H Chen Proceedings of the 2010 8th IEEE International Conference on Software …, 2010 | 27 | 2010 |
FlashRegex: Deducing Anti-ReDoS Regexes from Examples Y Li, Z Xu, J Cao, H Chen, T Ge, SC Cheung, H Zhao 2020 35th IEEE/ACM International Conference on Automated Software …, 2020 | 22 | 2020 |
Controlled concurrency testing via periodical scheduling C Wen, M He, B Wu, Z Xu, S Qin Proceedings of the 44th International Conference on Software Engineering …, 2022 | 18 | 2022 |
State-taint analysis for detecting resource bugs Z Xu, C Wen, S Qin Science of Computer Programming 162, 93-109, 2018 | 18 | 2018 |
ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection Y Li, Z Chen, J Cao, Z Xu, Q Peng, H Chen, L Chen, SC Cheung 30th {USENIX} Security Symposium ({USENIX} Security 21), 3847-3864, 2021 | 17 | 2021 |
A permission-dependent type system for secure information flow analysis H Chen, A Tiu, Z Xu, Y Liu 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 218-232, 2018 | 17 | 2018 |
Research Progress of Zero-Shot Learning Beyond Computer Vision W Cao, C Zhou, Y Wu, Z Ming, Z Xu, J Zhang International Conference on Algorithms and Architectures for Parallel …, 2020 | 16 | 2020 |
TRANSREGEX: Multi-modal Regular Expression Synthesis by Generate-and-Repair Y Li, S Li, Z Xu, J Cao, Z Chen, Y Hu, H Chen, SC Cheung 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 15 | 2021 |
Learning types for binaries Z Xu, C Wen, S Qin International Conference on Formal Engineering Methods, 430-446, 2017 | 12 | 2017 |
How do api selections affect the runtime performance of data analytics tasks? Y Tao, S Tang, Y Liu, Z Xu, S Qin 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 11 | 2019 |
Probabilistic Alternating-Time µ-Calculus F Song, Y Zhang, T Chen, Y Tang, Z Xu Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 6179-6186, 2019 | 11 | 2019 |
Towards ‘Verifying’a Water Treatment System J Wang, J Sun, Y Jia, S Qin, Z Xu International Symposium on Formal Methods, 73-92, 2018 | 11 | 2018 |