Skyfire: Data-driven seed generation for fuzzing J Wang, B Chen, L Wei, Y Liu Proceedings of the 38th IEEE Symposium on Security and Privacy, 579-594, 2017 | 394 | 2017 |
Steelix: program-state based binary fuzzing Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu Proceedings of the 11th Joint Meeting of the European Software Engineering …, 2017 | 348 | 2017 |
Hawkeye: Towards a Desired Directed Grey-box Fuzzer H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 291 | 2018 |
Superion: Grammar-aware greybox fuzzing J Wang, B Chen, L Wei, Y Liu 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 270* | 2019 |
Spain: security patch analysis for binaries towards understanding the pain and pills Z Xu, B Chen, M Chandramohan, Y Liu, F Song 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017 | 158 | 2017 |
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 115 | 2019 |
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop X Peng, B Chen, Y Yu, W Zhao Journal of Systems and Software 85 (12), 2707-2719, 2012 | 103* | 2012 |
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects Y Wang, B Chen, K Huang, B Shi, C Xu, X Peng, Y Wu, Y Liu 2020 IEEE International Conference on Software Maintenance and Evolution …, 2020 | 101 | 2020 |
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ... 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 90 | 2020 |
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis X Xie, B Chen, Y Liu, W Le, X Li Proceedings of the 24th ACM SIGSOFT International Symposium on the …, 2016 | 76 | 2016 |
Generating Performance Distributions via Probabilistic Symbolic Execution B Chen, Y Liu, W Le Proceedings of the 38th International Conference on Software Engineering, 49-60, 2016 | 75 | 2016 |
Self-adaptation through incremental generative model transformations at runtime B Chen, X Peng, Y Yu, B Nuseibeh, W Zhao Proceedings of the 36th International Conference on Software Engineering …, 2014 | 74 | 2014 |
Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem C Liu, S Chen, L Fan, B Chen, Y Liu, X Peng Proceedings of the 44th International Conference on Software Engineering …, 2022 | 67 | 2022 |
Patch based vulnerability matching for binary programs Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020 | 62 | 2020 |
ClDiff: Generating Concise Linked Code Differences K Huang, B Chen, X Peng, D Zhou, Y Wang, Y Liu, W Zhao Proceedings of the 33rd IEEE/ACM International Conference on Automated …, 2018 | 58 | 2018 |
DeepLink: Recovering issue-commit links based on deep learning H Ruan, B Chen, X Peng, W Zhao Journal of Systems and Software 158, 110406, 2019 | 40 | 2019 |
A Large-Scale Empirical Study of Compiler Errors in Continuous Integration C Zhang, B Chen, L Chen, X Peng, W Zhao Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 37 | 2019 |
BuildFast: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration B Chen, L Chen, C Zhang, X Peng | 35 | 2020 |
Understanding performance problems in deep learning systems J Cao, B Chen, C Sun, L Hu, S Wu, X Peng Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 34* | 2022 |
Automatic loop summarization via path dependency analysis X Xie, B Chen, L Zou, Y Liu, W Le, X Li IEEE Transactions on Software Engineering 45 (6), 537-557, 2017 | 33 | 2017 |