关注
Bihuan Chen
Bihuan Chen
Associate Professor, Fudan University
在 fudan.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Skyfire: Data-driven seed generation for fuzzing
J Wang, B Chen, L Wei, Y Liu
Proceedings of the 38th IEEE Symposium on Security and Privacy, 579-594, 2017
3942017
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 11th Joint Meeting of the European Software Engineering …, 2017
3482017
Hawkeye: Towards a Desired Directed Grey-box Fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2912018
Superion: Grammar-aware greybox fuzzing
J Wang, B Chen, L Wei, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
270*2019
Spain: security patch analysis for binaries towards understanding the pain and pills
Z Xu, B Chen, M Chandramohan, Y Liu, F Song
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1582017
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics
X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
1152019
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop
X Peng, B Chen, Y Yu, W Zhao
Journal of Systems and Software 85 (12), 2707-2719, 2012
103*2012
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects
Y Wang, B Chen, K Huang, B Shi, C Xu, X Peng, Y Wu, Y Liu
2020 IEEE International Conference on Software Maintenance and Evolution …, 2020
1012020
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures
Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
902020
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis
X Xie, B Chen, Y Liu, W Le, X Li
Proceedings of the 24th ACM SIGSOFT International Symposium on the …, 2016
762016
Generating Performance Distributions via Probabilistic Symbolic Execution
B Chen, Y Liu, W Le
Proceedings of the 38th International Conference on Software Engineering, 49-60, 2016
752016
Self-adaptation through incremental generative model transformations at runtime
B Chen, X Peng, Y Yu, B Nuseibeh, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
742014
Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem
C Liu, S Chen, L Fan, B Chen, Y Liu, X Peng
Proceedings of the 44th International Conference on Software Engineering …, 2022
672022
Patch based vulnerability matching for binary programs
Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
622020
ClDiff: Generating Concise Linked Code Differences
K Huang, B Chen, X Peng, D Zhou, Y Wang, Y Liu, W Zhao
Proceedings of the 33rd IEEE/ACM International Conference on Automated …, 2018
582018
DeepLink: Recovering issue-commit links based on deep learning
H Ruan, B Chen, X Peng, W Zhao
Journal of Systems and Software 158, 110406, 2019
402019
A Large-Scale Empirical Study of Compiler Errors in Continuous Integration
C Zhang, B Chen, L Chen, X Peng, W Zhao
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
372019
BuildFast: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration
B Chen, L Chen, C Zhang, X Peng
352020
Understanding performance problems in deep learning systems
J Cao, B Chen, C Sun, L Hu, S Wu, X Peng
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
34*2022
Automatic loop summarization via path dependency analysis
X Xie, B Chen, L Zou, Y Liu, W Le, X Li
IEEE Transactions on Software Engineering 45 (6), 537-557, 2017
332017
系统目前无法执行此操作,请稍后再试。
文章 1–20