Machine learning testing: Survey, landscapes and horizons JM Zhang, M Harman, L Ma, Y Liu IEEE Transactions on Software Engineering, 2020 | 925 | 2020 |
graph2vec: Learning distributed representations of graphs A Narayanan, M Chandramohan, R Venkatesan, L Chen, Y Liu, S Jaiswal arXiv preprint arXiv:1707.05005, 2017 | 885 | 2017 |
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks Y Zhou, S Liu, J Siow, X Du, Y Liu Advances in Neural Information Processing Systems, 10197-10207, 2019 | 848 | 2019 |
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems L Ma, F Juefei-Xu, F Zhang, J Sun, M Xue, B Li, C Chen, T Su, L Li, Y Liu, ... Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018 | 740 | 2018 |
PAT: Towards flexible verification under fairness J Sun, Y Liu, JS Dong, J Pang Computer Aided Verification: 21st International Conference, CAV 2009 …, 2009 | 543 | 2009 |
DeepHunter: a coverage-guided fuzz testing framework for deep neural networks X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019 | 457 | 2019 |
DeepMutation: Mutation Testing of Deep Learning Systems L Ma, F Zhang, J Sun, M Xue, B Li, F Juefei-Xu, C Xie, L Li, Y Liu, J Zhao, ... The 29th IEEE International Symposium on Software Reliability Engineering …, 2018 | 409 | 2018 |
Skyfire: Data-driven seed generation for fuzzing J Wang, B Chen, L Wei, Y Liu 2017 IEEE Symposium on Security and Privacy (SP), 579-594, 2017 | 400 | 2017 |
Guided, stochastic model-based GUI testing of Android apps T Su, G Meng, Y Chen, K Wu, W Yang, Y Yao, G Pu, Y Liu, Z Su Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 383 | 2017 |
Steelix: program-state based binary fuzzing Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 353 | 2017 |
Hawkeye: towards a desired directed grey-box fuzzer H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 298 | 2018 |
Fakespotter: A simple yet robust baseline for spotting ai-synthesized fake faces R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu arXiv preprint arXiv:1909.06122, 2019 | 285 | 2019 |
Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, Y Liu arXiv preprint arXiv:2305.13860, 2023 | 274 | 2023 |
Superion: Grammar-aware greybox fuzzing J Wang, B Chen, L Wei, Y Liu 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 252 | 2019 |
Cloudy with a chance of breach: Forecasting cyber security incidents Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu 24th {USENIX} Security Symposium ({USENIX} Security 15), 1009-1024, 2015 | 249 | 2015 |
Model checking CSP revisited: Introducing a process analysis toolkit J Sun, Y Liu, JS Dong Leveraging Applications of Formal Methods, Verification and Validation, 307-322, 2009 | 246 | 2009 |
BinGo: cross-architecture cross-OS binary search M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations …, 2016 | 227 | 2016 |
Semantics-based online malware detection: Towards efficient real-time protection against malware S Das, Y Liu, W Zhang, M Chandramohan IEEE transactions on information forensics and security 11 (2), 289-302, 2015 | 224 | 2015 |
DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms H Qi, Q Guo, F Juefei-Xu, X Xie, L Ma, W Feng, Y Liu, J Zhao Proceedings of the 28th ACM International Conference on Multimedia, 4318-4327, 2020 | 221 | 2020 |
Who is real bob? adversarial attacks on speaker recognition systems G Chen, S Chenb, L Fan, X Du, Z Zhao, F Song, Y Liu 2021 IEEE Symposium on Security and Privacy (SP), 694-711, 2021 | 220 | 2021 |