Follow
Yinxing Xue
Title
Cited by
Cited by
Year
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3152018
Bingo: Cross-architecture cross-os binary search
M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan
Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016
2362016
Adaptive asynchronous federated learning in resource-constrained edge computing
J Liu, H Xu, L Wang, Y Xu, C Qian, J Huang, H Huang
IEEE Transactions on Mobile Computing 22 (2), 674-690, 2021
1302021
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
1142020
Feature location in a collection of product variants
Y Xue, Z Xing, S Jarzabek
2012 19th Working Conference on Reverse Engineering, 145-154, 2012
1092012
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
992019
Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts
Y Xue, M Ma, Y Lin, Y Sui, J Ye, T Peng
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
942020
Auditing anti-malware tools by evolving android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
942017
Mystique: Evolving android malware for auditing anti-malware tools
G Meng, Y Xue, C Mahinthan, A Narayanan, Y Liu, J Zhang, T Chen
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
872016
Semantic modelling of android malware for effective malware comprehension, detection, and classification
G Meng, Y Xue, Z Xu, Y Liu, J Zhang, A Narayanan
Proceedings of the 25th International Symposium on Software Testing and …, 2016
862016
An empirical assessment of security risks of global android banking apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
842020
Adaptive batch size for federated learning in resource-constrained edge computing
Z Ma, Y Xu, H Xu, Z Meng, L Huang, Y Xue
IEEE Transactions on Mobile Computing 22 (1), 37-53, 2021
672021
Detecting differences across multiple instances of code clones
Y Lin, Z Xing, Y Xue, Y Liu, X Peng, J Sun, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
672014
Jsdc: A hybrid approach for javascript malware detection and classification
J Wang, Y Xue, Y Liu, TH Tan
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
642015
Accurate and scalable cross-architecture cross-os binary code search with emulation
Y Xue, Z Xu, M Chandramohan, Y Liu
IEEE Transactions on Software Engineering 45 (11), 1125-1149, 2018
632018
A survey on automated driving system testing: Landscapes and trends
S Tang, Z Zhang, Y Zhang, J Zhou, Y Guo, S Liu, S Guo, YF Li, L Ma, ...
ACM Transactions on Software Engineering and Methodology 32 (5), 1-62, 2023
602023
Feedback-based debugging
Y Lin, J Sun, Y Xue, Y Liu, J Dong
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
602017
Understanding feature evolution in a family of product variants
Y Xue, Z Xing, S Jarzabek
2010 17th Working Conference on Reverse Engineering, 109-118, 2010
582010
CCGraph: a PDG-based code clone detector with approximate graph matching
Y Zou, B Ban, Y Xue, Y Xu
Proceedings of the 35th IEEE/ACM international conference on automated …, 2020
572020
Detection and classification of malicious JavaScript via attack behavior modelling
Y Xue, J Wang, Y Liu, H Xiao, J Sun, M Chandramohan
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
572015
The system can't perform the operation now. Try again later.
Articles 1–20