Follow
Yinxing Xue
Title
Cited by
Cited by
Year
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
2732018
Bingo: Cross-architecture cross-os binary search
M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan
Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016
2092016
Feature location in a collection of product variants
Y Xue, Z Xing, S Jarzabek
2012 19th Working Conference on Reverse Engineering, 145-154, 2012
1092012
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
922020
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
902019
Auditing anti-malware tools by evolving android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
902017
Adaptive asynchronous federated learning in resource-constrained edge computing
J Liu, H Xu, L Wang, Y Xu, C Qian, J Huang, H Huang
IEEE Transactions on Mobile Computing 22 (2), 674-690, 2021
882021
Mystique: Evolving android malware for auditing anti-malware tools
G Meng, Y Xue, C Mahinthan, A Narayanan, Y Liu, J Zhang, T Chen
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
852016
Semantic modelling of android malware for effective malware comprehension, detection, and classification
G Meng, Y Xue, Z Xu, Y Liu, J Zhang, A Narayanan
Proceedings of the 25th International Symposium on Software Testing and …, 2016
842016
An empirical assessment of security risks of global android banking apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
702020
Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts
Y Xue, M Ma, Y Lin, Y Sui, J Ye, T Peng
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
682020
Detecting differences across multiple instances of code clones
Y Lin, Z Xing, Y Xue, Y Liu, X Peng, J Sun, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
672014
Understanding feature evolution in a family of product variants
Y Xue, Z Xing, S Jarzabek
2010 17th Working Conference on Reverse Engineering, 109-118, 2010
592010
Jsdc: A hybrid approach for javascript malware detection and classification
J Wang, Y Xue, Y Liu, TH Tan
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
582015
Feedback-based debugging
Y Lin, J Sun, Y Xue, Y Liu, J Dong
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
572017
Detection and classification of malicious JavaScript via attack behavior modelling
Y Xue, J Wang, Y Liu, H Xiao, J Sun, M Chandramohan
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
542015
Accurate and scalable cross-architecture cross-os binary code search with emulation
Y Xue, Z Xu, M Chandramohan, Y Liu
IEEE Transactions on Software Engineering 45 (11), 1125-1149, 2018
522018
Adaptive batch size for federated learning in resource-constrained edge computing
Z Ma, Y Xu, H Xu, Z Meng, L Huang, Y Xue
IEEE Transactions on Mobile Computing 22 (1), 37-53, 2021
502021
CCGraph: a PDG-based code clone detector with approximate graph matching
Y Zou, B Ban, Y Xue, Y Xu
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
472020
Optimizing selection of competing features via feedback-directed evolutionary algorithms
TH Tan, Y Xue, M Chen, J Sun, Y Liu, JS Dong
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
452015
The system can't perform the operation now. Try again later.
Articles 1–20