Yinxing Xue
Cited by
Cited by
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Bingo: Cross-architecture cross-os binary search
M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
Adaptive asynchronous federated learning in resource-constrained edge computing
J Liu, H Xu, L Wang, Y Xu, C Qian, J Huang, H Huang
IEEE Transactions on Mobile Computing, 2021
Feature location in a collection of product variants
Y Xue, Z Xing, S Jarzabek
2012 19th Working Conference on Reverse Engineering, 145-154, 2012
Auditing anti-malware tools by evolving android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
Semantic modelling of android malware for effective malware comprehension, detection, and classification
G Meng, Y Xue, Z Xu, Y Liu, J Zhang, A Narayanan
Proceedings of the 25th International Symposium on Software Testing and …, 2016
Mystique: Evolving android malware for auditing anti-malware tools
G Meng, Y Xue, C Mahinthan, A Narayanan, Y Liu, J Zhang, T Chen
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
An empirical assessment of security risks of global android banking apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Detecting differences across multiple instances of code clones
Y Lin, Z Xing, Y Xue, Y Liu, X Peng, J Sun, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
Feedback-based debugging
Y Lin, J Sun, Y Xue, Y Liu, J Dong
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts
Y Xue, M Ma, Y Lin, Y Sui, J Ye, T Peng
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
Jsdc: A hybrid approach for javascript malware detection and classification
J Wang, Y Xue, Y Liu, TH Tan
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Understanding feature evolution in a family of product variants
Y Xue, Z Xing, S Jarzabek
2010 17th Working Conference on Reverse Engineering, 109-118, 2010
Detection and classification of malicious JavaScript via attack behavior modelling
Y Xue, J Wang, Y Liu, H Xiao, J Sun, M Chandramohan
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
Accurate and scalable cross-architecture cross-os binary code search with emulation
Y Xue, Z Xu, M Chandramohan, Y Liu
IEEE Transactions on Software Engineering 45 (11), 1125-1149, 2018
IBED: Combining IBEA and DE for optimal feature selection in software product line engineering
Y Xue, J Zhong, TH Tan, Y Liu, W Cai, M Chen, J Sun
Applied Soft Computing 49, 1215-1231, 2016
Optimizing selection of competing features via feedback-directed evolutionary algorithms
TH Tan, Y Xue, M Chen, J Sun, Y Liu, JS Dong
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
Reengineering legacy software products into software product line based on automatic variability analysis
Y Xue
Proceedings of the 33rd International Conference on Software Engineering …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20