Weihang Wang
Cited by
Cited by
Trojaning attack on neural networks
Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS 2, 4, 2018
Understanding the performance of webassembly applications
Y Yan, T Tu, L Zhao, Y Zhou, W Wang
Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021
An empirical analysis of UI-based flaky tests
A Romano, Z Song, S Grandhi, W Yang, W Wang
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
Webranz: web page randomization for better advertisement delivery and web-bot prevention
W Wang, Y Zheng, X Xing, Y Kwon, X Zhang, P Eugster
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
Minerray: Semantics-aware analysis for ever-evolving cryptojacking detection
A Romano, Y Zheng, W Wang
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly
A Romano, D Lehmann, M Pradel, W Wang
43rd IEEE Symposium on Security and Privacy, 2022
Exploring the wild birds’ migration data for the disease spread study of H5N1: a clustering and association approach
M Tang, Y Zhou, J Li, W Wang, P Cui, Y Hou, Z Luo, J Li, F Lei, B Yan
Knowledge and Information Systems 27, 227-251, 2011
An Empirical Study of Bugs in WebAssembly Compilers
A Romano, X Liu, Y Kwon, W Wang
36th ACM/IEEE International Conference on Automated Software Engineering, 2021
ARROW: Automated repair of races on client-side web pages
W Wang, Y Zheng, P Liu, L Xu, X Zhang, P Eugster
Proceedings of the 25th International Symposium on Software Testing and …, 2016
Empowering Web Applications with WebAssembly: Are We There Yet?
W Wang
36th ACM/IEEE International Conference on Automated Software Engineering …, 2021
Wasim: Understanding webassembly applications through classification
A Romano, W Wang
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
Adbudgetkiller: Online advertising budget draining attack
IL Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang
Proceedings of the 2018 World Wide Web Conference, 297-307, 2018
WasmView: visual testing for WebAssembly applications
A Romano, W Wang
2020 IEEE/ACM 42nd International Conference on Software Engineering …, 2020
Finding client-side business flow tampering vulnerabilities
IL Kim, Y Zheng, H Park, W Wang, W You, Y Aafer, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Cpr: cross platform binary code reuse via platform independent trace program
Y Kwon, W Wang, Y Zheng, X Zhang, D Xu
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
Effect of different light intensities on the floral aroma emitted from Chinese Daffodil (Narcissus tazetta L. var. chinensis Roem)
YJ Dou, J Zhai, FM Hou, PS Leng, WH Wang, ZH Hu
Acta Agriculturae Boreali-Occidentalis Sinica 23 (4), 85-91, 2014
Bird flu outbreak prediction via satellite tracking
Y Zhou, M Tang, W Pan, J Li, W Wang, J Shao, L Wu, J Li, Q Yang, B Yan
IEEE Intelligent Systems 29 (4), 10-17, 2013
C2sr: Cybercrime scene reconstruction for post-mortem forensic analysis
Y Kwon, W Wang, J Jung, KH Lee, R Perdisci
Network and Distributed Systems Security (NDSS) Symposium 2021, 2021
Subscription normalization for effective content-based messaging
KR Jayaram, W Wang, P Eugster
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3184-3193, 2015
The system can't perform the operation now. Try again later.
Articles 1–20