Follow
Ying Fu
Ying Fu
Verified email at nudt.edu.cn
Title
Cited by
Cited by
Year
Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary
J Gao, X Yang, Y Fu, Y Jiang, J Sun
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
1432018
Evmfuzzer: detect evm vulnerabilities via fuzz testing
Y Fu, M Ren, F Ma, H Shi, X Yang, Y Jiang, H Li, X Shi
Proceedings of the 2019 27th ACM joint meeting on european software …, 2019
98*2019
EVM: From offline detection to online reinforcement for Ethereum virtual machine
F Ma, Y Fu, M Ren, M Wang, Y Jiang, K Zhang, H Li, X Shi
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
592019
Vulseeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation
J Gao, X Yang, Y Fu, Y Jiang, H Shi, J Sun
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
372018
Security reinforcement for Ethereum virtual machine
F Ma, M Ren, Y Fu, M Wang, H Li, H Song, Y Jiang
Information Processing & Management 58 (4), 102565, 2021
272021
Industry practice of coverage-guided enterprise linux kernel fuzzing
H Shi, R Wang, Y Fu, M Wang, X Shi, X Jiao, H Song, Y Jiang, J Sun
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
252019
Making smart contract development more secure and easier
M Ren, F Ma, Z Yin, Y Fu, H Li, W Chang, Y Jiang
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
232021
Gasfuzz: Generating high gas consumption inputs to avoid out-of-gas vulnerability
F Ma, Y Fu, M Ren, W Sun, Z Liu, Y Jiang, J Sun, J Sun
arXiv preprint arXiv:1910.02945 1, 7, 2019
192019
Vulnerable code clone detection for operating system through correlation-induced learning
H Shi, R Wang, Y Fu, Y Jiang, J Dong, K Tang, J Sun
IEEE Transactions on Industrial Informatics 15 (12), 6551-6559, 2019
132019
Scstudio: a secure and efficient integrated development environment for smart contracts
M Ren, F Ma, Z Yin, H Li, Y Fu, T Chen, Y Jiang
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
102021
Industry practice of configuration auto-tuning for cloud applications and services
R Wang, Q Wang, Y Hu, H Shi, Y Shen, Y Zhan, Y Fu, Z Liu, X Shi, Y Jiang
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
32022
V-gas: Generating high gas consumption inputs to avoid out-of-gas vulnerability
F Ma, Y Fu, M Ren, W Sun, H Song, Y Jiang, J Sun, J Sun
arXiv preprint arXiv:1910.02945, 2019
32019
Cube-evo: A query-efficient black-box attack on video classification system
Y Zhan, Y Fu, L Huang, J Guo, H Shi, H Song, C Hu
IEEE Transactions on Reliability, 2023
22023
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks
C Hu, R Yu, B Zeng, Y Zhan, Y Fu, Q Zhang, R Liu, H Shi
arXiv preprint arXiv:2302.12407, 2023
22023
Abaci-finder: Linux kernel crash classification through stack trace similarity learning
H Shi, G Wang, Y Fu, C Hu, H Song, J Dong, K Tang, K Liang
Journal of Parallel and Distributed Computing 168, 70-79, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–15