Follow
Hongxu Chen
Title
Cited by
Cited by
Year
Deephunter: a coverage-guided fuzz testing framework for deep neural networks
X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See
Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019
2212019
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1452018
Auditing anti-malware tools by evolving android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
752017
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
672020
Exploiting centrality information with graph convolutions for network representation learning
H Chen, H Yin, T Chen, QVH Nguyen, WC Peng, X Li
2019 IEEE 35th International Conference on Data Engineering (ICDE), 590-601, 2019
562019
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
522020
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
462019
Coverage-guided fuzzing for deep neural networks
X Xie, L Ma, F Juefei-Xu, H Chen, M Xue, B Li, Y Liu, J Zhao, J Yin, S See
arXiv preprint arXiv:1809.01266 3, 2018
432018
MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multi-threaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
422020
S-looper: Automatic summarization for multipath string loops
X Xie, Y Liu, W Le, X Li, H Chen
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
342015
Social boosted recommendation with folded bipartite network embedding
H Chen, H Yin, T Chen, W Wang, X Li, X Hu
IEEE Transactions on Knowledge and Data Engineering, 2020
332020
Deephunter: Hunting deep neural network defects via coverage-guided fuzzing
X Xie, L Ma, F Juefei-Xu, H Chen, M Xue, B Li, Y Liu, J Zhao, J Yin, S See
arXiv preprint arXiv:1809.01266, 2018
192018
FOT: A versatile, configurable, extensible fuzzing framework
H Chen, Y Li, B Chen, Y Xue, Y Liu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
162018
Typestate-guided fuzzer for discovering use-after-free vulnerabilities. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
IEEE, 999ś1010, 2020
132020
A permission-dependent type system for secure information flow analysis
H Chen, A Tiu, Z Xu, Y Liu
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 218-232, 2018
122018
APICraft: Fuzz Driver Generation for Closed-source {SDK} Libraries
C Zhang, X Lin, Y Li, Y Xue, J Xie, H Chen, X Ying, J Wang, Y Liu
30th USENIX Security Symposium (USENIX Security 21), 2811-2828, 2021
72021
Coverage-guided fuzzing for feedforward neural networks
X Xie, H Chen, Y Li, L Ma, Y Liu, J Zhao
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
72019
Ori: A Greybox Fuzzer for SOME/IP Protocols in Automotive Ethernet
Y Li, H Chen, C Zhang, S Xiong, C Liu, Y Wang
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 495-499, 2020
52020
A permission-dependent type system for secure information flow analysis
H Chen, A Tiu, Z Xu, Y Liu
arXiv preprint arXiv:1709.09623, 2017
32017
Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching
C Yang, Z Xu, H Chen, Y Liu, X Gong, B Liu
arXiv preprint arXiv:2204.08237, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20