Follow
Haoyu WANG (王浩宇)
Haoyu WANG (王浩宇)
Full Professor@HUST <- BUPT <- PKU
Verified email at hust.edu.cn - Homepage
Title
Cited by
Cited by
Year
Large language models for software engineering: A systematic literature review
X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li, X Luo, D Lo, J Grundy, ...
ACM Transactions on Software Engineering and Methodology, 2023
3912023
Libradar: Fast and accurate detection of third-party libraries in android apps
Z Ma, H Wang, Y Guo, X Chen
Proceedings of the 38th international conference on software engineering …, 2016
3032016
Masterkey: Automated jailbreaking of large language model chatbots
G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu
Proc. ISOC NDSS, 2024
274*2024
Wukong: A scalable and accurate two-phase approach to android app clone detection
H Wang, Y Guo, Z Ma, X Chen
Proceedings of the 2015 international symposium on software testing and …, 2015
2592015
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network
X Cheng, H Wang, J Hua, G Xu, Y Sui
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-33, 2021
2462021
Prompt Injection attack against LLM-integrated Applications
Y Liu, G Deng, Y Li, K Wang, Z Wang, X Wang, T Zhang, Y Liu, H Wang, ...
arXiv preprint arXiv:2306.05499, 2023
2312023
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets
H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ...
Proceedings of the 2018 Internet Measurement Conference (IMC), 2018
1672018
Cid: Automating the detection of api-related compatibility issues in android apps
L Li, TF Bissyandé, H Wang, J Klein
Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018
1582018
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, YC Hu
The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019
1442019
Towards a first step to understand flash loan and its applications in defi ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021
135*2021
A comprehensive study on challenges in deploying deep learning based software
Z Chen, Y Cao, Y Liu, H Wang, T Xie, X Liu
Proceedings of the 28th ACM joint meeting on European software engineering …, 2020
1222020
Characterizing cryptocurrency exchange scams
P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu
Computers & Security 98, 101993, 2020
1202020
Flow2vec: Value-flow-based precise code embedding
Y Sui, X Cheng, G Zhang, H Wang
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-27, 2020
1072020
FraudDroid: Automated Ad Fraud Detection for Android Apps
F Dong, H Wang, L Li, Y Guo, TF Bissyande, T Liu, G Xu, J Klein
ESEC/FSE 2018, 2018
1052018
{EOSAFE}: security analysis of {EOSIO} smart contracts
N He, R Zhang, H Wang, L Wu, X Luo, Y Guo, T Yu, X Jiang
30th USENIX security symposium (USENIX Security 21), 1271-1288, 2021
102*2021
Understanding (Mis) Behavior on the EOSIO Blockchain
Y HUANG, H WANG, LEI WU, G TYSON, X LUO, RUN ZHANG, X LIU, ...
ACM SIGMETRICS 2020, 2020
102*2020
Make web3. 0 connected
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu
IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021
992021
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
N He, L Wu, H Wang, Y Guo, X Jiang
The 24th International Conference on Financial Cryptography and Data …, 2020
942020
Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange
P Xia, H Wang, B Gao, W Su, Z Yu, X Luo, C Zhang, X Xiao, G Xu
Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (3 …, 2021
93*2021
Path-sensitive code embedding via contrastive learning for software vulnerability detection
X Cheng, G Zhang, H Wang, Y Sui
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
872022
The system can't perform the operation now. Try again later.
Articles 1–20