Follow
Yinxing Xue
Title
Cited by
Cited by
Year
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1372018
Bingo: Cross-architecture cross-os binary search
M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
1242016
Feature location in a collection of product variants
Y Xue, Z Xing, S Jarzabek
2012 19th Working Conference on Reverse Engineering, 145-154, 2012
982012
Auditing anti-malware tools by evolving android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
732017
Semantic modelling of android malware for effective malware comprehension, detection, and classification
G Meng, Y Xue, Z Xu, Y Liu, J Zhang, A Narayanan
Proceedings of the 25th International Symposium on Software Testing and …, 2016
702016
Mystique: Evolving android malware for auditing anti-malware tools
G Meng, Y Xue, C Mahinthan, A Narayanan, Y Liu, J Zhang, T Chen
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
682016
Detecting differences across multiple instances of code clones
Y Lin, Z Xing, Y Xue, Y Liu, X Peng, J Sun, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
652014
Understanding feature evolution in a family of product variants
Y Xue, Z Xing, S Jarzabek
2010 17th Working Conference on Reverse Engineering, 109-118, 2010
522010
Jsdc: A hybrid approach for javascript malware detection and classification
J Wang, Y Xue, Y Liu, TH Tan
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
472015
Feedback-based debugging
Y Lin, J Sun, Y Xue, Y Liu, J Dong
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
462017
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie, H Wang, Y Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
432019
Optimizing selection of competing features via feedback-directed evolutionary algorithms
TH Tan, Y Xue, M Chen, J Sun, Y Liu, JS Dong
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
432015
Detection and classification of malicious JavaScript via attack behavior modelling
Y Xue, J Wang, Y Liu, H Xiao, J Sun, M Chandramohan
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
422015
IBED: Combining IBEA and DE for optimal feature selection in software product line engineering
Y Xue, J Zhong, TH Tan, Y Liu, W Cai, M Chen, J Sun
Applied Soft Computing 49, 1215-1231, 2016
402016
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
392020
An empirical assessment of security risks of global android banking apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
372020
Reengineering legacy software products into software product line based on automatic variability analysis
Y Xue
Proceedings of the 33rd International Conference on Software Engineering …, 2011
372011
A case study of variation mechanism in an industrial product line
P Ye, X Peng, Y Xue, S Jarzabek
International Conference on Software Reuse, 126-136, 2009
312009
Accurate and scalable cross-architecture cross-os binary code search with emulation
Y Xue, Z Xu, M Chandramohan, Y Liu
IEEE Transactions on Software Engineering 45 (11), 1125-1149, 2018
302018
Are clones harmful for maintenance?
S Jarzabek, Y Xue
Proceedings of the 4th International Workshop on Software Clones, 73-74, 2010
222010
The system can't perform the operation now. Try again later.
Articles 1–20