Haijun Wang

Orcid: 0009-0001-3509-3919

Affiliations:
  • Xi'an Jiaotong University, Xi'an, China


According to our database1, Haijun Wang authored at least 47 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
RPHunter: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis.
CoRR, June, 2025

ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis.
CoRR, June, 2025

Detecting State Manipulation Vulnerabilities in Smart Contracts Using LLM and Static Analysis.
CoRR, June, 2025

Materials of "Smart Contract Fuzzing Towards Profitable Vulnerabilities".
Dataset, February, 2025

Stealthy Backdoor Attack to Real-world Models in Android Apps.
CoRR, January, 2025

Smart Contract Fuzzing Towards Profitable Vulnerabilities.
Proc. ACM Softw. Eng., 2025

2024
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App.
IEEE Trans. Software Eng., December, 2024

3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency.
IEEE Trans. Software Eng., October, 2024

xFuzz: Machine Learning Guided Cross-Contract Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2024

Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?
Proc. ACM Softw. Eng., 2024

Strategic Chain-of-Thought: Guiding Accurate Reasoning in LLMs through Strategy Elicitation.
CoRR, 2024

Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts.
Proceedings of the 33rd USENIX Security Symposium, 2024

AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Business Compliance Detection of Smart Contracts in Electricity and Carbon Trading Scenarios.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

Dynamic Testing for Mobile Privacy Compliance.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

Cross-Inlining Binary Function Similarity Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks.
IEEE Trans. Software Eng., December, 2023

When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan.
CoRR, 2023

2022
Oracle-Supported Dynamic Exploit Generation for Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2022

Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining.
CoRR, 2022

2021
Explaining Regressions via Alignment Slicing and Mending.
IEEE Trans. Software Eng., 2021

Machine Learning Guided Cross-Contract Fuzzing.
CoRR, 2021

Vall-nut: Principled Anti-Grey box - Fuzzing.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

2020
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Proceedings of the 29th USENIX Security Symposium, 2020

MemLock: memory usage guided fuzzing.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Typestate-guided fuzzer for discovering use-after-free vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules.
CoRR, 2019

Oracle-Supported Dynamic Exploit Generation for Smart Contracts.
CoRR, 2019

Locating vulnerabilities in binaries via memory layout recovering.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

DiffChaser: Detecting Disagreements for Deep Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Vultron: catching vulnerable smart contracts once and for all.
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019

2018
Break the dead end of dynamic slicing: localizing data and control omission bug.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

2016
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

2012
An Entropy-based Method for Attack Detection in Large Scale Network.
Int. J. Comput. Commun. Control, 2012


  Loading...