Hao Wang

Orcid: 0000-0002-8480-8167

Affiliations:
  • Peking University, School of EECS, Beijing, China


According to our database1, Hao Wang authored at least 15 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
SCGAgent: Recreating the Benefits of Reasoning Models for Secure Code Generation with Agentic Workflows.
CoRR, June, 2025

Climbing the Ladder of Reasoning: What LLMs Can-and Still Can't-Solve after SFT?
CoRR, April, 2025

Type-Constrained Code Generation with Language Models.
Proc. ACM Program. Lang., 2025

2024
Skill-Adpative Imitation Learning for UI Test Reuse.
CoRR, 2024

Guardian: A Runtime Framework for LLM-Based UI Exploration.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Hierarchy-Aware Regression Test Prioritization.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

2023
Badge: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
A Theoretical Analysis of Random Regression Test Prioritization.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2022

2008
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
IEEE Trans. Dependable Secur. Comput., 2008

2007
Creating Vulnerability Signatures Using Weakest Preconditions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Weighted Pushdown Systems and Trust-Management Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Towards Automatic Generation of Vulnerability-Based Signatures.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Reducing the Dependence of SPKI/SDSI on PKI.
Proceedings of the Computer Security, 2006

NetSpy: Automatic Generation of Spyware Signatures for NIDS.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2004
Security Policy Reconciliation in Distributed Computing Environments.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004


  Loading...