JingZheng Wu
Orcid: 0000-0001-5561-9829
  According to our database1,
  JingZheng Wu
  authored at least 56 papers
  between 2010 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Version-level Third-Party Library Detection in Android Applications via Class Structural Similarity.
    
  
    CoRR, April, 2025
    
  
The Seeds of the Future Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries.
    
  
    Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
    
  
Exploring Large Language Models for Analyzing Open Source License Conflicts: How Far Are We?
    
  
    Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
    
  
  2024
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
    
  
    IEEE Trans. Dependable Secur. Comput., 2024
    
  
Reinforcement-learning-based Adversarial Attacks Against Vulnerability Detection Models.
    
  
    Int. J. Softw. Informatics, 2024
    
  
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
    
  
    Proceedings of the 33rd USENIX Security Symposium, 2024
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2024
    
  
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
    
  
    Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
    
  
    Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
    
  
VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization.
    
  
    Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, 2024
    
  
  2023
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
    
  
    Comput. Secur., May, 2023
    
  
    IEEE Trans. Software Eng., April, 2023
    
  
    CoRR, 2023
    
  
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering.
    
  
    Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
    
  
    Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023
    
  
    Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
    
  
  2022
    IEEE Trans. Dependable Secur. Comput., 2022
    
  
    Proceedings of the 31st USENIX Security Symposium, 2022
    
  
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
    
  
    Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
    
  
  2021
    IEEE Trans. Inf. Forensics Secur., 2021
    
  
    J. Intell. Fuzzy Syst., 2021
    
  
    Int. J. Softw. Informatics, 2021
    
  
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
    
  
    CoRR, 2021
    
  
    Proceedings of the 21st IEEE International Conference on Software Quality, 2021
    
  
MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning.
    
  
    Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
    
  
  2020
    Proceedings of the Cyber Security - 17th China Annual Conference, 2020
    
  
    Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
    
  
Research on the Influencing Factors of User Trust Based on Artificial Intelligence Self Diagnosis System.
    
  
    Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
    
  
  2019
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion.
    
  
    J. Comput. Sci. Technol., 2019
    
  
    Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
    
  
  2018
机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine).
    
  
    计算机科学, 2018
    
  
    Proceedings of the Services - SERVICES 2018, 2018
    
  
MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
    
  
    Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018
    
  
  2017
    J. Glob. Optim., 2017
    
  
LaChouTi: kernel vulnerability responding framework for the fragmented Android devices.
    
  
    Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
    
  
Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
    
  
    Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017
    
  
    Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
    
  
PACS: Pemission abuse checking system for android applictions based on review mining.
    
  
    Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
    
  
  2016
    J. Comput. Sci. Technol., 2016
    
  
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation.
    
  
    Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
    
  
  2015
    Proceedings of the Handbook on Data Centers, 2015
    
  
POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
    
  
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
    
  
POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
    
  
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
    
  
  2014
CIVSched: A Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VMs.
    
  
    IEEE Trans. Cloud Comput., 2014
    
  
    Secur. Commun. Networks, 2014
    
  
  2013
Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.
    
  
    Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
    
  
    Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
    
  
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation.
    
  
    Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
    
  
    Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
    
  
    Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
    
  
  2012
    Math. Comput. Model., 2012
    
  
    Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
    
  
  2011
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph.
    
  
    Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
    
  
Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines.
    
  
    Proceedings of the IEEE International Conference on Cloud Computing, 2011
    
  
  2010
    Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010