Peiyu Liu

Orcid: 0000-0001-7793-7633

Affiliations:
  • Zhejiang University, College of Computer Science and Technology, Hangzhou, China


According to our database1, Peiyu Liu authored at least 26 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LuaTaint: A Static Analysis System for Web Configuration Interface Vulnerability of Internet of Things Devices.
IEEE Internet Things J., March, 2025

ModiGen: A Large Language Model-Based Workflow for Multi-Task Modelica Code Generation.
CoRR, March, 2025

LLM4EFFI: Leveraging Large Language Models to Enhance Code Efficiency and Correctness.
CoRR, February, 2025

Beyond Static Pattern Matching? Rethinking Automatic Cryptographic API Misuse Detection in the Era of LLMs.
Proc. ACM Softw. Eng., 2025

Firmrca: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-Based Fault Localization.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

BinEGA: Enhancing DNN-based Binary Code Similarity Detection through Efficient Graph Alignment.
Proceedings of the IEEE International Conference on Software Analysis, 2025

MQueez: Specification-Driven Fuzzing for MQTT Broker (Registered Report).
Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2025

2024
Agents4PLC: Automating Closed-loop PLC Code Generation and Verification in Industrial Control Systems using LLM-based Agents.
CoRR, 2024

Understanding the AI-powered Binary Code Similarity Detection.
CoRR, 2024

Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs.
CoRR, 2024

LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices.
CoRR, 2024

Critical Code Guided Directed Greybox Fuzzing for Commits.
Proceedings of the 33rd USENIX Security Symposium, 2024

Exploring ChatGPT's Capabilities on Vulnerability Management.
Proceedings of the 33rd USENIX Security Symposium, 2024

Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024

CINDA: Don't Ignore Instructions When Cloning Memory Access Behavior.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
A traffic anomaly detection approach based on unsupervised learning for industrial cyber-physical system.
Knowl. Based Syst., November, 2023

How ChatGPT is Solving Vulnerability Management Problem.
CoRR, 2023

How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
Focus : Function clone identification on cross-platform.
Int. J. Intell. Syst., 2022

2021
IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
vMobiDesk: Desktop Virtualization for Mobile Operating Systems.
IEEE Access, 2020

Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Prudent Practices for Designing Virtual Desktop Experiments.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019


  Loading...