Qinying Wang

Orcid: 0000-0002-0010-0592

According to our database1, Qinying Wang authored at least 19 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
VModA: An Effective Framework for Adaptive NSFW Image Moderation.
CoRR, May, 2025

Demystifying OS Kernel Fuzzing with a Novel Taxonomy.
CoRR, January, 2025

Interpretable machine learning model for prediction functional cure in chronic hepatitis B patients receiving Peg-IFN therapy: A multi-center study.
Int. J. Medical Informatics, 2025

Unveiling Security Vulnerabilities in Git Large File Storage Protocol.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

A Comprehensive Memory Safety Analysis of Bootloaders.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

MQueez: Specification-Driven Fuzzing for MQTT Broker (Registered Report).
Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2025

2024
MILG: Realistic lip-sync video generation with audio-modulated image inpainting.
Vis. Informatics, 2024

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024

EmbedFuzz: High Speed Fuzzing Through Transplantation.
CoRR, 2024

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Pluggable Watermarking of Deepfake Models for Deepfake Detection.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2023
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

2018
Fractal interpolation-based forecasting model of rumor spreading situation.
Proceedings of the 2018 International Conference on Information Management & Management Science, 2018

2014
Research on the interactive effects of online scores.
Electron. Commer. Res. Appl., 2014


  Loading...