Shih-Kun Huang

Orcid: 0000-0002-6766-4683

According to our database1, Shih-Kun Huang authored at least 45 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fuzz Testing Process Visualization.
J. Inf. Sci. Eng., September, 2023

2022
Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Guan-fuzz: Argument Selection With Mean Shift Clustering for Multi-argument Fuzzing.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
REST API Fuzzing by Coverage Level Guided Blackbox Testing.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
Big Data Platform Configuration Using Machine Learning.
J. Inf. Sci. Eng., 2020

Testing Convolutional Neural Network using Adversarial Attacks on Potential Critical Pixels.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2018
Dynamic Path Pruning in Symbolic Execution.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Path Exploration Based on Monte Carlo Tree Search for Symbolic Execution.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2017

CRAXTriage: A coverage based triage system.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
A Unified Ant Agent Framework for Solving DoS and QoS Problems.
J. Inf. Sci. Eng., 2016

LDDoS Attack Detection by Using Ant Colony Optimization Algorithms.
J. Inf. Sci. Eng., 2016

BigExplorer: A configuration recommendation system for big data platform.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2016

Effective Test Generation for Combinatorial Decision Coverage.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Automatic Defense through Fault Localization and Dynamic Patch Creation.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

2015
Diagnosing SDN Network Problems by Using Spectrum-Based Fault Localization Techniques.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Browser fuzzing by scheduled mutation and generation of document object models.
Proceedings of the International Carnahan Conference on Security Technology, 2015

CovDroid: A Black-Box Testing Coverage System for Android.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

CRAXfuzz: Target-Aware Symbolic Fuzz Testing.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Software Crash Analysis for Automatic Exploit Generation on Binary Programs.
IEEE Trans. Reliab., 2014

CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

On the Effectiveness of Scheduling Fuzz Testing.
Proceedings of the Intelligent Systems and Applications, 2014

A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS Attacks.
Proceedings of the Intelligent Systems and Applications, 2014

2013
CRAXweb: Automatic Web Application Testing and Attack Generation.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

A black-box based android GUI testing system.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

2012
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.
J. Inf. Sci. Eng., 2012

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs.
J. Inf. Sci. Eng., 2012

CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Improved convertible authenticated encryption scheme with provable security.
Inf. Process. Lett., 2011

2010
Efficient proxy signcryption scheme with provable CCA and CMA security.
Comput. Math. Appl., 2010

2007
Detection and Diagnosis of Control Interception.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2005
Mining version histories to verify the learning process of Legitimate Peripheral Participants.
ACM SIGSOFT Softw. Eng. Notes, 2005

A testing framework for Web application security assessment.
Comput. Networks, 2005

2004
Mining Control Patterns from Java Program Corpora.
J. Inf. Sci. Eng., 2004

2003
Web application security assessment by fault injection and behavior monitoring.
Proceedings of the Twelfth International World Wide Web Conference, 2003

2001
Object-Oriented Program Behavior Analysis Based on Control Patterns.
Proceedings of the 2nd Asia-Pacific Conference on Quality Software (APAQS 2001), 2001

2000
Cocktail Watermarking for Digital Image Protection.
IEEE Trans. Multim., 2000

Integration of Reusable Software Components and Frameworks Into a Visual Software Construction Approach.
J. Inf. Sci. Eng., 2000

Dyadic Wavelet-Based Nonlinear Conduction Equation: Theory and Applications.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Highly Robust Image Watermarking Using Complementary Modulations.
Proceedings of the Information Security, Second International Workshop, 1999

Cocktail Watermarking on Images.
Proceedings of the Information Hiding, Third International Workshop, 1999

1995
A New Method Dispatcher to Improve Execution Speed for Object-Oriented Programming Systems.
J. Inf. Sci. Eng., 1995

1994
A Survey of the Influence of Programming Constructs and Mechanisms on Software Quality1.
J. Inf. Sci. Eng., 1994

1992
Interface for Reusable Software Components.
Proceedings of the Algorithms, Software, Architecture, 1992

Two-way coloring approaches for method dispatching in object-oriented programming systems.
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992


  Loading...