Shuai Wang
Orcid: 0000-0002-0866-0308Affiliations:
- Hong Kong University of Science and Technology, Hong Kong
- ETH Zurich, Switzerland (former)
- Penn State University, University Park, PA, USA (PhD 2018)
According to our database1,
Shuai Wang
authored at least 163 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Fuzzy-Assisted Contrastive Decoding Improving Code Generation of Large Language Models.
IEEE Trans. Fuzzy Syst., August, 2025
JSidentify-V2: Leveraging Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection.
CoRR, August, 2025
CoRR, July, 2025
Rethinking and Exploring String-Based Malware Family Classification in the Era of LLMs and RAG.
CoRR, July, 2025
Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges.
CoRR, June, 2025
CoRR, June, 2025
Reasoning as a Resource: Optimizing Fast and Slow Thinking in Code Generation Models.
CoRR, June, 2025
CoRR, May, 2025
A Survey on the Safety and Security Threats of Computer-Using Agents: JARVIS or Ultron?
CoRR, May, 2025
BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts.
CoRR, April, 2025
STShield: Single-Token Sentinel for Real-Time Jailbreak Detection in Large Language Models.
CoRR, March, 2025
CoRR, February, 2025
Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators.
CoRR, January, 2025
CoRR, January, 2025
CoRR, January, 2025
DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code.
Proc. ACM Softw. Eng., 2025
Causality-Aided Evaluation and Explanation of Large Language Model-Based Code Generation.
Proc. ACM Softw. Eng., 2025
Proc. ACM Program. Lang., 2025
Proc. ACM Program. Lang., 2025
Binary Cryptographic Function Identification via Similarity Analysis with Path-Insensitive Emulation.
Proc. ACM Program. Lang., 2025
Neurocomputing, 2025
Zinnia: An Expressive and Efficient Tensor-Oriented Zero-Knowledge Programming Framework.
IACR Cryptol. ePrint Arch., 2025
CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
Testing and Understanding Deviation Behaviors in FHE-Hardened Machine Learning Models.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
Can't See the Forest for the Trees: Benchmarking Multimodal Safety Awareness for Multimodal LLMs.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
2024
IEEE Trans. Software Eng., May, 2024
Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools.
IEEE Trans. Dependable Secur. Comput., 2024
Proc. ACM Softw. Eng., 2024
Proc. ACM Program. Lang., 2024
CoRR, 2024
USCD: Improving Code Generation of LLMs by Uncertainty-Aware Selective Contrastive Decoding.
CoRR, 2024
Scalable Differentiable Causal Discovery in the Presence of Latent Confounders with Skeleton Posterior (Extended Version).
CoRR, 2024
CoRR, 2024
Testing and Understanding Erroneous Planning in LLM Agents through Synthesized User Inputs.
CoRR, 2024
How do LLMs Support Deep Learning Testing? A Comprehensive Study Through the Lens of Image Mutation.
CoRR, 2024
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper.
CoRR, 2024
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning.
CoRR, 2024
An Empirical Study on Large Language Models in Accuracy and Robustness under Chinese Industrial Scenarios.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Scalable Differentiable Causal Discovery in the Presence of Latent Confounders with Skeleton Posterior.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Poster Abstract: On the Accuracy and Robustness of Large Language Models in Chinese Industrial Scenarios.
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Proc. VLDB Endow., December, 2023
Not just select samples, but exploration: Genetic programming aided remote sensing target detection under deep learning.
Appl. Soft Comput., September, 2023
Visual tracking in complex scenes: A location fusion mechanism based on the combination of multiple visual cognition flows.
Inf. Fusion, August, 2023
ACM Trans. Softw. Eng. Methodol., July, 2023
Human Inertial Thinking Strategy: A Novel Fuzzy Reasoning Mechanism for IoT-Assisted Visual Monitoring.
IEEE Internet Things J., March, 2023
IEEE Trans. Software Eng., 2023
Proc. ACM Manag. Data, 2023
CoRR, 2023
CoRR, 2023
Benchmarking and Explaining Large Language Model-based Code Generation: A Causality-Centric Approach.
CoRR, 2023
CoRR, 2023
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning (Extended Version).
CoRR, 2023
"Oops, Did I Just Say That?" Testing and Repairing Unethical Suggestions of Large Language Models with Suggest-Critique-Reflect Process.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Perfce: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023
Proceedings of the Asian Conference on Machine Learning, 2023
2022
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Geosci. Remote. Sens., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Proc. ACM Meas. Anal. Comput. Syst., 2022
Human Short Long-Term Cognitive Memory Mechanism for Visual Monitoring in IoT-Assisted Smart Cities.
IEEE Internet Things J., 2022
Inf. Softw. Technol., 2022
Byzantine-Robust Federated Learning with Optimal Statistical Rates and Privacy Guarantees.
CoRR, 2022
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Unlearnable Examples: Protecting Open-Source Software from Unauthorized Neural Code Learning.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022
Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Human Memory Update Strategy: A Multi-Layer Template Update Mechanism for Remote Visual Monitoring.
IEEE Trans. Multim., 2021
Fuzzy Detection Aided Real-Time and Robust Visual Tracking Under Complex Environments.
IEEE Trans. Fuzzy Syst., 2021
Prediction Potential of Remote Sensing-Related Variables in the Topsoil Organic Carbon Density of Liaohekou Coastal Wetlands, Northeast China.
Remote. Sens., 2021
MT-Teql: Evaluating and Augmenting Neural NLIDB on Real-world Linguistic and Schema Variations.
Proc. VLDB Endow., 2021
Fuzzy-aided solution for out-of-view challenge in visual tracking under IoT-assisted complex environment.
Neural Comput. Appl., 2021
MDPFuzzer: Finding Crash-Triggering State Sequences in Models Solving the Markov Decision Process.
CoRR, 2021
You Can't See the Forest for Its Trees: Assessing Deep Neural Network Testing via NeuraL Coverage.
CoRR, 2021
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
IEEE Trans. Software Eng., 2020
MT-Teql: Evaluating and Augmenting Consistency of Text-to-SQL Models with Metamorphic Testing.
CoRR, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Proc. ACM Program. Lang., 2019
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019
2018
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018
Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015