Wei Huo

Orcid: 0009-0000-7121-1196

According to our database1, Wei Huo authored at least 88 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SYNTONY: Potential-aware fuzzing with particle swarm optimization.
J. Syst. Softw., February, 2024

Differentially Private Dual Gradient Tracking for Distributed Resource Allocation.
CoRR, 2024

2023
PosFuzz: augmenting greybox fuzzing with effective position distribution.
Cybersecur., December, 2023

Deep attention sampling hashing for efficient image retrieval.
Neurocomputing, November, 2023

An Efficient Distributed Nash Equilibrium Seeking with Compressed and Event-triggered Communication.
CoRR, 2023

Distributed Nash Equilibrium Seeking with Stochastic Event-Triggered Mechanism.
CoRR, 2023

Motion-based Post-Processing: Using Kalman Filter to Exclude Similar Targets in Underwater Object Tracking.
CoRR, 2023

RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Decompilation Based Deep Binary-Source Function Matching.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Splendor: Static Detection of Stored XSS in Modern Web Applications.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

ACETest: Automated Constraint Extraction for Testing Deep Learning Operators.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

pAFL: Adaptive Energy Allocation with Upper Confidence Bound.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
Angular velocity stabilization of underactuated rigid satellites based on energy shaping.
J. Frankl. Inst., 2022

NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.
Cybersecur., 2022

CAMFuzz: Explainable Fuzzing with Local Interpretation.
Cybersecur., 2022

RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol Implementations.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022

Improving Primal Heuristics for Mixed Integer Programming Problems based on Problem Reduction: A Learning-based Approach.
Proceedings of the 17th International Conference on Control, 2022

2021
Application of convolutional neural networks and image processing algorithms based on traffic video in vehicle taillight detection.
Int. J. Sens. Networks, 2021

ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities.
Cybersecur., 2021

B2SMatcher: fine-Grained version identification of open-Source software in binary files.
Cybersecur., 2021

Branch and Bound in Mixed Integer Linear Programming Problems: A Survey of Techniques and Trends.
CoRR, 2021

VIVA: Binary Level Vulnerability Identification via Partial Signature.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Large-Scale Third-Party Library Detection in Android Markets.
IEEE Trans. Software Eng., 2020

ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis.
Cybersecur., 2020

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Proceedings of the 29th USENIX Security Symposium, 2020

Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
Proceedings of the 21st ACM SIGPLAN/SIGBED International Conference on Languages, 2020

A large-scale empirical study on vulnerability distribution within projects and the lessons learned.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Design of Remote-Control Multi-view Monitor for Vehicle-Mounted Mobile Phone Based on IoT.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Open-Source License Violations of Binary Software at Large Scale.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

B2SFinder: Detecting Open-Source Software Reuse in COTS Software.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Path Following Control for a Stratospheric Airship Based on Disturbance Observer.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019

1dVul: Discovering 1-Day Vulnerabilities through Binary Patches.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Stabilizing a VTOL Aircraft Based on Controlled Lagrangian Method.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Disturbance-Observer-Based Robust Relative Pose Control for Spacecraft Rendezvous and Proximity Operations Under Input Saturation.
IEEE Trans. Aerosp. Electron. Syst., 2018

Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications.
EAI Endorsed Trans. Security Safety, 2018

RARE: An Efficient Static Fault Detection Framework for Definition-Use Faults in Large Programs.
IEEE Access, 2018

αDiff: cross-version binary code similarity detection with DNN.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Research on Vehicle Taillight Detection and Semantic Recognition Based on Internet of Vehicle.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Locating Software Faults Based on Minimum Debugging Frontier Set.
IEEE Trans. Software Eng., 2017

Adaptive Backstepping Control of Spacecraft Rendezvous and Proximity Operations With Input Saturation and Full-State Constraint.
IEEE Trans. Ind. Electron., 2017

Robust Nonlinear Adaptive Relative Pose Control for Cooperative Spacecraft During Rendezvous and Proximity Operations.
IEEE Trans. Control. Syst. Technol., 2017

Nonlinear Robust Controller for Miniature Helicopters Without Singularity.
IEEE Trans. Aerosp. Electron. Syst., 2017

LibD: scalable and precise third-party library detection in android markets.
Proceedings of the 39th International Conference on Software Engineering, 2017

Adaptive fault-tolerant control for cooperative spacecraft rendezvous and docking.
Proceedings of the 2017 American Control Conference, 2017

2015
6-DOF integrated adaptive backstepping control for spacecraft proximity operations.
IEEE Trans. Aerosp. Electron. Syst., 2015

Adaptive tracking control for a model helicopter with disturbances.
Proceedings of the American Control Conference, 2015

2014
3-D Path-Following Control for a Model-Scaled Autonomous Helicopter.
IEEE Trans. Control. Syst. Technol., 2014

2013
Effective fault localization based on minimum debugging frontier set.
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, 2013

Robust adaptive control for spacecraft cooperative rendezvous and docking.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2012
Can We Make It Faster? Efficient May-Happen-in-Parallel Analysis Revisited.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

An Extended Continuous Uncertain XML Data Model Research.
Proceedings of the Ninth Web Information Systems and Applications Conference, 2012

Making it practical and effective: fast and precise may-happen-in-parallel analysis.
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2012

2011
Modeling and analysis of the working process of the flat valve system of Mechanical Hydraulic Confined Piston Engine.
Proceedings of the IEEE 5th International Conference on Robotics, 2011

Parallelizing a machine translation decoder for multicore computer.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Adaptive backstepping control for a miniature autonomous helicopter.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
Trajectory Linearization Control for a quadrotor helicopter.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

Backstepping-based direct adaptive fuzzy formation control of uncertain mobile robots.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code.
Proceedings of the CGO 2010, 2010

2009
Controller design for mechanical systems with underactuation degree one based on controlled Lagrangians method.
Int. J. Control, 2009

Smooth time-varying uniform asymptotic stabilization of underactuated surface vessels.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

2008
Predictive variable structure control of nonholonomic chained systems.
Int. J. Comput. Math., 2008

2007
Merge Coding of Atoms for Wavelet/Matching Pursuits Image Compression.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Multiple link failures survivability of optical networks with traffic grooming capability.
Comput. Commun., 2006

Subband Adaptive Dictionaries for Wavelet/Matching Pursuits Image Coding.
Proceedings of the International Conference on Image Processing, 2006

A Hybrid Video Coder Based on H.264 with Matching Pursuits.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Analysis of capacity re-provisioning in optical mesh networks.
IEEE Commun. Lett., 2005

Improving signaling recovery in shared mesh optical networks.
Comput. Commun., 2005

Impact of Resource Sharability on Dual Failure Restorability in Optical Mesh Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Centralized Versus Distributed Re-provisioning in Optical Mesh Networks.
Proceedings of the Networking, 2005

On the benefits of lightpath re-provisioning in optical mesh networks.
Proceedings of IEEE International Conference on Communications, 2005

2004
A New Framework for Rapid Restoration in Optical Mesh Networks.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

2001
Stabilization of nonholonomic chained systems via nonregular feedback linearization.
Syst. Control. Lett., 2001

2000
Tracking control of uncertain dynamic nonholonomic system and its application to wheeled mobile robots.
IEEE Trans. Robotics Autom., 2000

ε-stabilization of multiple chained form control systems with input constraints and its application in mobile robots.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2000

1999
Tracking Control of Wheeled Mobile Robots with Unknown Dynamics.
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999

1996
Adaptive kinematic control of free-floating space robot system.
Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems. IROS 1996, 1996

1995
Adaptive Control of Space Robot System with an Attitude Controlled Base.
Proceedings of the 1995 International Conference on Robotics and Automation, 1995

New Formulas for Complete Determining Base Parameters of Robots.
Proceedings of the 1995 International Conference on Robotics and Automation, 1995

1989
The application of the inertial parameter regrouping method to the robot forward dynamics algorithm.
Proceedings of the IEEE International Conference on Systems, 1989


  Loading...