Yao Zhang

Orcid: 0000-0002-7375-9152

According to our database1, Yao Zhang authored at least 23 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
DomFuzz: Dominator-Based Directed Gray-Box Fuzzing for ICPSs.
IEEE Netw., July, 2025

Understanding the Supply Chain and Risks of Large Language Model Applications.
CoRR, July, 2025

It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from a Practical Perspective.
CoRR, July, 2025

IRHunter: Universal Detection of Instruction Reordering Vulnerabilities for Enhanced Concurrency in Distributed and Parallel Systems.
IEEE Trans. Parallel Distributed Syst., June, 2025

Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications.
CoRR, April, 2025

A Cross-Domain Data Sharing Scheme Based on Federated Blockchain.
Proceedings of the Theoretical Aspects of Software Engineering, 2025

2023
Demystifying Performance Regressions in String Solvers.
IEEE Trans. Software Eng., March, 2023

EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

2022
Large-scale analysis of non-termination bugs in real-world OSS projects.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

2021
Discovering Properties about Arrays via Path Dependence Analysis.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

Inferring Loop Invariants for Multi-Path Loops.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

Loopster++: Termination Analysis for Multi-path Linear Loop.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs.
IEEE Netw., 2020

An Empirical Study in Software Verification Tools.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
CSP-E<sup>2</sup>: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019

DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost.
IEEE Access, 2019

2018
A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks.
J. Netw. Comput. Appl., 2018

A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid.
Proceedings of the 2018 IEEE SmartWorld, 2018

2017
HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
TRM: Computing Reputation Score by Mining Reviews.
Proceedings of the Incentives and Trust in Electronic Communities, 2016


  Loading...