


default search action
Yuwei Li 0002
Person information
- affiliation: National University of Defense Technology, College of Electronic Engineering, Hefei, China
- affiliation (PhD 2021): Zhejiang University, Computer Science and Technology College, Hangzhou, China
Other persons with the same name
- Yuwei Li (aka: Yu-Wei Li) — disambiguation page
- Yuwei Li 0001
(aka: Yu-Wei Li 0001) — Shanghai University, School of Management, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j10]Yuanchao Chen
, Yuwei Li
, Yi Shen, Yu Chen
, Yang Li
, Taiyan Wang
, Yuliang Lu
, Zulie Pan
, Shouling Ji
:
Unreachable Features? Exposing the Security Risks of Invisible Interfaces in Embedded Web Services of IoT Devices. IEEE Internet Things J. 13(4): 6355-6369 (2026)
[j9]Wenlong Meng
, Fan Zhang, Wendao Yao, Zhenyuan Guo, Yuwei Li
, Chengkun Wei
, Wenzhi Chen
:
Dialogue Injection Attack: Jailbreaking LLMs Through Context Manipulation. IEEE Trans. Inf. Forensics Secur. 21: 1577-1592 (2026)
[j8]Shiwen Ou
, Yuwei Li
, Lu Yu
, Chengkun Wei
, Tingke Wen
, Qiangpu Chen
, Yu Chen
, Haizhi Tang
, Zulie Pan
:
MirrorFuzz: Leveraging LLM and Shared Bugs for Deep Learning Framework APIs Fuzzing. IEEE Trans. Software Eng. 52(1): 360-375 (2026)- 2025
[j7]Yunyi Zhang
, Chengxi Xu
, Fan Shi
, Miao Hu
, Min Zhang
, Yuwei Li
, Zhijie Xie
:
Understanding and Characterizing the Adoption of Internationalized Domain Names in Practice. IEEE Trans. Dependable Secur. Comput. 22(1): 34-48 (2025)
[j6]Yuanchao Chen, Yuwei Li, Yuliang Lu, Zulie Pan, Yuan Chen, Shouling Ji, Yu Chen, Yang Li, Yi Shen:
Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads. IEEE Trans. Inf. Forensics Secur. 20: 2677-2692 (2025)
[c5]Yuan Chen, Qinying Wang, Yong Yang, Yuanchao Chen, Yuwei Li, Shouling Ji:
Unveiling Security Vulnerabilities in Git Large File Storage Protocol. SP 2025: 468-485
[c4]Wenlong Meng, Shuguo Fan, Chengkun Wei, Min Chen, Yuwei Li, Yuanchao Zhang, Zhikun Zhang, Wenzhi Chen:
GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors. USENIX Security Symposium 2025: 181-200
[i7]Wenlong Meng, Fan Zhang, Wendao Yao, Zhenyuan Guo, Yuwei Li, Chengkun Wei, Wenzhi Chen:
Dialogue Injection Attack: Jailbreaking LLMs through Context Manipulation. CoRR abs/2503.08195 (2025)
[i6]Wenlong Meng, Shuguo Fan, Chengkun Wei, Min Chen, Yuwei Li, Yuanchao Zhang, Zhikun Zhang, Wenzhi Chen:
GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors. CoRR abs/2506.08188 (2025)
[i5]Shiwen Ou, Yuwei Li, Lu Yu, Chengkun Wei, Tingke Wen, Qiangpu Chen, Yu Chen, Haizhi Tang, Zulie Pan:
MirrorFuzz: Leveraging LLM and Shared Bugs for Deep Learning Framework APIs Fuzzing. CoRR abs/2510.15690 (2025)- 2024
[j5]Yuwei Li
, Yuan Chen
, Shouling Ji
, Xuhong Zhang
, Guanglu Yan, Alex X. Liu, Chunming Wu
, Zulie Pan
, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. IEEE Trans. Dependable Secur. Comput. 21(1): 168-185 (2024)
[j4]Yuanchao Chen
, Yuwei Li
, Zulie Pan
, Yuliang Lu
, Juxing Chen
, Shouling Ji
:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. IEEE Trans. Inf. Forensics Secur. 19: 1251-1266 (2024)
[i4]Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. CoRR abs/2409.13139 (2024)- 2023
[j3]Ruipeng Wang
, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li
, Yang Li, Min Zhang, Chao Zhang
:
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration. Comput. Secur. 124: 102995 (2023)
[j2]Yu Chen
, Zulie Pan, Yuanchao Chen, Yuwei Li:
DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(2): 133-145 (2023)
[c3]Yi Shen, Yuhan Zhang, Yuwei Li, Wanmeng Ding, Miao Hu, Yang Li, Cheng Huang, Jie Wang:
IoT Malicious Traffic Detection Based on Federated Learning. ICDF2C (1) 2023: 249-263- 2022
[j1]Yuwei Li
, Shouling Ji
, Chenyang Lyu, Yuan Chen
, Jianhai Chen, Qinchen Gu
, Chunming Wu
, Raheem Beyah:
V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs. IEEE Trans. Cybern. 52(5): 3745-3756 (2022)- 2021
[c2]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. USENIX Security Symposium 2021: 2777-2794- 2020
[i3]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs/2010.01785 (2020)
2010 – 2019
- 2019
[c1]Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, Raheem Beyah:
MOPT: Optimized Mutation Scheduling for Fuzzers. USENIX Security Symposium 2019: 1949-1966
[i2]Yuwei Li, Shouling Ji, Chenyang Lv, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu:
V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. CoRR abs/1901.01142 (2019)- 2018
[i1]Chenyang Lv, Shouling Ji, Yuwei Li
, Junfeng Zhou, Jianhai Chen, Jing Chen:
SmartSeed: Smart Seed Generation for Efficient Fuzzing. CoRR abs/1807.02606 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-18 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







