default search action
Yunhui Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Saurabh Pujar, Yunhui Zheng, Luca Buratti, Burn L. Lewis, Yunchung Chen, Jim Laredo, Alessandro Morari, Edward A. Epstein, Tsungnan Lin, Bo Yang, Zhong Su:
Analyzing source code vulnerabilities in the D2A dataset with ML ensembles and C-BERT. Empir. Softw. Eng. 29(2): 48 (2024) - 2023
- [j5]Yilong Sun, Zhiyong Wu, Ke Meng, Yunhui Zheng:
Vehicular Task Offloading and Job Scheduling Method Based on Cloud-Edge Computing. IEEE Trans. Intell. Transp. Syst. 24(12): 14651-14662 (2023) - [j4]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:
Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection. ACM Trans. Softw. Eng. Methodol. 32(6): 145:1-145:40 (2023) - [c39]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:
Code Vulnerability Detection via Signal-Aware Learning. EuroS&P 2023: 506-523 - [c38]Yutian Yan, Yunhui Zheng, Xinyue Liu, Nenad Medvidovic, Weihang Wang:
Adhere: Automated Detection and Repair of Intrusive Ads. ICSE 2023: 486-498 - 2022
- [c37]Chijung Jung, Doowon Kim, An Chen, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon:
Hiding Critical Program Components via Ambiguous Translation. ICSE 2022: 1120-1132 - [c36]Saurabh Pujar, Yunhui Zheng, Luca Buratti, Burn L. Lewis, Alessandro Morari, Jim Laredo, Kevin Postlethwait, Christoph Görn:
Varangian: A Git Bot for Augmented Static Analysis. MSR 2022: 766-767 - [c35]Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. SANER 2022: 959-970 - 2021
- [c34]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari:
Towards Reliable AI for Source Code Understanding. SoCC 2021: 403-411 - [c33]Yunhui Zheng, Saurabh Pujar, Burn L. Lewis, Luca Buratti, Edward A. Epstein, Bo Yang, Jim Laredo, Alessandro Morari, Zhong Su:
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis. ICSE (SEIP) 2021: 111-120 - [c32]Chijung Jung, Doowon Kim, Weihang Wang, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon:
Defeating Program Analysis Techniques via Ambiguous Translation. ASE 2021: 1382-1387 - [c31]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari:
Probing model signal-awareness via prediction-preserving input minimization. ESEC/SIGSOFT FSE 2021: 945-955 - [i11]Yunhui Zheng, Saurabh Pujar, Burn L. Lewis, Luca Buratti, Edward A. Epstein, Bo Yang, Jim Laredo, Alessandro Morari, Zhong Su:
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis. CoRR abs/2102.07995 (2021) - [i10]Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari:
Data-Driven and SE-assisted AI Model Signal-Awareness Enhancement and Introspection. CoRR abs/2111.05827 (2021) - [i9]Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. CoRR abs/2112.10893 (2021) - 2020
- [c30]I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang:
Finding client-side business flow tampering vulnerabilities. ICSE 2020: 222-233 - [c29]Alan Romano, Yunhui Zheng, Weihang Wang:
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection. ASE 2020: 1129-1140 - [i8]Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Laredo, Alessandro Morari:
Learning to map source code to software vulnerability using code-as-a-graph. CoRR abs/2006.08614 (2020) - [i7]Luca Buratti, Saurabh Pujar, Mihaela A. Bornea, J. Scott McCarley, Yunhui Zheng, Gaetano Rossiello, Alessandro Morari, Jim Laredo, Veronika Thost, Yufan Zhuang, Giacomo Domeniconi:
Exploring Software Naturalness through Neural Language Models. CoRR abs/2006.12641 (2020) - [i6]Yunhui Zheng, Sahil Suneja, Yufan Zhuang, Alessandro Morari, Jim Laredo:
Probing Model Signal-Awareness via Prediction-Preserving Input Minimization. CoRR abs/2011.14934 (2020)
2010 – 2019
- 2019
- [c28]Weihang Wang, I Luk Kim, Yunhui Zheng:
Adjust: runtime mitigation of resource abusing third-party online ads. ICSE 2019: 1005-1015 - 2018
- [c27]Dmitry Blotsky, Federico Mora, Murphy Berzish, Yunhui Zheng, Ifaz Kabir, Vijay Ganesh:
StringFuzz: A Fuzzer for String Solvers. CAV (2) 2018: 45-51 - [c26]I Luk Kim, Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, Weijie Meng, Xiangyu Zhang:
AdBudgetKiller: Online Advertising Budget Draining Attack. WWW 2018: 297-307 - 2017
- [j3]Yunhui Zheng, Vijay Ganesh, Sanu Subramanian, Omer Tripp, Murphy Berzish, Julian Dolby, Xiangyu Zhang:
Z3str2: an efficient solver for strings, regular expressions, and length constraints. Formal Methods Syst. Des. 50(2-3): 249-288 (2017) - [c25]Murphy Berzish, Vijay Ganesh, Yunhui Zheng:
Z3str3: A string solver with theory-aware heuristics. FMCAD 2017: 55-59 - [c24]Wei Zhang, Minwei Feng, Yunhui Zheng, Yufei Ren, Yandong Wang, Ji Liu, Peng Liu, Bing Xiang, Li Zhang, Bowen Zhou, Fei Wang:
GaDei: On Scale-Up Training as a Service for Deep Learning. ICDM 2017: 1195-1200 - [c23]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Jim Alain Laredo, Julian Dolby, Christopher C. Young, Aleksander Slominski:
Opportunities in Software Engineering Research for Web API Consumption. WAPI@ICSE 2017: 7-10 - [c22]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo:
Statically checking web API requests in JavaScript. ICSE 2017: 244-254 - [c21]Peng Liu, Xiangyu Zhang, Marco Pistoia, Yunhui Zheng, Manoel Marques, Lingfei Zeng:
Automatic text input generation for mobile testing. ICSE 2017: 643-653 - [c20]Yonghwi Kwon, Weihang Wang, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
CPR: cross platform binary code reuse via platform independent trace program. ISSTA 2017: 158-169 - [c19]Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, Patrick Eugster:
PAD: programming third-party web advertisement censorship. ASE 2017: 240-251 - [c18]Kyungtae Kim, I Luk Kim, Chung Hwan Kim, Yonghwi Kwon, Yunhui Zheng, Xiangyu Zhang, Dongyan Xu:
J-Force: Forced Execution on JavaScript. WWW 2017: 897-906 - [i5]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo:
Statically Checking Web API Requests in JavaScript. CoRR abs/1702.03906 (2017) - [i4]Murphy Berzish, Yunhui Zheng, Vijay Ganesh:
Z3str3: A String Solver with Theory-aware Branching. CoRR abs/1704.07935 (2017) - [i3]Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Jim Alain Laredo, Julian Dolby, Christopher C. Young, Aleksander Slominski:
Opportunities in Software Engineering Research for Web API Consumption. CoRR abs/1705.06586 (2017) - 2016
- [c17]Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng:
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions. ICSE 2016: 1051-1062 - [c16]Weihang Wang, Yunhui Zheng, Peng Liu, Lei Xu, Xiangyu Zhang, Patrick Eugster:
ARROW: automated repair of races on client-side web pages. ISSTA 2016: 201-212 - [c15]Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, Patrick Th. Eugster:
WebRanz: web page randomization for better advertisement delivery and web-bot prevention. SIGSOFT FSE 2016: 205-216 - [i2]Sanu Subramanian, Murphy Berzish, Yunhui Zheng, Omer Tripp, Vijay Ganesh:
A Solver for a Theory of Strings and Bit-vectors. CoRR abs/1605.09446 (2016) - [i1]Wei Zhang, Minwei Feng, Yunhui Zheng, Yufei Ren, Yandong Wang, Ji Liu, Peng Liu, Bing Xiang, Li Zhang, Bowen Zhou:
GaDei: On Scale-up Training As A Service For Deep Learning. CoRR abs/1611.06213 (2016) - 2015
- [c14]Yunhui Zheng, Vijay Ganesh, Sanu Subramanian, Omer Tripp, Julian Dolby, Xiangyu Zhang:
Effective Search-Space Pruning for Solvers of String Equations, Regular Expressions and Length Constraints. CAV (1) 2015: 235-254 - [c13]Wen-Chuan Lee, Tao Bao, Yunhui Zheng, Xiangyu Zhang, Keval Vora, Rajiv Gupta:
RAIVE: runtime assessment of floating-point instability by vectorization. OOPSLA 2015: 623-638 - [c12]Peng Liu, Xiangyu Zhang, Omer Tripp, Yunhui Zheng:
Light: replay via tightly bounded recording. PLDI 2015: 55-64 - 2014
- [b1]Yunhui Zheng:
Path sensitive static program analysis for web applications. Purdue University, USA, 2014 - [c11]Yunxiao Zou, Zhenyu Chen, Yunhui Zheng, Xiangyu Zhang, Zebao Gao:
Virtual DOM coverage for effective testing of dynamic web applications. ISSTA 2014: 60-70 - 2013
- [c10]Yunhui Zheng, Xiangyu Zhang:
Path sensitive static analysis of web applications for remote code execution vulnerability detection. ICSE 2013: 652-661 - [c9]Yunhui Zheng, Xiangyu Zhang, Vijay Ganesh:
Z3-str: a z3-based string solver for web application analysis. ESEC/SIGSOFT FSE 2013: 114-124 - 2012
- [j2]William N. Sumner, Yunhui Zheng, Dasarath Weeratunge, Xiangyu Zhang:
Precise Calling Context Encoding. IEEE Trans. Software Eng. 38(5): 1160-1177 (2012) - [c8]Yunhui Zheng, Xiangyu Zhang:
Static detection of resource contention problems in server-side scripts. ICSE 2012: 584-594 - [c7]Tao Bao, Yunhui Zheng, Xiangyu Zhang:
White box sampling in uncertain data processing enabled by program analysis. OOPSLA 2012: 897-914 - 2011
- [c6]Kyu Hyung Lee, Yunhui Zheng, Nick Sumner, Xiangyu Zhang:
Toward generating reducible replay logs. PLDI 2011: 246-257 - [c5]Yunhui Zheng, Tao Bao, Xiangyu Zhang:
Statically locating web application bugs caused by asynchronous calls. WWW 2011: 805-814 - 2010
- [c4]William N. Sumner, Yunhui Zheng, Dasarath Weeratunge, Xiangyu Zhang:
Precise calling context encoding. ICSE (1) 2010: 525-534 - [c3]Philip W. Dabney, David J. Harding, James B. Abshire, Tim Huss, Gabriel Jodor, Roman Machan, Joe Marzouk, Kurt Rush, Antonios Seas, Christopher Shuman, Xiaoli Sun, Susan Valett, Aleksey Vasilyev, Anthony W. Yu, Yunhui Zheng:
The Slope Imaging Multi-polarization Photon-counting Lidar: Development and performance results. IGARSS 2010: 653-656 - [c2]Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Strict control dependence and its effect on dynamic information flow analyses. ISSTA 2010: 13-24
2000 – 2009
- 2007
- [j1]Yunhui Zheng, David J. Brady, Pankaj K. Agarwal:
Localization using boundary sensors: An analysis based on graph theory. ACM Trans. Sens. Networks 3(4): 21 (2007) - [c1]Yunhui Zheng, Wenlin Zhang, Yuechao Wang, Ning Xi:
An event-based adaptive tactic coordination in tele-operating human-machine interactions using Hybrid Q-learning. ROBIO 2007: 291-296
Coauthor Index
aka: Jim Alain Laredo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint