


Остановите войну!
for scientists:


default search action
Charles Zhang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i6]Chengpeng Wang, Gang Fan, Peisen Yao, Fuxiong Pan, Charles Zhang:
Verifying Data Constraint Equivalence in FinTech Systems. CoRR abs/2301.11011 (2023) - 2022
- [j10]Chengpeng Wang
, Peisen Yao
, Wensheng Tang
, Qingkai Shi
, Charles Zhang
:
Complexity-guided container replacement synthesis. Proc. ACM Program. Lang. 6(OOPSLA1): 1-31 (2022) - [j9]Qingkai Shi
, Yongchao Wang
, Peisen Yao
, Charles Zhang
:
Indexing the extended Dyck-CFL reachability for context-sensitive program analysis. Proc. ACM Program. Lang. 6(OOPSLA2): 1438-1468 (2022) - [c49]Yiyuan Guo, Jinguo Zhou, Peisen Yao, Qingkai Shi
, Charles Zhang:
Precise Divide-By-Zero Detection with Affirmative Evidence. ICSE 2022: 1718-1729 - [c48]Rongxin Wu, Minglei Chen, Chengpeng Wang
, Gang Fan
, Jiguang Qiu, Charles Zhang:
Accelerating Build Dependency Error Detection via Virtual Build. ASE 2022: 5:1-5:12 - [c47]Yuandao Cai, Chengfeng Ye, Qingkai Shi
, Charles Zhang:
Peahen: fast and precise static deadlock detection via context reduction. ESEC/SIGSOFT FSE 2022: 784-796 - [c46]Heqing Huang, Yiyuan Guo, Qingkai Shi
, Peisen Yao, Rongxin Wu
, Charles Zhang:
BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning. IEEE Symposium on Security and Privacy 2022: 36-50 - [c45]Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense. IEEE Symposium on Security and Privacy 2022: 1558-1573 - 2021
- [j8]Peisen Yao
, Qingkai Shi
, Heqing Huang, Charles Zhang:
Program analysis via efficient symbolic abstraction. Proc. ACM Program. Lang. 5(OOPSLA): 1-32 (2021) - [j7]Mohamed Y. Eltabakh, Anantha Subramanian, Awny Al-Omari, Mohammed Al-Kateb, Sanjay Nair, Mahbub Hasan, Wellington Cabrera, Charles Zhang, Amit Kishore, Snigdha Prasad:
Not Black-Box Anymore! Enabling Analytics-Aware Optimizations in Teradata Vantage. Proc. VLDB Endow. 14(12): 2959-2971 (2021) - [c44]Peisen Yao
, Heqing Huang, Wensheng Tang, Qingkai Shi
, Rongxin Wu
, Charles Zhang:
Fuzzing SMT solvers via two-dimensional input space exploration. ISSTA 2021: 322-335 - [c43]Wensheng Tang, Yikun Hu, Gang Fan, Peisen Yao, Rongxin Wu
, Guangyuan Bai, Pengcheng Wang, Charles Zhang:
Transcode: Detecting Status Code Mapping Errors in Large-Scale Systems. ASE 2021: 829-841 - [c42]Qingkai Shi
, Peisen Yao
, Rongxin Wu
, Charles Zhang:
Path-sensitive sparse analysis without path conditions. PLDI 2021: 930-943 - [c41]Yuandao Cai, Peisen Yao
, Charles Zhang:
Canary: practical static detection of inter-thread value-flow bugs. PLDI 2021: 1126-1140 - [c40]Peisen Yao
, Heqing Huang, Wensheng Tang, Qingkai Shi
, Rongxin Wu
, Charles Zhang:
Skeletal approximation enumeration for SMT solver testing. ESEC/SIGSOFT FSE 2021: 1141-1153 - [i5]Yushan Zhang, Peisen Yao, Rongxin Wu, Charles Zhang:
Duplicate-sensitivity Guided Transformation Synthesis for DBMS Correctness Bug Detection. CoRR abs/2107.03660 (2021) - [i4]Qingkai Shi, Yongchao Wang, Charles Zhang:
Indexing Context-Sensitive Reachability. CoRR abs/2109.01321 (2021) - [i3]Peisen Yao, Jinguo Zhou, Xiao Xiao, Qingkai Shi, Rongxin Wu, Charles Zhang:
Efficient Path-Sensitive Data-Dependence Analysis. CoRR abs/2109.07923 (2021) - [i2]Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
WFDefProxy: Modularly Implementing and Empirically Evaluating Website Fingerprinting Defenses. CoRR abs/2111.12629 (2021) - 2020
- [c39]Qingkai Shi
, Rongxin Wu
, Gang Fan, Charles Zhang:
Conquering the extensional scalability problem for value-flow analysis frameworks. ICSE 2020: 812-823 - [c38]Qingkai Shi
, Charles Zhang:
Pipelining bottom-up data flow analysis. ICSE 2020: 835-847 - [c37]Peisen Yao, Qingkai Shi
, Heqing Huang, Charles Zhang:
Fast bit-vector satisfiability. ISSTA 2020: 38-50 - [c36]Gang Fan, Chengpeng Wang, Rongxin Wu
, Xiao Xiao, Qingkai Shi
, Charles Zhang:
Escaping dependency hell: finding build dependency errors with the unified dependency graph. ISSTA 2020: 463-474 - [c35]Heqing Huang, Peisen Yao, Rongxin Wu
, Qingkai Shi
, Charles Zhang:
Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction. IEEE Symposium on Security and Privacy 2020: 1613-1627
2010 – 2019
- 2019
- [c34]Gang Fan, Rongxin Wu
, Qingkai Shi
, Xiao Xiao, Jinguo Zhou, Charles Zhang:
Smoke: scalable path-sensitive memory leak detection for millions of lines of code. ICSE 2019: 72-82 - [i1]Qingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang:
Conquering the Extensional Scalability Problem for Value-Flow Analysis Frameworks. CoRR abs/1912.06878 (2019) - 2018
- [c33]Qingkai Shi
, Xiao Xiao, Rongxin Wu
, Jinguo Zhou, Gang Fan, Charles Zhang:
Pinpoint: fast and precise sparse value flow analysis for million lines of code. PLDI 2018: 693-706 - 2016
- [j6]Jeff Huang, Charles Zhang:
Debugging Concurrent Software: Advances and Challenges. J. Comput. Sci. Technol. 31(5): 861-868 (2016) - [j5]Matthew B. Dwyer
, Eric Bodden, Brian Fitzgerald, Miryung Kim, Sunghun Kim, Amy J. Ko, Emilia Mendes, Raffaela Mirandola, Ana Moreira, Forrest Shull, Stephen F. Siegel, Tao Xie, Charles Zhang:
Connecting and Serving the Software Engineering Community. IEEE Trans. Software Eng. 42(3): 203-205 (2016) - [c32]Rongxin Wu
, Xiao Xiao, Shing-Chi Cheung
, Hongyu Zhang
, Charles Zhang:
Casper: an efficient approach to call trace collection. POPL 2016: 678-690 - [e2]Charles Zhang, Xavier Rival:
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP@PLDI 2016, Santa Barbara, CA, USA, June 14, 2016. ACM 2016, ISBN 978-1-4503-4385-5 [contents] - 2015
- [c31]Xiao Xiao, Shi Han, Charles Zhang, Dongmei Zhang:
Uncovering JavaScript Performance Code Smells Relevant to Type Mutations. APLAS 2015: 335-355 - [c30]Charles Zhang:
Mars: A 64-core ARMv8 processor. Hot Chips Symposium 2015: 1-23 - [c29]Valerio Terragni
, Shing-Chi Cheung
, Charles Zhang:
RECONTEST: Effective Regression Testing of Concurrent Programs. ICSE (1) 2015: 246-256 - 2014
- [c28]Peng Liu, Charles Zhang:
Unleashing concurrency for irregular data structures. ICSE 2014: 480-490 - [c27]Qirun Zhang, Xiao Xiao, Charles Zhang, Hao Yuan, Zhendong Su
:
Efficient subcubic alias analysis for C. OOPSLA 2014: 829-845 - [c26]Xiao Xiao, Qirun Zhang, Jinguo Zhou, Charles Zhang:
Persistent pointer information. PLDI 2014: 463-474 - [c25]Peng Liu, Omer Tripp, Charles Zhang:
Grail: context-aware fixing of concurrency bugs. SIGSOFT FSE 2014: 318-329 - [e1]Hong Mei, Jian Lv, Minghui Zhou, Charles Zhang:
Proceedings of the 6th Asia-Pacific Symposium on Internetware, Internetware 2014, Hong Kong, China, November 17, 2014. ACM 2014, ISBN 978-1-4503-3303-0 [contents] - 2013
- [j4]Jeff Huang, Jinguo Zhou, Charles Zhang:
Scaling predictive analysis of concurrent programs by removing trace redundancy. ACM Trans. Softw. Eng. Methodol. 22(1): 8:1-8:21 (2013) - [c24]Jeff Huang, Charles Zhang, Julian Dolby:
CLAP: recording local executions to reproduce concurrency failures. PLDI 2013: 141-152 - [c23]Peng Liu, Julian Dolby, Charles Zhang:
Finding incorrect compositions of atomicity. ESEC/SIGSOFT FSE 2013: 158-168 - 2012
- [j3]Peng Liu, Charles Zhang:
Pert: The Application-Aware Tailoring of Java Object Persistence. IEEE Trans. Software Eng. 38(4): 909-922 (2012) - [j2]Charles Zhang, Hans-Arno Jacobsen:
Mining Crosscutting Concerns through Random Walks. IEEE Trans. Software Eng. 38(5): 1123-1137 (2012) - [c22]Yin Wang, Peng Liu, Terence Kelly, Stéphane Lafortune
, Spyros A. Reveliotis, Charles Zhang:
On atomicity enforcement in concurrent software via Discrete Event Systems theory. CDC 2012: 7230-7237 - [c21]Peng Liu, Charles Zhang:
Axis: Automatically fixing atomicity violations through solving control constraints. ICSE 2012: 299-309 - [c20]Jinguo Zhou, Xiao Xiao
, Charles Zhang:
Stride: Search-based deterministic replay in polynomial time via bounded linkage. ICSE 2012: 892-902 - [c19]Jeff Huang, Charles Zhang:
LEAN: simplifying concurrency bug reproduction via replay-supported execution reduction. OOPSLA 2012: 451-466 - [c18]Jeff Huang, Charles Zhang:
Execution privatization for scheduler-oblivious concurrent programs. OOPSLA 2012: 737-752 - 2011
- [c17]Xiao Xiao, Jinguo Zhou, Charles Zhang:
Tracking data structures for postmortem analysis. ICSE 2011: 896-899 - [c16]Jeff Huang, Charles Zhang:
Persuasive prediction of concurrency access anomalies. ISSTA 2011: 144-154 - [c15]Xiao Xiao, Charles Zhang:
Geometric encoding: forging the high performance context sensitive points-to analysis for Java. ISSTA 2011: 188-198 - [c14]Jeff Huang, Charles Zhang:
An Efficient Static Trace Simplification Technique for Debugging Concurrent Programs. SAS 2011: 163-179 - 2010
- [c13]Wei Jiang, Charles Zhang, Zhenqiu Huang, Mingwen Chen, Songlin Hu, Zhiyong Liu:
QSynth: A Tool for QoS-aware Automatic Service Composition. ICWS 2010: 42-49 - [c12]Wei Li, Charles Zhang, Songlin Hu:
G-Finder: routing programming questions closer to the experts. OOPSLA 2010: 62-73 - [c11]Jeff Huang, Peng Liu, Charles Zhang:
LEAP: lightweight deterministic multi-processor replay of concurrent java programs. SIGSOFT FSE 2010: 207-216 - [c10]Jeff Huang, Peng Liu, Charles Zhang:
LEAP: lightweight deterministic multi-processor replay of concurrent java programs. SIGSOFT FSE 2010: 385-386
2000 – 2009
- 2009
- [c9]Charles Zhang:
FlexSync: An aspect-oriented approach to Java synchronization. ICSE 2009: 375-385 - 2008
- [c8]Charles Zhang, Hans-Arno Jacobsen:
Externalizing Java Server Concurrency with CAL. ECOOP 2008: 362-386 - 2007
- [c7]Charles Zhang, Hans-Arno Jacobsen:
Efficiently mining crosscutting concerns through random walks. AOSD 2007: 226-238 - 2005
- [c6]Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen:
Towards just-in-time middleware architectures. AOSD 2005: 63-74 - [c5]Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen:
Generic Middleware Substrate Through Modelware. Middleware 2005: 314-333 - 2004
- [c4]Charles Zhang, Hans-Arno Jacobsen:
PRISM is research in aSpect mining. OOPSLA Companion 2004: 20-21 - [c3]Charles Zhang, Hans-Arno Jacobsen:
Resolving feature convolution in middleware systems. OOPSLA 2004: 188-205 - 2003
- [j1]Charles Zhang, Hans-Arno Jacobsen:
Refactoring Middleware with Aspects. IEEE Trans. Parallel Distributed Syst. 14(11): 1058-1073 (2003) - [c2]Charles Zhang, Hans-Arno Jacobsen:
Quantifying aspects in middleware platforms. AOSD 2003: 130-139 - [c1]Charles Zhang, Hans-Arno Jacobsen:
Re-factoring Middleware Systems: A Case Study. OTM 2003: 1243-1262
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-26 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint