


default search action
Zhen Li 0027
Person information
- affiliation: Hebei University, School of Cyber Security and Computer, Baoding, China
- affiliation: Huazhong University of Science and Technology, School of Computer Science and Technology, Big Data Security Engineering Research Center, Wuhan, China
Other persons with the same name
- Zhen Li — disambiguation page
- Zhen Li 0001
— Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China (and 2 more)
- Zhen Li 0002 — Beijing Jiaotong University, School of Electronic and Information Engineering, China
- Zhen Li 0003
— Clemson University, SC, USA (and 3 more)
- Zhen Li 0004
— Beijing Institute of Technology, School of Automation, China (and 1 more)
- Zhen Li 0005 — Darmstadt University of Technology, Germany
- Zhen Li 0006 — University of Georgia, Athens, GA, USA
- Zhen Li 0007
— Jiangsu University, School of Management, Zhenjiang, China
- Zhen Li 0008 — Dolby Laboratories Inc., Burbank, CA, USA (and 2 more)
- Zhen Li 0009
— National University of Defense Technology, College of System Engineering, Changsha, China
- Zhen Li 0010 — Rutgers University, Department of Electrical and Computer Engineering, Applied Software Systems Laboratory, Piscataway, NJ, USA
- Zhen Li 0011
— Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (and 1 more)
- Zhen Li 0012
— Xi'an University of Posts and Telecommunications, School of Automation, China (and 1 more)
- Zhen Li 0013
— Huazhong University of Science and Technology, Tongji Medical College, Wuhan, China
- Zhen Li 0014
— Tōyō University, Tokyo, Japan
- Zhen Li 0015
— Sun Yat-sen University, School of Life Sciences / Guangzhou Key Laboratory of Urban Landscape Dynamics, Guangzhou, China
- Zhen Li 0016
— Xi'an Jiaotong University, School of Electronic and Information Engineering, National Engineering Laboratory for Offshore Oil Exploration, China
- Zhen Li 0017
— Beijing Institute of Technology, School of Information and Electronics, China
- Zhen Li 0018
— Xiangtan University, College of Information Engineering, China
- Zhen Li 0019
— Chang'an University, School of Automobile, Xi'an, China
- Zhen Li 0020
— Jiangsu University of Science and Technology, School of Electronics and Information, Zhenjiang, China
- Zhen Li 0021
— Northeast Normal University, School of Information Science and Technology, Changchun, China
- Zhen Li 0022
— Capital Normal University, Beijing Advanced Innovation Center for Imaging Theory and Technology, China
- Zhen Li 0023
— University of Toronto, ON, Canada
- Zhen Li 0024
— Ocean University of China, Department of Computer Science and Technology, Qingdao, China (and 1 more)
- Zhen Li 0025 — Albion College, Department of Economics and Management,, Albion, MI, USA
- Zhen Li 0026
— Chinese University of Hong Kong, Shenzhen Research Institute of Big Data, Shenzhen, China
- Zhen Li 0028 — WeRide.ai, San Francisco, CA, USA (and 2 more)
- Zhen Li 0029 — Hong Kong University of Science and Technology, Department of Mathematics, Hong Kong (and 1 more)
- Zhen Li 0031
— Nankai University, College of Computer Science, Tianjin, China (and 1 more)
- Zhen Li 0032 — Harbin Institute of Technology, School of Mechanical Engineering and Automation, Shenzhen, China
- Zhen Li 0033 — Middle Tennessee State University, Department of Management and Marketing, Murfreesboro, TN, USA (and 1 more)
- Zhen Li 0034 — Tongji University, Department of Mathematics, Shanghai, China
- Zhen Li 0035
— Politecnico di Milano, Department of Electronics, Information and Bioengineering, Milan, Italy (and 2 more)
- Zhen Li 0036
— Guizhou University, College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guiyang, China
- Zhen Li 0037
— Xidian University, School of Microelectronics, Xi'an, China
- Zhen Li 0038
— Michigan State University, Department of Chemistry, East Lansing, MI, USA (and 1 more)
- Zhen Li 0039
— China University of Petroleum (East China), Centre for Offshore Engineering and Safety Technology, Qingdao, China
- Zhen Li 0040
— China University of Mining & Technology, School of Architecture and Design, Xuzhou, China
- Zhen Li 0041
— Chinese Academy of Sciences, Key Laboratory of Watershed Geographic Sciences, Nanjing, China
- Zhen Li 0042
— China University of Geosciences, School of Geography and Information Engineering, Wuhan, China
- Zhen Li 0043
— China Agricultural University, College of Information and Electrical Engineering, Beijing, China
- Zhen Li 0044
— Hong Kong University of Science and Technology, Hong Kong (and 1 more)
- Zhen Li 0045
— Dalian University of Technology, School of Mechanical Engineering, Dalian, China
- Zhen Li 0046 — Ecole Centrale de Lyon, Lyon Institute of Nanotechnology, Ecully, France
- Zhen Li 0047 — Shanghai Grandhonor Information Technology Co. Ltd., Shanghai, China (and 1 more)
- Zhen Li 0048
— Peking University, Beijing, China
- Zhen Li 0049
— Chinese Academy of Sciences, Institute of Automation, Beijing, China
- Zhen Li 0050
— Huazhong University of Science and Technology, Wuhan, China
- Zhen Li 0051
— China Mobile Information Technology Center, Beijing, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Bin Yuan
, Maogen Yang
, Zheng Xu
, Qunjinming Chen
, Zhanxiang Song
, Zhen Li
, Deqing Zou
, Hai Jin
:
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure. IEEE Trans. Dependable Secur. Comput. 21(4): 3196-3210 (2024) - [j10]Bin Yuan
, Chi Zhang
, Jiajun Ren, Qunjinming Chen, Biang Xu, Qiankun Zhang
, Zhen Li, Deqing Zou
, Fan Zhang, Hai Jin
:
Toward Automated Attack Discovery in SDN Controllers Through Formal Verification. IEEE Trans. Netw. Serv. Manag. 21(3): 3636-3655 (2024) - [j9]Zhen Li
, Shasha Zhao
, Chen Chen
, Qian Chen
:
Reducing the Impact of Time Evolution on Source Code Authorship Attribution via Domain Adaptation. ACM Trans. Softw. Eng. Methodol. 33(6): 159 (2024) - [c12]Zhen Li
, Ning Wang
, Deqing Zou
, Yating Li
, Ruqian Zhang
, Shouhuai Xu
, Chao Zhang
, Hai Jin
:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. ICSE 2024: 157:1-157:12 - [i8]Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. CoRR abs/2401.09767 (2024) - 2023
- [j8]Ivandro Ortet Lopes
, Deqing Zou, Ihsan H. Abdulqadder, Saeed Akbar
, Zhen Li
, Francis A. Ruambo
, Wagner Pereira:
Network intrusion detection based on the temporal convolutional model. Comput. Secur. 135: 103465 (2023) - [j7]Zhen Li, Xiang Huang
, Yangrui Li, Guenevere Chen:
A comparative study of adversarial training methods for neural models of source code. Future Gener. Comput. Syst. 142: 165-181 (2023) - [c11]Bin Yuan, Yifan Lu, Yilin Fang, Yueming Wu
, Deqing Zou, Zhen Li, Zhi Li, Hai Jin:
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model. ICSE 2023: 2262-2274 - [c10]Zhen Li, Ruqian Zhang
, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. ASE 2023: 27-39 - [i7]Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. CoRR abs/2309.10644 (2023) - 2022
- [j6]Lili Liu, Zhen Li, Yu Wen, Penglong Chen:
Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors. PeerJ Comput. Sci. 8: e975 (2022) - [j5]Zhen Li
, Deqing Zou
, Shouhuai Xu
, Hai Jin
, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19(4): 2244-2258 (2022) - [j4]Zhen Li, Deqing Zou
, Shouhuai Xu
, Zhaoxuan Chen, Yawei Zhu, Hai Jin
:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. IEEE Trans. Dependable Secur. Comput. 19(4): 2821-2837 (2022) - [c9]Penglong Chen, Zhen Li, Yu Wen, Lili Liu:
Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations. ICECCS 2022: 173-182 - [c8]Zhen Li, Qian (Guenevere) Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. ICSE 2022: 1906-1918 - [c7]PengNan Hao, Zhen Li, Cui Liu, Yu Wen, Fanming Liu:
Towards Improving Multiple Authorship Attribution of Source Code. QRS 2022: 516-526 - [i6]Zhen Li, Guenevere Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. CoRR abs/2202.06043 (2022) - 2021
- [j3]Deqing Zou
, Sujuan Wang, Shouhuai Xu
, Zhen Li
, Hai Jin
:
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2224-2236 (2021) - [j2]Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. ACM Trans. Softw. Eng. Methodol. 30(2): 23:1-23:31 (2021) - [c6]Junfeng Tian, Chenxin Wang, Zhen Li, Yu Wen:
Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process. QRS 2021: 807-818 - [i5]Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin:
Towards Making Deep Learning-based Vulnerability Detectors Robust. CoRR abs/2108.00669 (2021) - 2020
- [i4]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. CoRR abs/2001.02334 (2020) - [i3]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector. CoRR abs/2001.02350 (2020)
2010 – 2019
- 2019
- [j1]Zhen Li, Deqing Zou
, Jing Tang, Zhihao Zhang, Mingqian Sun, Hai Jin
:
A Comparative Study of Deep Learning-Based Vulnerability Detection System. IEEE Access 7: 103184-103197 (2019) - [c5]Deqing Zou, Ju Yang, Zhen Li, Hai Jin, Xiaojing Ma:
AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process. GPC 2019: 238-253 - 2018
- [c4]Deqing Zou, Zhijun Deng, Zhen Li, Hai Jin:
Automatically Identifying Security Bug Reports via Multitype Features Analysis. ACISP 2018: 619-633 - [c3]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. NDSS 2018 - [d1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE DataPort, 2018 - [i2]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. CoRR abs/1801.01681 (2018) - [i1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. CoRR abs/1807.06756 (2018) - 2017
- [c2]Deqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong:
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. DIMVA 2017: 325-344 - 2016
- [c1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu:
VulPecker: an automated vulnerability detection system based on code similarity analysis. ACSAC 2016: 201-213
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-06 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint