ORCID as entered in ROS

Select Publications
2025, 'S
2025, 'OptRCA: A More Efficient and Accurate Approach for Automated Root Cause Analysis and Explanation', ACM Transactions on Software Engineering and Methodology, http://dx.doi.org/10.1145/3736718
,2025, 'TransferFuzz-Pro: Large Language Model Driven Code Debugging Technology for Verifying Propagated Vulnerability', IEEE Transactions on Software Engineering, http://dx.doi.org/10.1109/TSE.2025.3584774
,2024, 'A Survey of Protocol Fuzzing', ACM Computing Surveys, 57, http://dx.doi.org/10.1145/3696788
,2024, 'Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models', Proceedings of the ACM on Programming Languages, 8, http://dx.doi.org/10.1145/3689776
,2024, 'Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection', Proceedings of the ACM on Software Engineering, 1, pp. 2075 - 2097, http://dx.doi.org/10.1145/3660799
,2022, 'Avoiding Structural Collapse to Reduce Lead Leakage in Perovskite Photovoltaics', ANGEWANDTE CHEMIE-INTERNATIONAL EDITION, 61, http://dx.doi.org/10.1002/anie.202204314
,2022, 'Deep Learning for Coverage-Guided Fuzzing: How Far are We?', IEEE Transactions on Dependable and Secure Computing, pp. 1 - 13, http://dx.doi.org/10.1109/TDSC.2022.3200525
,2022, 'An integrated hydrodynamic and multicriteria evaluation Cellular Automata-Markov model to assess the effects of a water resource project on waterbird habitat in wetlands', JOURNAL OF HYDROLOGY, 607, http://dx.doi.org/10.1016/j.jhydrol.2022.127561
,2020, 'New assessment indicator of habitat suitability for migratory bird in wetland based on hydrodynamic model and vegetation growth threshold', ECOLOGICAL INDICATORS, 117, http://dx.doi.org/10.1016/j.ecolind.2020.106556
,2019, 'Development and Validation of a Prognostic Tool for Identifying Residents at Increased Risk of Death in Long-Term Care Facilities', JOURNAL OF PALLIATIVE MEDICINE, 22, pp. 258 - 266, http://dx.doi.org/10.1089/jpm.2018.0219
,2025, 'IllusionCAPTCHA: A CAPTCHA based on Visual Illusion', in Www 2025 Proceedings of the ACM Web Conference, pp. 3683 - 3691, http://dx.doi.org/10.1145/3696410.3714726
,2025, 'A Methodology for Replicating Historical Exploits on EVM-Compatible Blockchains', in Proceedings 2025 IEEE ACM 7th International Workshop on Emerging Trends in Software Engineering for Blockchain Wetseb 2025, pp. 57 - 60, http://dx.doi.org/10.1109/WETSEB66605.2025.00014
,2025, 'A Rusty Link in the AI Supply Chain: Detecting Evil Configurations in Model Repositories', in Proceedings 46th IEEE Symposium on Security and Privacy Workshops Spw 2025, pp. 260 - 264, http://dx.doi.org/10.1109/SPW67851.2025.00036
,2025, 'Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models', in Proceedings 46th IEEE Symposium on Security and Privacy Workshops Spw 2025, pp. 270 - 277, http://dx.doi.org/10.1109/SPW67851.2025.00038
,2025, 'Good News for Script Kiddies? Evaluating Large Language Models for Automated Exploit Generation', in Proceedings 46th IEEE Symposium on Security and Privacy Workshops Spw 2025, pp. 278 - 282, http://dx.doi.org/10.1109/SPW67851.2025.00039
,2025, 'Source Code Summarization in the Era of Large Language Models', in Proceedings International Conference on Software Engineering, pp. 1882 - 1894, http://dx.doi.org/10.1109/ICSE55347.2025.00034
,2025, 'TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code', in Proceedings International Conference on Software Engineering, pp. 268 - 280, http://dx.doi.org/10.1109/ICSE55347.2025.00061
,2025, 'Truman: A Large Language Model-based Multi-agent Simulator for Synthetic Money Laundering Data Generation', in Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems Aamas, pp. 2594 - 2596
,2024, 'Demystifying RCE Vulnerabilities in LLM-Integrated Apps', in Ccs 2024 Proceedings of the 2024 ACM Sigsac Conference on Computer and Communications Security, pp. 1716 - 1730, http://dx.doi.org/10.1145/3658644.3690338
,2024, 'Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation', in Proceedings 2024 39th ACM IEEE International Conference on Automated Software Engineering Ase 2024, pp. 631 - 642, http://dx.doi.org/10.1145/3691620.3695059
,2024, 'Bugs in Pods: Understanding Bugs in Container Runtime Systems', in Issta 2024 Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 1364 - 1376, http://dx.doi.org/10.1145/3650212.3680366
,2024, 'How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation', in Issta 2024 Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 1223 - 1235, http://dx.doi.org/10.1145/3650212.3680355
,2024, 'A Hitchhiker’s Guide to Jailbreaking ChatGPT via Prompt Engineering', in Sea4dq 2024 Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber Physical Systems Internet of Things Co Located with Esec Fse 2024, pp. 12 - 21, http://dx.doi.org/10.1145/3663530.3665021
,2024, 'Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations', in Www 2024 Proceedings of the ACM Web Conference, pp. 1668 - 1679, http://dx.doi.org/10.1145/3589334.3645476
,2024, 'MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation', in Proceedings 2024 IEEE ACM 1st International Conference on AI Foundation Models and Software Engineering Forge 2024, pp. 12 - 23, http://dx.doi.org/10.1145/3650105.3652297
,2024, 'Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems', in Proceedings of the 33rd Usenix Security Symposium, pp. 7067 - 7084
,2024, 'PENTESTGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing', in Proceedings of the 33rd Usenix Security Symposium, pp. 847 - 864
,2023, 'Monitoring Automotive Software Security Health through Trustworthiness Score', in Proceedings Cscs 2023 7th ACM Computer Science in Cars Symposium, http://dx.doi.org/10.1145/3631204.3631859
,2023, 'ACETest: Automated Constraint Extraction for Testing Deep Learning Operators', in Issta 2023 Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 690 - 702, http://dx.doi.org/10.1145/3597926.3598088
,2023, 'ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers', in Proceedings 2023 38th IEEE ACM International Conference on Automated Software Engineering Ase 2023, pp. 510 - 521, http://dx.doi.org/10.1109/ASE56229.2023.00107
,2023, 'HasteFuzz: Full-Speed Fuzzing', in Proceedings 2023 IEEE ACM International Workshop on Search Based and Fuzz Testing Sbft 2023, pp. 73 - 75, http://dx.doi.org/10.1109/SBFT59156.2023.00022
,2023, 'NAUTILUS: Automated RESTful API Vulnerability Detection', in 32nd Usenix Security Symposium Usenix Security 2023, pp. 5593 - 5610
,2023, 'PumpChannel: An Efficient and Secure Communication Channel for Trusted Execution Environment on ARM-FPGA Embedded SoC', in Proceedings Design Automation and Test in Europe Date, http://dx.doi.org/10.23919/DATE56975.2023.10137170
,2023, 'RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing', in Proceedings IEEE Symposium on Security and Privacy, pp. 2155 - 2169, http://dx.doi.org/10.1109/SP46215.2023.10179421
,2022, 'More Secure Collaborative APIs resistant to Flush-Based Cache Attacks on Cortex-A9 Based Automotive System', in Proceedings Cscs 2022 6th ACM Computer Science in Cars Symposium, http://dx.doi.org/10.1145/3568160.3570227
,2022, 'Morest: Industry Practice of Automatic RESTful API Testing', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3559498
,2022, 'Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation', in Issta 2022 Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 417 - 428, http://dx.doi.org/10.1145/3533767.3534414
,2022, 'Morest: Model-based RESTful API Testing with Execution Feedback', in Proceedings International Conference on Software Engineering, pp. 1406 - 1417, http://dx.doi.org/10.1145/3510003.3510133
,2022, 'RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix', in Proceedings of the 31st Usenix Security Symposium Security 2022, pp. 4183 - 4200
,2022, 'Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks', in Proceedings International Conference on Software Engineering, pp. 2440 - 2451, http://dx.doi.org/10.1145/3510003.3510197
,2021, 'SoFi: Reflection-Augmented Fuzzing for JavaScript Engines', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 2229 - 2242, http://dx.doi.org/10.1145/3460120.3484823
,2021, 'A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing', in Proceedings 2021 36th IEEE ACM International Conference on Automated Software Engineering Ase 2021, pp. 1186 - 1189, http://dx.doi.org/10.1109/ASE51524.2021.9678794
,2021, 'APICRAFT: Fuzz driver generation for closed-source SDK libraries', in Proceedings of the 30th Usenix Security Symposium, pp. 2811 - 2828
,2021, 'AutoCom: Automatic comment generation for C code', in Proceedings of the International Conference on Software Engineering and Knowledge Engineering Seke, pp. 632 - 633, http://dx.doi.org/10.18293/SEKE2021-202
,2021, 'BIFF: Practical Binary Fuzzing Framework for Programs of IoT and Mobile Devices', in Proceedings 2021 36th IEEE ACM International Conference on Automated Software Engineering Ase 2021, pp. 1161 - 1165, http://dx.doi.org/10.1109/ASE51524.2021.9678910
,2021, 'Vall-nut: Principled Anti-Grey box - Fuzzing', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 288 - 299, http://dx.doi.org/10.1109/ISSRE52982.2021.00039
,2020, 'Ori: A greybox fuzzer for SOME/IP protocols in automotive ethernet', in Proceedings Asia Pacific Software Engineering Conference APSEC, pp. 495 - 499, http://dx.doi.org/10.1109/APSEC51365.2020.00063
,2020, 'Memlock: Memory usage guided fuzzing', in Proceedings International Conference on Software Engineering, pp. 765 - 777, http://dx.doi.org/10.1145/3377811.3380396
,2020, 'Typestate-guided fuzzer for discovering use-after-free vulnerabilities', in Proceedings International Conference on Software Engineering, pp. 999 - 1010, http://dx.doi.org/10.1145/3377811.3380386
,