Follow
Yuwei Li
Title
Cited by
Cited by
Year
{MOPT}: Optimized mutation scheduling for fuzzers
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019
2682019
V-Fuzz: Vulnerability Prediction-assisted Evolutionary Fuzzing for Binary Programs
Y Li, S Ji, C Lyu, Y Chen, J Chen, Q Gu, C Wu, B Raheem
IEEE Transactions on Cybernetics, 2020
96*2020
UNIFUZZ: A Holistic and Pragmatic Metrics-driven Platform for Evaluating Fuzzers
Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen, C Lyu, C Wu, R Beyah, ...
30th {USENIX} Security Symposium ({USENIX} Security 21)., 2021
892021
Smartseed: Smart Seed Generation for Efficient Fuzzing
C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen
arXiv preprint arXiv:1807.02606, 2018
442018
A relation aware embedding mechanism for relation extraction
X Li, Y Li, J Yang, H Liu, P Hu
Applied Intelligence 52 (9), 10022-10031, 2022
112022
Tunter: assessing exploitability of vulnerabilities with taint-guided exploitable states exploration
R Wang, K Chen, Z Pan, Y Li, Q Li, Y Li, M Zhang, C Zhang
Computers & Security 124, 102995, 2023
62023
HinPhish: An effective phishing detection approach based on heterogeneous information networks
B Guo, Y Zhang, C Xu, F Shi, Y Li, M Zhang
Applied Sciences 11 (20), 9733, 2021
62021
Measuring the Centrality of DNS Infrastructure in the Wild
C Xu, Y Zhang, F Shi, H Shan, B Guo, Y Li, P Xue
Applied Sciences 13 (9), 5739, 2023
42023
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing
Y Chen, Y Li, Z Pan, Y Lu, J Chen, S Ji
IEEE Transactions on Information Forensics and Security, 1251-1266, 2024
12024
A systematic empirical study on word embedding based methods in discovering Chinese black keywords
C Wang, Y Shen, Y Li, M Zhang, M Hu, J Zheng
Engineering Applications of Artificial Intelligence 125, 106775, 2023
12023
G-fuzz: A directed fuzzing framework for gvisor
Y Li, Y Chen, S Ji, X Zhang, G Yan, AX Liu, C Wu, Z Pan, P Lin
IEEE Transactions on Dependable and Secure Computing, 2023
12023
DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph
Y Chen, Z Pan, Y Chen, Y Li
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2023
12023
IoT Malicious Traffic Detection based on Federated Learning
Y Shen, Y Zhang, Y Li, W Ding, M Hu, Y Li, C Huang, J Wang
ICDF2C, 2023
2023
Optir-SBERT: Cross-architecture binary code similarity detection based on optimized LLVM IR
Y Yan, L Yu, T Wang, Y Li, Z Pan
ICDF2C, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–14