


default search action
Quan Zhang 0003
Person information
- affiliation: East China Normal University, Software Engineering Institute, Shanghai, China
- affiliation (2020 - 2025): Tsinghua University, School of Software, Beijing, China
Other persons with the same name
- Quan Zhang — disambiguation page
- Quan Zhang 0001
— Wayne State University, Department of Computer Science, Detroit, MI, USA - Quan Zhang 0002 — North University of China, School of Information and Communication Engineering, Shanxi Provincial Key Laboratory for Biomedical Imaging and Big Data, Taiyuan, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j6]Lihua Guo
, Yiwei Hou
, Chijin Zhou
, Quan Zhang
, Yu Jiang
:
Ransomware Detection through Temporal Correlation between Encryption and I/O Behavior. Proc. ACM Softw. Eng. 2(FSE): 197-218 (2025)
[j5]Yiwei Hou
, Lihua Guo
, Chijin Zhou
, Quan Zhang
, Wenhuan Liu
, Chengnian Sun
, Yu Jiang
:
Preventing Disruption of System Backup against Ransomware Attacks. Proc. ACM Softw. Eng. 2(ISSTA): 229-249 (2025)
[c11]Chijin Zhou, Quan Zhang, Bingzhou Qian, Yu Jiang:
Janus: Detecting Rendering Bugs in Web Browsers via Visual Delta Consistency. ICSE 2025: 2702-2713
[c10]Gwihwan Go
, Chijin Zhou
, Quan Zhang
, Yu Jiang
, Zhao Wei
:
LSPAI: An IDE Plugin for LLM-Powered Multi-Language Unit Test Generation with Language Server Protocol. SIGSOFT FSE Companion 2025: 144-149
[i5]Binqi Zeng, Quan Zhang, Chijin Zhou, Gwihwan Go, Yu Jiang, Heyuan Shi:
Inducing Vulnerable Code Generation in LLM Coding Assistants. CoRR abs/2504.15867 (2025)
[i4]Gwihwan Go, Quan Zhang, Chijin Zhou, Zhao Wei, Yu Jiang:
LSPRAG: LSP-Guided RAG for Language-Agnostic Real-Time Unit Test Generation. CoRR abs/2510.22210 (2025)- 2024
[j4]Chijin Zhou
, Bingzhou Qian
, Gwihwan Go
, Quan Zhang
, Shanshan Li
, Yu Jiang
:
PolyJuice: Detecting Mis-compilation Bugs in Tensor Compilers with Equality Saturation Based Rewriting. Proc. ACM Program. Lang. 8(OOPSLA2): 1309-1335 (2024)
[c9]Gwihwan Go
, Chijin Zhou
, Quan Zhang
, Xiazijian Zou
, Heyuan Shi
, Yu Jiang
:
Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement. ISSTA 2024: 1338-1350
[c8]Quan Zhang
, Chijin Zhou
, Gwihwan Go
, Binqi Zeng, Heyuan Shi
, Zichen Xu
, Yu Jiang
:
Imperceptible Content Poisoning in LLM-Powered Applications. ASE 2024: 242-254
[c7]Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang:
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization. NDSS 2024
[c6]Yu Jiang
, Jie Liang
, Fuchen Ma
, Yuanliang Chen
, Chijin Zhou
, Yuheng Shen
, Zhiyong Wu
, Jingzhou Fu
, Mingzhe Wang
, Shanshan Li
, Quan Zhang
:
When Fuzzing Meets LLMs: Challenges and Opportunities. SIGSOFT FSE Companion 2024: 492-496
[c5]Quan Zhang
, Binqi Zeng
, Chijin Zhou
, Gwihwan Go
, Heyuan Shi
, Yu Jiang
:
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications. SIGSOFT FSE Companion 2024: 502-506
[d4]Quan Zhang
:
Imperceptible Content Poisoning in LLM-Powered Applications. Version 1. Zenodo, 2024 [all versions]
[d3]Quan Zhang
:
Imperceptible Content Poisoning in LLM-Powered Applications. Version 2. Zenodo, 2024 [all versions]
[d2]Quan Zhang
:
Imperceptible Content Poisoning in LLM-Powered Applications. Version 3. Zenodo, 2024 [all versions]
[d1]Quan Zhang
:
Imperceptible Content Poisoning in LLM-Powered Applications. Version 4. Zenodo, 2024 [all versions]
[i3]Yu Jiang, Jie Liang, Fuchen Ma, Yuanliang Chen, Chijin Zhou, Yuheng Shen, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, ShanShan Li, Quan Zhang:
When Fuzzing Meets LLMs: Challenges and Opportunities. CoRR abs/2404.16297 (2024)
[i2]Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang:
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications. CoRR abs/2404.17196 (2024)- 2023
[j3]Chijin Zhou
, Quan Zhang
, Lihua Guo
, Mingzhe Wang
, Yu Jiang
, Qing Liao
, Zhiyong Wu
, Shanshan Li
, Bin Gu
:
Towards Better Semantics Exploration for Browser Fuzzing. Proc. ACM Program. Lang. 7(OOPSLA2): 604-631 (2023)
[j2]Quan Zhang
, Chijin Zhou
, Yiwen Xu
, Zijing Yin
, Mingzhe Wang
, Zhuo Su
, Chengnian Sun
, Yu Jiang
, Jia-Guang Sun
:
Building Dynamic System Call Sandbox with Partial Order Analysis. Proc. ACM Program. Lang. 7(OOPSLA2): 1253-1280 (2023)
[c4]Quan Zhang, Yongqiang Tian, Yifeng Ding, Shanshan Li, Chengnian Sun, Yu Jiang, Jiaguang Sun:
CoopHance: Cooperative Enhancement for Robustness of Deep Learning Systems. ISSTA 2023: 753-765
[c3]Chijin Zhou
, Lihua Guo, Yiwei Hou, Zhenya Ma, Quan Zhang, Mingzhe Wang, Zhe Liu, Yu Jiang:
Limits of I/O Based Ransomware Detection: An Imitation Based Attack. SP 2023: 2584-2601
[i1]Chao Hu, Ruishi Yu, Binqi Zeng, Yu Zhan, Ying Fu, Quan Zhang, Rongkai Liu, Heyuan Shi:
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks. CoRR abs/2302.12407 (2023)- 2022
[j1]Jianmin Guo
, Quan Zhang, Yue Zhao, Heyuan Shi
, Yu Jiang
, Jia-Guang Sun:
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems. IEEE Trans. Software Eng. 48(10): 4167-4180 (2022)
[c2]Chijin Zhou
, Quan Zhang, Mingzhe Wang, Lihua Guo, Jie Liang, Zhe Liu, Mathias Payer, Yu Jiang:
Minerva: browser API fuzzing with dynamic mod-ref analysis. ESEC/SIGSOFT FSE 2022: 1135-1147- 2021
[c1]Quan Zhang
, Yifeng Ding
, Yongqiang Tian
, Jianmin Guo, Min Yuan, Yu Jiang
:
AdvDoor: adversarial backdoor attack of deep learning system. ISSTA 2021: 127-138
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-29 03:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






