default search action
Heyuan Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Ying Fu, Meng Ren, Fuchen Ma, Xin Yang, Heyuan Shi, Shanshan Li, Xiangke Liao:
EVMFuzz: Differential fuzz testing of Ethereum virtual machine. J. Softw. Evol. Process. 36(4) (2024) - [j21]Liqiang Wu, Shaojing Fu, Yuchuan Luo, Hongyang Yan, Heyuan Shi, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(1): 270-283 (2024) - [j20]Fangfang Li, Zhi Liu, Junwen Duan, Xingliang Mao, Heyuan Shi, Shichao Zhang:
Exploiting Conversation-Branch-Tweet HyperGraph Structure to Detect Misinformation on Social Media. ACM Trans. Knowl. Discov. Data 18(2): 33:1-33:20 (2024) - [j19]Kehua Guo, Liang Chen, Xiangyuan Zhu, Xiaoyan Kui, Jian Zhang, Heyuan Shi:
Double-Layer Search and Adaptive Pooling Fusion for Reference-Based Image Super-Resolution. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 15:1-15:23 (2024) - [j18]Yu Zhan, Ying Fu, Liang Huang, Jianmin Guo, Heyuan Shi, Houbing Song, Chao Hu:
Cube-Evo: A Query-Efficient Black-Box Attack on Video Classification System. IEEE Trans. Reliab. 73(2): 1160-1171 (2024) - [c17]Yuheng Shen, Jianzhong Liu, Yiru Xu, Hao Sun, Mingzhe Wang, Nan Guan, Heyuan Shi, Yu Jiang:
Enhancing ROS System Fuzzing through Callback Tracing. ISSTA 2024: 76-87 - [c16]Gwihwan Go, Chijin Zhou, Quan Zhang, Xiazijian Zou, Heyuan Shi, Yu Jiang:
Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement. ISSTA 2024: 1338-1350 - [c15]Feifan Wu, Zhengxiong Luo, Yanyang Zhao, Qingpeng Du, Junze Yu, Ruikang Peng, Heyuan Shi, Yu Jiang:
Logos: Log Guided Fuzzing for Protocol Implementations. ISSTA 2024: 1720-1732 - [c14]Zhengxiong Luo, Kai Liang, Yanyang Zhao, Feifan Wu, Junze Yu, Heyuan Shi, Yu Jiang:
DynPRE: Protocol Reverse Engineering via Dynamic Inference. NDSS 2024 - [c13]Jing Luo, Heyuan Shi, Yongchao Zhang, Runzhe Wang, Yuheng Shen, Yuao Chen, Xiaohai Shi, Rongkai Liu, Chao Hu, Yu Jiang:
CVECenter: Industry Practice of Automated Vulnerability Management for Linux Distribution Community. SIGSOFT FSE Companion 2024: 329-339 - [c12]Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang:
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications. SIGSOFT FSE Companion 2024: 502-506 - [c11]Rongkai Liu, Heyuan Shi, Yongchao Zhang, Runzhe Wang, Yuheng Shen, Yuao Chen, Jing Luo, Xiaohai Shi, Chao Hu, Yu Jiang:
PatchBert: Continuous Stable Patch Identification for Linux Kernel via Pre-trained Model Fine-tuning. SANER 2024: 349-358 - [i4]Jinjing Shi, Zimeng Xiao, Heyuan Shi, Yu Jiang, Xuelong Li:
QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems. CoRR abs/2402.12950 (2024) - [i3]Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang:
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications. CoRR abs/2404.17196 (2024) - 2023
- [j17]Fuchen Ma, Meng Ren, Fu Ying, Wanting Sun, Houbing Song, Heyuan Shi, Yu Jiang, Huizhong Li:
V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability. ACM Trans. Internet Techn. 23(3): 40:1-40:22 (2023) - [j16]Liqiang Wu, Heyuan Shi, Shaojing Fu, Yuchuan Luo, Ming Xu:
p2Detect: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid. IEEE Trans. Smart Grid 14(3): 2301-2312 (2023) - [c10]Qinglong Wang, Runzhe Wang, Yuxi Hu, Xiaohai Shi, Zheng Liu, Tao Ma, Houbing Song, Heyuan Shi:
KeenTune: Automated Tuning Tool for Cloud Application Performance Testing and Optimization. ISSTA 2023: 1487-1490 - [c9]Yuheng Shen, Shijun Chen, Jianzhong Liu, Yiru Xu, Qiang Zhang, Runzhe Wang, Heyuan Shi, Yu Jiang:
Brief Industry Paper: Directed Kernel Fuzz Testing on Real-time Linux. RTSS 2023: 495-499 - [i2]Chao Hu, Ruishi Yu, Binqi Zeng, Yu Zhan, Ying Fu, Quan Zhang, Rongkai Liu, Heyuan Shi:
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks. CoRR abs/2302.12407 (2023) - 2022
- [j15]Heyuan Shi, Guyu Wang, Ying Fu, Chao Hu, Houbing Song, Jian Dong, Kun Tang, Kai Liang:
Abaci-finder: Linux kernel crash classification through stack trace similarity learning. J. Parallel Distributed Comput. 168: 70-79 (2022) - [j14]Jinjing Shi, Shuhui Chen, Tian Chen, Tongge Zhao, Jiuqi Tang, Qin Li, Chunlin Yu, Heyuan Shi:
Image encryption with quantum cellular neural network. Quantum Inf. Process. 21(6): 214 (2022) - [j13]Yuheng Shen, Yiru Xu, Hao Sun, Jianzhong Liu, Zichen Xu, Aiguo Cui, Heyuan Shi, Yu Jiang:
Tardis: Coverage-Guided Embedded Operating System Fuzzing. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4563-4574 (2022) - [j12]Jianmin Guo, Quan Zhang, Yue Zhao, Heyuan Shi, Yu Jiang, Jia-Guang Sun:
RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems. IEEE Trans. Software Eng. 48(10): 4167-4180 (2022) - [c8]Runzhe Wang, Qinglong Wang, Yuxi Hu, Heyuan Shi, Yuheng Shen, Yu Zhan, Ying Fu, Zheng Liu, Xiaohai Shi, Yu Jiang:
Industry practice of configuration auto-tuning for cloud applications and services. ESEC/SIGSOFT FSE 2022: 1555-1565 - 2021
- [j11]Hui Wang, Jian Dong, Kun Tang, Heyuan Shi:
Outage Performance Analysis of NOMA in Wireless Powered Cognitive Radio Networks with AF and DF Relaying Techniques. Entropy 23(11): 1463 (2021) - [j10]Yuheng Shen, Hao Sun, Yu Jiang, Heyuan Shi, Yixiao Yang, Wanli Chang:
Rtkaller: State-aware Task Generation for RTOS Fuzzing. ACM Trans. Embed. Comput. Syst. 20(5s): 83:1-83:22 (2021) - [c7]Jiawei Luo, Zihan Lai, Cong Shen, Pei Liu, Heyuan Shi:
Graph Attention Mechanism-based Deep Tensor Factorization for Predicting disease-associated miRNA-miRNA pairs. BIBM 2021: 189-196 - [c6]Zhipin Gu, Yuexiang Yang, Heyuan Shi:
Detecting Malicious Gradients from Asynchronous SGD on Variational Autoencoder. SRDS 2021: 321-330
2010 – 2019
- 2019
- [j9]Heyuan Shi, Runzhe Wang, Ying Fu, Yu Jiang, Jian Dong, Kun Tang, Jiaguang Sun:
Vulnerable Code Clone Detection for Operating System Through Correlation-Induced Learning. IEEE Trans. Ind. Informatics 15(12): 6551-6559 (2019) - [j8]Heyuan Shi, Yubo Zhang, Zizhao Zhang, Nan Ma, Xibin Zhao, Yue Gao, Jiaguang Sun:
Hypergraph-Induced Convolutional Networks for Visual Classification. IEEE Trans. Neural Networks Learn. Syst. 30(10): 2963-2972 (2019) - [c5]Yi Ye, Bo Xu, Li Ma, Jiayan Zhu, Heyuan Shi, Xiaohong Cai:
Research on treatment and medication rule of insomnia treated by TCM based on data mining. BIBM 2019: 2503-2508 - [c4]Heyuan Shi, Runzhe Wang, Ying Fu, Mingzhe Wang, Xiaohai Shi, Xun Jiao, Houbing Song, Yu Jiang, Jiaguang Sun:
Industry practice of coverage-guided enterprise Linux kernel fuzzing. ESEC/SIGSOFT FSE 2019: 986-995 - [c3]Ying Fu, Meng Ren, Fuchen Ma, Heyuan Shi, Xin Yang, Yu Jiang, Huizhong Li, Xiang Shi:
EVMFuzzer: detect EVM vulnerabilities via fuzz testing. ESEC/SIGSOFT FSE 2019: 1110-1114 - [i1]Ying Fu, Meng Ren, Fuchen Ma, Yu Jiang, Heyuan Shi, Jiaguang Sun:
EVMFuzz: Differential Fuzz Testing of Ethereum Virtual Machine. CoRR abs/1903.08483 (2019) - 2018
- [j7]Chengbao Liu, Jie Tan, Heyuan Shi, Xuelei Wang:
Lithium-Ion Cell Screening With Convolutional Neural Networks Based on Two-Step Time-Series Clustering and Hybrid Resampling for Imbalanced Data. IEEE Access 6: 59001-59014 (2018) - [j6]Kun Tang, Ronghua Shi, Heyuan Shi, Md. Zakirul Alam Bhuiyan, Entao Luo:
Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting. Ad Hoc Networks 81: 174-182 (2018) - [j5]Heyuan Shi, Xibin Zhao, Hai Wan, Huihui Wang, Jian Dong, Kun Tang, Anfeng Liu:
Multi-model induced network for participatory-sensing-based classification tasks in intelligent and connected transportation systems. Comput. Networks 141: 157-165 (2018) - [j4]Kun Tang, Ronghua Shi, Jingchun Xi, Heyuan Shi, Wentai Lei:
Cooperative spectrum sharing in cognitive radio networks with energy accumulation: design and analysis. IET Commun. 12(15): 1788-1796 (2018) - [c2]Xibin Zhao, Nan Wang, Heyuan Shi, Hai Wan, Jin Huang, Yue Gao:
Hypergraph Learning With Cost Interval Optimization. AAAI 2018: 4522-4529 - [c1]Jian Gao, Xin Yang, Ying Fu, Yu Jiang, Heyuan Shi, Jiaguang Sun:
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation. ESEC/SIGSOFT FSE 2018: 803-808 - 2017
- [j3]Heyuan Shi, Kun Tang, Chengbao Liu, Xiaoyu Song, Chao Hu, Jiaguang Sun:
Memetic-based schedule synthesis for communication on time-triggered embedded systems. Int. J. Distributed Sens. Networks 13(10) (2017) - [j2]Lei She, Xibin Zhao, Yu Chen, Heyuan Shi, Kang Wei:
轨道交通实时以太网交换机启动性能的分析与优化 (Analysis and Optimization of Boot-up Performance for Railway Real-time Ethernet Switch). 计算机科学 44(Z11): 276-280 (2017) - 2016
- [j1]Heyuan Shi, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks. Sensors 16(12): 2013 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint