default search action
Chijin Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Yiwei Hou, Lihua Guo, Chijin Zhou, Yiwen Xu, Zijing Yin, Shanshan Li, Chengnian Sun, Yu Jiang:
An Empirical Study of Data Disruption by Ransomware Attacks. ICSE 2024: 161:1-161:12 - [c20]Gwihwan Go, Chijin Zhou, Quan Zhang, Xiazijian Zou, Heyuan Shi, Yu Jiang:
Towards More Complete Constraints for Deep Learning Library Testing via Complementary Set Guided Refinement. ISSTA 2024: 1338-1350 - [c19]Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang:
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization. NDSS 2024 - [c18]Jie Liang, Mingzhe Wang, Chijin Zhou, Zhiyong Wu, Jianzhong Liu, Yu Jiang:
Dodrio: Parallelizing Taint Analysis Based Fuzzing via Redundancy-Free Scheduling. SIGSOFT FSE Companion 2024: 244-254 - [c17]Yu Jiang, Jie Liang, Fuchen Ma, Yuanliang Chen, Chijin Zhou, Yuheng Shen, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Shanshan Li, Quan Zhang:
When Fuzzing Meets LLMs: Challenges and Opportunities. SIGSOFT FSE Companion 2024: 492-496 - [c16]Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang:
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications. SIGSOFT FSE Companion 2024: 502-506 - [c15]Mingzhe Wang, Jie Liang, Chijin Zhou, Zhiyong Wu, Jingzhou Fu, Zhuo Su, Qing Liao, Bin Gu, Bodong Wu, Yu Jiang:
Data Coverage for Guided Fuzzing. USENIX Security Symposium 2024 - [i3]Yu Jiang, Jie Liang, Fuchen Ma, Yuanliang Chen, Chijin Zhou, Yuheng Shen, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, ShanShan Li, Quan Zhang:
When Fuzzing Meets LLMs: Challenges and Opportunities. CoRR abs/2404.16297 (2024) - [i2]Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang:
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications. CoRR abs/2404.17196 (2024) - 2023
- [j3]Chijin Zhou, Quan Zhang, Lihua Guo, Mingzhe Wang, Yu Jiang, Qing Liao, Zhiyong Wu, Shanshan Li, Bin Gu:
Towards Better Semantics Exploration for Browser Fuzzing. Proc. ACM Program. Lang. 7(OOPSLA2): 604-631 (2023) - [j2]Quan Zhang, Chijin Zhou, Yiwen Xu, Zijing Yin, Mingzhe Wang, Zhuo Su, Chengnian Sun, Yu Jiang, Jia-Guang Sun:
Building Dynamic System Call Sandbox with Partial Order Analysis. Proc. ACM Program. Lang. 7(OOPSLA2): 1253-1280 (2023) - [c14]Mingrui Zhang, Chijin Zhou, Jianzhong Liu, Mingzhe Wang, Jie Liang, Juan Zhu, Yu Jiang:
Daisy: Effective Fuzz Driver Synthesis with Object Usage Sequence Analysis. ICSE-SEIP 2023: 87-98 - [c13]Chijin Zhou, Lihua Guo, Yiwei Hou, Zhenya Ma, Quan Zhang, Mingzhe Wang, Zhe Liu, Yu Jiang:
Limits of I/O Based Ransomware Detection: An Imitation Based Attack. SP 2023: 2584-2601 - 2022
- [c12]Zhiyong Wu, Jie Liang, Mingzhe Wang, Chijin Zhou, Yu Jiang:
Unicorn: detect runtime errors in time-series databases with hybrid input synthesis. ISSTA 2022: 251-262 - [c11]Zijing Yin, Yiwen Xu, Chijin Zhou, Yu Jiang:
Empirical Study of System Resources Abused by IoT Attackers. ASE 2022: 39:1-39:13 - [c10]Mingzhe Wang, Jie Liang, Chijin Zhou, Zhiyong Wu, Xinyi Xu, Yu Jiang:
Odin: on-demand instrumentation with on-the-fly recompilation. PLDI 2022: 1010-1024 - [c9]Chijin Zhou, Quan Zhang, Mingzhe Wang, Lihua Guo, Jie Liang, Zhe Liu, Mathias Payer, Yu Jiang:
Minerva: browser API fuzzing with dynamic mod-ref analysis. ESEC/SIGSOFT FSE 2022: 1135-1147 - [c8]Jie Liang, Mingzhe Wang, Chijin Zhou, Zhiyong Wu, Yu Jiang, Jianzhong Liu, Zhe Liu, Jiaguang Sun:
PATA: Fuzzing with Path Aware Taint Analysis. SP 2022: 1-17 - 2021
- [j1]Yu Wang, Chengzhe Piao, Chi Harold Liu, Chijin Zhou, Jian Tang:
Modeling User Interests With Online Social Network Influence by Memory Augmented Sequence Learning. IEEE Trans. Netw. Sci. Eng. 8(1): 541-554 (2021) - [c7]Mingzhe Wang, Zhiyong Wu, Xinyi Xu, Jie Liang, Chijin Zhou, Huafeng Zhang, Yu Jiang:
Industry Practice of Coverage-Guided Enterprise-Level DBMS Fuzzing. ICSE (SEIP) 2021: 328-337 - [c6]Mingzhe Wang, Jie Liang, Chijin Zhou, Yuanliang Chen, Zhiyong Wu, Yu Jiang:
Industrial Oriented Evaluation of Fuzzing Techniques. ICST 2021: 306-317 - [c5]Mingzhe Wang, Jie Liang, Chijin Zhou, Yu Jiang, Rui Wang, Chengnian Sun, Jiaguang Sun:
RIFF: Reduced Instruction Footprint for Coverage-Guided Fuzzing. USENIX ATC 2021: 147-159 - [i1]Mingzhe Wang, Zhiyong Wu, Xinyi Xu, Jie Liang, Chijin Zhou, Huafeng Zhang, Yu Jiang:
Industry Practice of Coverage-Guided Enterprise-Level DBMS Fuzzing. CoRR abs/2103.00804 (2021) - 2020
- [c4]Chijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Yu Jiang:
Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling. ASE 2020: 858-870
2010 – 2019
- 2019
- [c3]Chijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Chengnian Sun, Yu Jiang:
VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization. ASE 2019: 1078-1081 - [c2]Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, Zhuo Su:
EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. USENIX Security Symposium 2019: 1967-1983 - 2018
- [c1]Jie Liang, Yu Jiang, Yuanliang Chen, Mingzhe Wang, Chijin Zhou, Jiaguang Sun:
PAFL: extend fuzzing optimizations of single mode to industrial parallel mode. ESEC/SIGSOFT FSE 2018: 809-814
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint