


default search action
Xu Zhou 0004
Person information
- affiliation: National University of Defense Technology, College of Computer, Changsha, China
Other persons with the same name
- Xu Zhou — disambiguation page
- Xu Zhou 0001
— Hunan University, College of Computer Science and Electronic Engineering, Changsha, China (and 1 more)
- Xu Zhou 0002
— Hohai University, College of Artificial Intelligence and Automation, Changzhou, China
- Xu Zhou 0003
— Jilin University, Center for Computer Fundamental Education, Changchun, China
- Xu Zhou 0005
— Shenzhen University, School of Biomedical Engineering, Shenzhen, China (and 2 more)
- Xu Zhou 0006
— University of Wollongong, School of Computing and Information Technology, Wollongong, NSW, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Danjun Liu
, Xuan Meng
, Pengfei Wang, Xu Zhou
, Wei Xie
, Baosheng Wang:
Constructing arbitrary write via puppet objects and delivering gadgets in Linux kernel. Comput. Secur. 150: 104189 (2025) - [j28]Tai Yue
, Kai Lu
, Zhenyu Ning
, Pengfei Wang
, Lei Zhou
, Xu Zhou
, Yaohua Wang, Fengwei Zhang
, Gen Zhang
:
Efficient Forward-Edge Control-Flow Integrity for COTS Binaries via Arm BTI. IEEE Trans. Inf. Forensics Secur. 20: 7137-7152 (2025) - [i6]Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Kai Lu:
DeepGo: Predictive Directed Greybox Fuzzing. CoRR abs/2507.21952 (2025) - 2024
- [j27]Peihong Lin, Pengfei Wang
, Xu Zhou, Wei Xie
, Kai Lu, Gen Zhang
:
HyperGo: Probability-based directed hybrid fuzzing. Comput. Secur. 142: 103851 (2024) - [j26]Xugang Wu
, Huijun Wu, Ruibo Wang
, Xu Zhou, Kai Lu
:
Towards adaptive graph neural networks via solving prior-data conflicts. Frontiers Inf. Technol. Electron. Eng. 25(3): 369-383 (2024) - [j25]Pengfei Wang
, Xu Zhou, Tai Yue, Peihong Lin, Yingying Liu, Kai Lu:
The progress, challenges, and perspectives of directed greybox fuzzing. Softw. Test. Verification Reliab. 34(2) (2024) - [j24]Tai Yue
, Fengwei Zhang
, Zhenyu Ning
, Pengfei Wang
, Xu Zhou
, Kai Lu, Lei Zhou
:
Armor: Protecting Software Against Hardware Tracing Techniques. IEEE Trans. Inf. Forensics Secur. 19: 4247-4262 (2024) - [c16]Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Kai Lu:
DeepGo: Predictive Directed Greybox Fuzzing. NDSS 2024 - [c15]Tai Yue
, Yibo Jin
, Fengwei Zhang
, Zhenyu Ning
, Pengfei Wang
, Xu Zhou
, Kai Lu
:
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing. RAID 2024: 450-464 - [i5]Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang
, Xu Zhou, Kai Lu:
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing. CoRR abs/2401.15956 (2024) - 2023
- [j23]Zhenhao Luo, Pengfei Wang, Wei Xie
, Xu Zhou
, Baosheng Wang:
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations. Sensors 23(18): 7789 (2023) - [j22]Xu Zhou
, Pengfei Wang, Lei Zhou, Peng Xun
, Kai Lu:
A Survey of the Security Analysis of Embedded Devices. Sensors 23(22): 9221 (2023) - [j21]Danjun Liu
, Pengfei Wang
, Xu Zhou
, Wei Xie
, Gen Zhang, Zhenhao Luo
, Tai Yue
, Baosheng Wang:
From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel. IEEE Trans. Inf. Forensics Secur. 18: 533-548 (2023) - [j20]Xu Zhou
, Pengfei Wang
, Chenyifan Liu, Tai Yue
, Yingying Liu, Congxi Song
, Kai Lu, Qidi Yin, Xu Han:
UltraFuzz: Towards Resource-Saving in Distributed Fuzzing. IEEE Trans. Software Eng. 49(4): 2394-2412 (2023) - [c14]Tai Yue
, Pengfei Wang
, Lei Zhou
, Xu Zhou
, Gen Zhang
, Kai Lu
, Huijun Wu
:
ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting. CNCIT 2023: 235-240 - [c13]Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie
, Xu Zhou, Danjun Liu, Kai Lu:
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. NDSS 2023 - [c12]Xugang Wu, Huijun Wu, Ruibo Wang, Duanyu Li, Xu Zhou, Kai Lu:
Leveraging Free Labels to Power up Heterophilic Graph Learning in Weakly-Supervised Settings: An Empirical Study. ECML/PKDD (3) 2023: 140-156 - [i4]Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang:
HyperGo: Probability-based Directed Hybrid Fuzzing. CoRR abs/2307.07815 (2023) - 2022
- [j19]Gen Zhang, Peng-Fei Wang, Tai Yue, Xiangdong Kong, Xu Zhou, Kai Lu:
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference. J. Comput. Sci. Technol. 37(2): 405-422 (2022) - [j18]Xugang Wu, Huijun Wu, Xu Zhou, Xiang Zhao, Kai Lu:
Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training. J. Comput. Sci. Technol. 37(5): 1161-1175 (2022) - [c11]Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, Kai Lu:
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing. NDSS 2022 - 2021
- [j17]Gen Zhang, Peng-Fei Wang, Tai Yue, Xu Zhou, Kai Lu:
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels. J. Comput. Sci. Technol. 36(6): 1248-1268 (2021) - [i3]Xugang Wu, Huijun Wu, Xu Zhou, Kai Lu:
CoG: a Two-View Co-training Framework for Defending Adversarial Attacks on Graph. CoRR abs/2109.05558 (2021) - 2020
- [j16]Pengfei Wang, Xu Zhou, Kai Lu:
Sabotaging the system boundary: A study of the inter-boundary vulnerability. J. Inf. Secur. Appl. 54: 102496 (2020) - [c10]Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, Xu Zhou:
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. USENIX Security Symposium 2020: 2307-2324 - [i2]Pengfei Wang, Xu Zhou:
SoK: The Progress, Challenges, and Perspectives of Directed Greybox Fuzzing. CoRR abs/2005.11907 (2020) - [i1]Xu Zhou, Pengfei Wang, Chenyifan Liu, Tai Yue, Yingying Liu, Congxi Song, Kai Lu, Qidi Yin:
UniFuzz: Optimizing Distributed Fuzzing via Dynamic Centralized Task Scheduling. CoRR abs/2009.06124 (2020)
2010 – 2019
- 2019
- [j15]Pengfei Wang
, Jens Krinke, Xu Zhou, Kai Lu:
AVPredictor: Comprehensive prediction and detection of atomicity violations. Concurr. Comput. Pract. Exp. 31(15) (2019) - [j14]Pengfei Wang, Kai Lu, Gen Li, Xu Zhou:
DFTracker: detecting double-fetch bugs by multi-taint parallel tracking. Frontiers Comput. Sci. 13(2): 247-263 (2019) - 2018
- [j13]Pengfei Wang
, Kai Lu, Gen Li, Xu Zhou:
A survey of the double-fetch vulnerabilities. Concurr. Comput. Pract. Exp. 30(6) (2018) - [j12]Kai Lu, Peng-Fei Wang, Gen Li, Xu Zhou:
Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory. J. Comput. Sci. Technol. 33(3): 587-602 (2018) - [c9]Yingqi Luo, Pengfei Wang, Xu Zhou, Kai Lu:
DFTinker: Detecting and Fixing Double-Fetch Bugs in an Automated Way. WASA 2018: 780-785 - 2017
- [j11]Guoliang Zhu
, Kai Lu, Xiaoping Wang, Xu Zhou, Zhan Shi:
Building Emulation Framework for Non-Volatile Memory. IEEE Access 5: 21574-21584 (2017) - [j10]Wenzhe Zhang, Kai Lu, Mikel Luján, Xiaoping Wang, Xu Zhou:
Fine-grained checkpoint based on non-volatile memory. Frontiers Inf. Technol. Electron. Eng. 18(2): 220-234 (2017) - 2015
- [j9]Chen Chen, Kai Lu, Xiaoping Wang, Xu Zhou, Zhendong Wu:
A Load-Balanced Deterministic Runtime for Pipeline Parallelism. IEICE Trans. Inf. Syst. 98-D(2): 433-436 (2015) - [j8]Zhendong Wu, Kai Lu, Xiaoping Wang, Xu Zhou:
Collaborative Technique for Concurrency Bug Detection. Int. J. Parallel Program. 43(2): 260-285 (2015) - [j7]Kai Lu, Xu Zhou, Xiaoping Wang, Tom Bergan, Chen Chen:
An Efficient and Flexible Deterministic Framework for Multithreaded Programs. J. Comput. Sci. Technol. 30(1): 42-56 (2015) - [j6]Wenzhe Zhang, Kai Lu, Mikel Luján, Xiaoping Wang, Xu Zhou:
Write-Combined Logging: An Optimized Logging for Consistency in NVRAM. Sci. Program. 2015: 398369:1-398369:13 (2015) - [j5]Zhendong Wu, Kai Lu, Xiaoping Wang, Xu Zhou, Chen Chen:
Detecting harmful data races through parallel verification. J. Supercomput. 71(8): 2922-2943 (2015) - [c8]Kai Lu, Zhendong Wu, Xiaoping Wang, Chen Chen, Xu Zhou:
RaceChecker: Efficient Identification of Harmful Data Races. PDP 2015: 78-85 - 2014
- [j4]Chen Chen, Kai Lu, Xiaoping Wang, Xu Zhou, Zhendong Wu:
DRDet: Efficiently Making Data Races Deterministic. IEICE Trans. Inf. Syst. 97-D(10): 2676-2684 (2014) - [c7]Xu Zhou, Gen Li, Kai Lu, Shuangxi Wang:
Enhancing the Security of Parallel Programs via Reducing Scheduling Space. DASC 2014: 133-138 - [c6]Kai Lu, Xu Zhou, Tom Bergan, Xiaoping Wang:
Efficient deterministic multithreading without global barriers. PPoPP 2014: 287-300 - 2013
- [j3]Xu Li, Kai Lu, Xiaoping Wang, Bin Dai
, Xu Zhou:
Understanding the Impact of BPRAM on Incremental Checkpoint. IEICE Trans. Inf. Syst. 96-D(3): 663-672 (2013) - [j2]Xu Zhou, Kai Lu, Xiaoping Wang, Wenzhe Zhang, Kai Zhang, Xu Li, Gen Li:
Deterministic Message Passing for Distributed Parallel Computing. IEICE Trans. Inf. Syst. 96-D(5): 1068-1077 (2013) - [c5]Chen Chen, Kai Lu, Xiaoping Wang, Xu Zhou, Li Fang:
Pruning False Positives of Static Data-Race Detection via Thread Specialization. APPT 2013: 77-90 - [c4]Kai Lu, Xu Zhou, Xiaoping Wang, Wenzhe Zhang, Gen Li:
RaceFree: an efficient multi-threading model for determinism. PPoPP 2013: 297-298 - [c3]Zhendong Wu, Kai Lu, Xiaoping Wang, Xu Zhou:
ColFinder Collaborative Concurrency Bug Detection. QSIC 2013: 208-211 - 2012
- [j1]Xu Zhou, Kai Lu, Xiaoping Wang, Xu Li:
Exploiting parallelism in deterministic shared memory multiprocessing. J. Parallel Distributed Comput. 72(5): 716-727 (2012) - [c2]Xu Li, Kai Lu, Xiaoping Wang, Xu Zhou:
NV-process: a fault-tolerance process model based on non-volatile memory. APSys 2012: 1 - [c1]Xu Zhou, Kai Lu, Xicheng Lu, Xiaoping Wang, Baohua Fan:
dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing. NPC 2012: 172-179
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-16 03:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint