Bihuan Chen
Bihuan Chen
Associate Professor, Fudan University
在 fudan.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Skyfire: Data-driven seed generation for fuzzing
J Wang, B Chen, L Wei, Y Liu
Proceedings of the 38th IEEE Symposium on Security and Privacy, 579-594, 2017
1912017
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 11th Joint Meeting of the European Software Engineering …, 2017
1822017
Hawkeye: Towards a Desired Directed Grey-box Fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
952018
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop
X Peng, B Chen, Y Yu, W Zhao
Journal of Systems and Software 85 (12), 2707-2719, 2012
87*2012
Superion: Grammar-aware greybox fuzzing
J Wang, B Chen, L Wei, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
852019
Spain: security patch analysis for binaries towards understanding the pain and pills
Z Xu, B Chen, M Chandramohan, Y Liu, F Song
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
642017
Self-adaptation through incremental generative model transformations at runtime
B Chen, X Peng, Y Yu, B Nuseibeh, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
552014
Generating Performance Distributions via Probabilistic Symbolic Execution
B Chen, Y Liu, W Le
Proceedings of the 38th International Conference on Software Engineering, 49-60, 2016
502016
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis
X Xie, B Chen, Y Liu, W Le, X Li
Proceedings of the 24th ACM SIGSOFT International Symposium on the …, 2016
392016
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics
X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
342019
ClDiff: Generating Concise Linked Code Differences
K Huang, B Chen, X Peng, D Zhou, Y Wang, Y Liu, W Zhao
Proceedings of the 33rd IEEE/ACM International Conference on Automated …, 2018
302018
Requirements-driven self-optimization of composite services using feedback control
B Chen, X Peng, Y Yu, W Zhao
IEEE Transactions on Services Computing 8 (1), 107-120, 2015
282015
Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation
W Qian, X Peng, B Chen, J Mylopoulos, H Wang, W Zhao
2014 IEEE 22nd International Requirements Engineering Conference (RE), 113-122, 2014
252014
Are your sites down? Requirements-driven self-tuning for the survivability of Web systems
B Chen, X Peng, Y Yu, W Zhao
Requirements Engineering Conference (RE), 2011 19th IEEE International, 219-228, 2011
232011
Rationalism with a dose of empiricism: combining goal reasoning and case-based reasoning for self-adaptive software systems
W Qian, X Peng, B Chen, J Mylopoulos, H Wang, W Zhao
Requirements Engineering 20 (3), 233-252, 2015
182015
Automatic loop summarization via path dependency analysis
X Xie, B Chen, L Zou, Y Liu, W Le, X Li
IEEE Transactions on Software Engineering 45 (6), 537-557, 2017
172017
Speedoo: prioritizing performance optimization opportunities
Z Chen, B Chen, L Xiao, X Wang, L Chen, Y Liu, B Xu
Proceedings of the 40th International Conference on Software Engineering …, 2018
162018
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures
Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
122020
DeepLink: Recovering issue-commit links based on deep learning
H Ruan, B Chen, X Peng, W Zhao
Journal of Systems and Software 158, 110406, 2019
122019
FOT: A Versatile, Configurable, Extensible Fuzzing Framework
H Chen, Y Li, B Chen, Y Xue, Y Liu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
122018
系统目前无法执行此操作,请稍后再试。
文章 1–20