Locating faults through automated predicate switching X Zhang, N Gupta, R Gupta Proceedings of the 28th international conference on Software engineering …, 2006 | 326 | 2006 |
Trojaning attack on neural networks.(2017) Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang | 299 | 2017 |
Trojaning attack on neural networks Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang | 299 | 2017 |
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. Z Lin, X Jiang, D Xu, X Zhang NDSS 8, 1-15, 2008 | 282 | 2008 |
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. Z Lin, X Jiang, D Xu, X Zhang NDSS 8, 1-15, 2008 | 282 | 2008 |
Precise dynamic slicing algorithms X Zhang, R Gupta, Y Zhang Software Engineering, 2003. Proceedings. 25th International Conference on …, 2003 | 276 | 2003 |
Automatic reverse engineering of data structures from binary execution Z Lin, X Zhang, D Xu Proceedings of the 11th Annual Information Security Symposium, 5, 2010 | 243 | 2010 |
AsDroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction J Huang, X Zhang, L Tan, P Wang, B Liang Proceedings of the 36th International Conference on Software Engineering …, 2014 | 233 | 2014 |
Locating faulty code using failure-inducing chops N Gupta, H He, X Zhang, R Gupta Proceedings of the 20th IEEE/ACM international Conference on Automated …, 2005 | 231 | 2005 |
Z3-str: A z3-based string solver for web application analysis Y Zheng, X Zhang, V Ganesh Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 213 | 2013 |
Pruning dynamic slices with confidence X Zhang, N Gupta, R Gupta ACM SIGPLAN Notices 41 (6), 169-180, 2006 | 195 | 2006 |
Experimental evaluation of using dynamic slices for fault location X Zhang, H He, N Gupta, R Gupta Proceedings of the sixth international symposium on Automated analysis …, 2005 | 172 | 2005 |
Experimental evaluation of using dynamic slices for fault location X Zhang, H He, N Gupta, R Gupta Proceedings of the sixth international symposium on Automated analysis …, 2005 | 172 | 2005 |
Cost effective dynamic program slicing X Zhang, R Gupta ACM SIGPLAN Notices 39 (6), 94-106, 2004 | 158 | 2004 |
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. Z Lin, J Rhee, X Zhang, D Xu, X Jiang NDSS, 2011 | 128 | 2011 |
High Accuracy Attack Provenance via Binary-based Execution Partition. KH Lee, X Zhang, D Xu NDSS, 2013 | 126 | 2013 |
Plagiarizing smartphone applications: attack strategies and defense techniques R Potharaju, A Newell, C Nita-Rotaru, X Zhang Engineering Secure Software and Systems, 106-120, 2012 | 112 | 2012 |
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting S Ma, X Zhang, D Xu | 109 | 2016 |
Spider: Stealthy binary program instrumentation and debugging via hardware virtualization Z Deng, X Zhang, D Xu Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 108 | 2013 |
Towards locating execution omission errors X Zhang, S Tallam, N Gupta, R Gupta ACM Sigplan Notices 42 (6), 415-424, 2007 | 103 | 2007 |