Trojaning attack on neural networks Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang | 1489 | 2018 |
MCI: Modeling-based causality inference in audit logging for attack investigation Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ... Network and Distributed Systems Security (NDSS) Symposium, 2018 | 143 | 2018 |
Understanding the performance of webassembly applications Y Yan, T Tu, L Zhao, Y Zhou, W Wang Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021 | 79 | 2021 |
An empirical analysis of UI-based flaky tests A Romano, Z Song, S Grandhi, W Yang, W Wang 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 58 | 2021 |
Empowering Web Applications with WebAssembly: Are We There Yet? W Wang 36th ACM/IEEE International Conference on Automated Software Engineering …, 2021 | 41 | 2021 |
An Empirical Study of Bugs in WebAssembly Compilers A Romano, X Liu, Y Kwon, W Wang 36th ACM/IEEE International Conference on Automated Software Engineering, 2021 | 40 | 2021 |
Webranz: web page randomization for better advertisement delivery and web-bot prevention W Wang, Y Zheng, X Xing, Y Kwon, X Zhang, P Eugster Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 40 | 2016 |
Minerray: Semantics-aware analysis for ever-evolving cryptojacking detection A Romano, Y Zheng, W Wang Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 39 | 2020 |
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly A Romano, D Lehmann, M Pradel, W Wang 43rd IEEE Symposium on Security and Privacy, 2022 | 34 | 2022 |
Exploring the wild birds’ migration data for the disease spread study of H5N1: a clustering and association approach M Tang, Y Zhou, J Li, W Wang, P Cui, Y Hou, Z Luo, J Li, F Lei, B Yan Knowledge and Information Systems 27, 227-251, 2011 | 27 | 2011 |
ARROW: Automated repair of races on client-side web pages W Wang, Y Zheng, P Liu, L Xu, X Zhang, P Eugster Proceedings of the 25th International Symposium on Software Testing and …, 2016 | 21 | 2016 |
Wasim: Understanding webassembly applications through classification A Romano, W Wang Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 18 | 2020 |
Adbudgetkiller: Online advertising budget draining attack IL Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang Proceedings of the 2018 World Wide Web Conference, 297-307, 2018 | 16 | 2018 |
WasmView: visual testing for WebAssembly applications A Romano, W Wang 2020 IEEE/ACM 42nd International Conference on Software Engineering …, 2020 | 12 | 2020 |
Finding client-side business flow tampering vulnerabilities IL Kim, Y Zheng, H Park, W Wang, W You, Y Aafer, X Zhang Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 12 | 2020 |
Cpr: cross platform binary code reuse via platform independent trace program Y Kwon, W Wang, Y Zheng, X Zhang, D Xu Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017 | 11 | 2017 |
Effect of different light intensities on the floral aroma emitted from Chinese Daffodil (Narcissus tazetta L. var. chinensis Roem) YJ Dou, J Zhai, FM Hou, PS Leng, WH Wang, ZH Hu Acta Agriculturae Boreali-Occidentalis Sinica 23 (4), 85-91, 2014 | 10 | 2014 |
Automated webassembly function purpose identification with semantics-aware analysis A Romano, W Wang Proceedings of the ACM Web Conference 2023, 2885-2894, 2023 | 9 | 2023 |
C2sr: Cybercrime scene reconstruction for post-mortem forensic analysis Y Kwon, W Wang, J Jung, KH Lee, R Perdisci Network and Distributed Systems Security (NDSS) Symposium 2021, 2021 | 9 | 2021 |
Bird flu outbreak prediction via satellite tracking Y Zhou, M Tang, W Pan, J Li, W Wang, J Shao, L Wu, J Li, Q Yang, B Yan IEEE Intelligent Systems 29 (4), 10-17, 2013 | 9 | 2013 |