


default search action
Cen Zhang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j2]Xiaohan Zhang, Cen Zhang
, Xinghua Li
, Zhengjie Du
, Bing Mao
, Yuekang Li
, Yaowen Zheng
, Yeting Li
, Li Pan
, Yang Liu
, Robert H. Deng
:
A Survey of Protocol Fuzzing. ACM Comput. Surv. 57(2): 35:1-35:36 (2025) - [i13]Jiageng Li, Zhen Dong, Chong Wang, Haozhen You, Cen Zhang, Yang Liu, Xin Peng:
LLM Based Input Space Partitioning Testing for Library APIs. CoRR abs/2501.05456 (2025) - [i12]Ziqiao Kong, Cen Zhang, Maoyi Xie, Ming Hu, Yue Xue, Ye Liu, Haijun Wang, Yang Liu:
Smart Contract Fuzzing Towards Profitable Vulnerabilities. CoRR abs/2501.08834 (2025) - 2024
- [j1]Junmei Jia
, Hongyan Fan, Cen Zhang:
Parametric and nonparametric estimation stress strength model based on copula function under first-failure progressively unified hybrid censoring schemes. Int. J. Syst. Assur. Eng. Manag. 15(12): 5700-5712 (2024) - [c21]Yiming Liu
, Cen Zhang
, Feng Li
, Yeting Li
, Jianhua Zhou
, Jian Wang
, Lanlan Zhan
, Yang Liu
, Wei Huo
:
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware. ICSE 2024: 173:1-173:12 - [c20]Yifei Sun, Lingxiao Huang, Junrui Wang, Meng Liu, Suchuang Di, Simin Yang, Hang Zhang, Cen Zhang, Ronglin Tang:
Direct Estimation of Ecosystem Water Use Efficiency Using the Random Forest Machine Learning Model. IGARSS 2024: 10550-10553 - [c19]Maoyi Xie
, Ming Hu
, Ziqiao Kong
, Cen Zhang
, Yebo Feng
, Haijun Wang
, Yue Xue
, Hao Zhang
, Ye Liu
, Yang Liu
:
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications. ISSTA 2024: 402-414 - [c18]Cen Zhang
, Yaowen Zheng
, Mingqiang Bai
, Yeting Li
, Wei Ma
, Xiaofei Xie
, Yuekang Li
, Limin Sun
, Yang Liu
:
How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation. ISSTA 2024: 1223-1235 - [c17]Jiongchi Yu
, Xiaofei Xie
, Cen Zhang
, Sen Chen
, Yuekang Li
, Wenbo Shen
:
Bugs in Pods: Understanding Bugs in Container Runtime Systems. ISSTA 2024: 1364-1376 - [c16]Baijun Cheng, Cen Zhang
, Kailong Wang
, Ling Shi
, Yang Liu
, Haoyu Wang, Yao Guo, Ding Li, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. ASE 2024: 430-442 - [c15]Zhengjie Du
, Yuekang Li
, Yaowen Zheng
, Xiaohan Zhang, Cen Zhang
, Yi Liu
, Sheikh Mahbub Habib
, Xinghua Li
, Linzhang Wang
, Yang Liu
, Bing Mao
:
Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations. WWW 2024: 1668-1679 - [i11]Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Yuekang Li, Yaowen Zheng, Yeting Li, Bing Mao, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. CoRR abs/2401.01568 (2024) - [i10]Han Liu, Jian Zhang, Cen Zhang, Xiaohan Zhang, Kaixuan Li, Sen Chen, Shang-Wei Lin, Yixiang Chen, Xinhua Li, Yang Liu:
FineWAVE: Fine-Grained Warning Verification of Bugs for Automated Static Analysis Tools. CoRR abs/2403.16032 (2024) - [i9]Jian Zhang, Chong Wang, Anran Li, Weisong Sun, Cen Zhang, Wei Ma, Yang Liu:
An Empirical Study of Automated Vulnerability Localization with Large Language Models. CoRR abs/2404.00287 (2024) - [i8]Shuowen Liang, Sisi Li, Qingyun Wang, Cen Zhang, Kaiquan Zhu, Tian Yang:
GUNet: A Graph Convolutional Network United Diffusion Model for Stable and Diversity Pose Generation. CoRR abs/2409.11689 (2024) - 2023
- [b1]Cen Zhang:
Effective fuzz testing via model-guided program synthesis. Nanyang Technological University, Singapore, 2023 - [c14]Yi Liu, Yuekang Li
, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu
:
ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers. ASE 2023: 510-521 - [c13]Yao Zhang, Xiaofei Xie
, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. ASE 2023: 686-697 - [c12]Xinyi Wang
, Cen Zhang, Yeting Li, Zhiwu Xu, Shuailin Huang, Yi Liu, Yican Yao, Yang Xiao, Yanyan Zou, Yang Liu
, Wei Huo:
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation. SP 2023: 2427-2443 - [c11]Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan Zhang, Yaowen Zheng, Xian Zhan, Xiaofei Xie, Xiapu Luo, Xinghua Li, Yang Liu, Sheikh Mahbub Habib:
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation. USENIX Security Symposium 2023: 2867-2884 - [i7]Wei Ma, Shangqing Liu, Wenhan Wang, Qiang Hu, Ye Liu, Cen Zhang, Liming Nie, Yang Liu
:
The Scope of ChatGPT in Software Engineering: A Thorough Investigation. CoRR abs/2305.12138 (2023) - [i6]Cen Zhang, Mingqiang Bai, Yaowen Zheng, Yeting Li, Xiaofei Xie
, Yuekang Li
, Wei Ma, Limin Sun, Yang Liu:
Understanding Large Language Model Based Fuzz Driver Generation. CoRR abs/2307.12469 (2023) - [i5]Yi Liu, Yuekang Li
, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma, Yang Liu:
ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers. CoRR abs/2308.15742 (2023) - [i4]Yao Zhang, Xiaofei Xie
, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. CoRR abs/2312.03335 (2023) - [i3]Xiaoyu Zhang, Cen Zhang, Tianlin Li, Yihao Huang, Xiaojun Jia, Xiaofei Xie, Yang Liu, Chao Shen:
A Mutation-Based Method for Multi-Modal Jailbreaking Attack Detection. CoRR abs/2312.10766 (2023) - 2022
- [c10]Yaowen Zheng, Yuekang Li
, Cen Zhang, Hongsong Zhu, Yang Liu
, Limin Sun:
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation. ISSTA 2022: 417-428 - 2021
- [c9]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu
, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CCS 2021: 734-748 - [c8]Yuekang Li
, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie
, Haijun Wang, Yang Liu
:
Vall-nut: Principled Anti-Grey box - Fuzzing. ISSRE 2021: 288-299 - [c7]Qiang Liu
, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu
, Kui Ren:
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution. ASE 2021: 792-804 - [c6]Cen Zhang, Yuekang Li
, Hongxu Chen, Xiaoxing Luo, Miaohua Li, Anh Quynh Nguyen, Yang Liu
:
BIFF: Practical Binary Fuzzing Framework for Programs of IoT and Mobile Devices. ASE 2021: 1161-1165 - [c5]Cen Zhang, Xingwei Lin, Yuekang Li, Yinxing Xue, Jundong Xie, Hongxu Chen, Xinlei Ying, Jiashui Wang, Yang Liu:
APICraft: Fuzz Driver Generation for Closed-source SDK Libraries. USENIX Security Symposium 2021: 2811-2828 - [i2]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CoRR abs/2105.14295 (2021) - 2020
- [c4]Yuekang Li
, Hongxu Chen, Cen Zhang, Siyang Xiong, Chaoyi Liu, Yi Wang
:
Ori: A Greybox Fuzzer for SOME/IP Protocols in Automotive Ethernet. APSEC 2020: 495-499 - [c3]Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. USENIX Security Symposium 2020: 2325-2342 - [i1]Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. CoRR abs/2007.15943 (2020)
2010 – 2019
- 2019
- [c2]Yuekang Li
, Yinxing Xue, Hongxu Chen, Xiuheng Wu, Cen Zhang, Xiaofei Xie
, Haijun Wang, Yang Liu
:
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection. ESEC/SIGSOFT FSE 2019: 533-544 - 2017
- [c1]Fan Jiang, Cen Zhang, Shaoyin Cheng:
FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability. ACISP (2) 2017: 61-79
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-11 20:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint