Large language models for software engineering: A systematic literature review X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li, X Luo, D Lo, J Grundy, ... ACM Transactions on Software Engineering and Methodology, 2023 | 402 | 2023 |
Libradar: Fast and accurate detection of third-party libraries in android apps Z Ma, H Wang, Y Guo, X Chen Proceedings of the 38th international conference on software engineering …, 2016 | 304 | 2016 |
Masterkey: Automated jailbreaking of large language model chatbots G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu Proc. ISOC NDSS, 2024 | 278* | 2024 |
Wukong: A scalable and accurate two-phase approach to android app clone detection H Wang, Y Guo, Z Ma, X Chen Proceedings of the 2015 international symposium on software testing and …, 2015 | 260 | 2015 |
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network X Cheng, H Wang, J Hua, G Xu, Y Sui ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-33, 2021 | 250 | 2021 |
Prompt Injection attack against LLM-integrated Applications Y Liu, G Deng, Y Li, K Wang, Z Wang, X Wang, T Zhang, Y Liu, H Wang, ... arXiv preprint arXiv:2306.05499, 2023 | 239 | 2023 |
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ... Proceedings of the 2018 Internet Measurement Conference (IMC), 2018 | 167 | 2018 |
Cid: Automating the detection of api-related compatibility issues in android apps L Li, TF Bissyandé, H Wang, J Klein Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018 | 160 | 2018 |
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, YC Hu The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019 | 147 | 2019 |
Towards a first step to understand flash loan and its applications in defi ecosystem D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021 | 137* | 2021 |
Characterizing cryptocurrency exchange scams P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu Computers & Security 98, 101993, 2020 | 125 | 2020 |
A comprehensive study on challenges in deploying deep learning based software Z Chen, Y Cao, Y Liu, H Wang, T Xie, X Liu Proceedings of the 28th ACM joint meeting on European software engineering …, 2020 | 123 | 2020 |
Flow2vec: Value-flow-based precise code embedding Y Sui, X Cheng, G Zhang, H Wang Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-27, 2020 | 107 | 2020 |
FraudDroid: Automated Ad Fraud Detection for Android Apps F Dong, H Wang, L Li, Y Guo, TF Bissyande, T Liu, G Xu, J Klein ESEC/FSE 2018, 2018 | 106 | 2018 |
{EOSAFE}: security analysis of {EOSIO} smart contracts N He, R Zhang, H Wang, L Wu, X Luo, Y Guo, T Yu, X Jiang 30th USENIX security symposium (USENIX Security 21), 1271-1288, 2021 | 104* | 2021 |
Understanding (Mis) Behavior on the EOSIO Blockchain Y HUANG, H WANG, LEI WU, G TYSON, X LUO, RUN ZHANG, X LIU, ... ACM SIGMETRICS 2020, 2020 | 102* | 2020 |
Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange P Xia, H Wang, B Gao, W Su, Z Yu, X Luo, C Zhang, X Xiao, G Xu Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (3 …, 2021 | 98* | 2021 |
Make web3. 0 connected Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021 | 98 | 2021 |
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem N He, L Wu, H Wang, Y Guo, X Jiang The 24th International Conference on Financial Cryptography and Data …, 2020 | 94 | 2020 |
Path-sensitive code embedding via contrastive learning for software vulnerability detection X Cheng, G Zhang, H Wang, Y Sui Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 88 | 2022 |