Follow
Zhiwu Xu
Zhiwu Xu
College of Computer Science and Software Engineering (CSSE), Shenzhen University
Verified email at szu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
672020
Set-theoretic foundation of parametric polymorphism and subtyping
G Castagna, Z Xu
Proceedings of the 16th ACM SIGPLAN international conference on Functional …, 2011
512011
Polymorphic functions with set-theoretic types: part 1: syntax, semantics, and evaluation
G Castagna, K Nguyen, Z Xu, H Im, S Lenglet, L Padovani
Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of …, 2014
482014
Polymorphic Functions with Set-Theoretic Types: Part 2: Local Type Inference and Type Reconstruction
G Castagna, K Nguyen, Z Xu, P Abate
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015
392015
CDGDroid: Android malware detection based on deep learning using CFG and DFG
Z Xu, K Ren, S Qin, F Craciun
International Conference on Formal Engineering Methods, 177-193, 2018
362018
Android malware family classification and characterization using CFG and DFG
XU Zhiwu, K Ren, F Song
2019 International Symposium on Theoretical Aspects of Software Engineering …, 2019
282019
A toolkit for generating sentences from context-free grammars
Z Xu, L Zheng, H Chen
International Journal of Software and Informatics 5 (4), 659-676, 2011
252011
A toolkit for generating sentences from context-free grammars
Z Xu, L Zheng, H Chen
Proceedings of the 2010 8th IEEE International Conference on Software …, 2010
252010
Bidirectional stochastic configuration network for regression problems
W Cao, Z Xie, J Li, Z Xu, Z Ming, X Wang
Neural Networks 140, 237-246, 2021
202021
State-taint analysis for detecting resource bugs
Z Xu, C Wen, S Qin
Science of Computer Programming 162, 93-109, 2018
122018
A permission-dependent type system for secure information flow analysis
H Chen, A Tiu, Z Xu, Y Liu
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 218-232, 2018
122018
Learning types for binaries
Z Xu, C Wen, S Qin
International Conference on Formal Engineering Methods, 430-446, 2017
102017
FlashRegex: Deducing Anti-ReDoS Regexes from Examples
Y Li, Z Xu, J Cao, H Chen, T Ge, SC Cheung, H Zhao
2020 35th IEEE/ACM International Conference on Automated Software …, 2020
82020
How do api selections affect the runtime performance of data analytics tasks?
Y Tao, S Tang, Y Liu, Z Xu, S Qin
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
72019
Effective malware detection based on behaviour and data features
Z Xu, C Wen, S Qin, Z Ming
International Conference on Smart Computing and Communication, 53-66, 2017
72017
A self-supervised framework for clustering ensemble
L Du, YD Shen, Z Shen, J Wang, Z Xu
International Conference on Web-Age Information Management, 253-264, 2013
72013
Research Progress of Zero-Shot Learning Beyond Computer Vision
W Cao, C Zhou, Y Wu, Z Ming, Z Xu, J Zhang
International Conference on Algorithms and Architectures for Parallel …, 2020
62020
TRANSREGEX: Multi-modal Regular Expression Synthesis by Generate-and-Repair
Y Li, S Li, Z Xu, J Cao, Z Chen, Y Hu, H Chen, SC Cheung
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
52021
Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey
J Ding, Z Xu
International Conference on Algorithms and Architectures for Parallel …, 2020
52020
Towards ‘Verifying’a Water Treatment System
J Wang, J Sun, Y Jia, S Qin, Z Xu
International Symposium on Formal Methods, 73-92, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20