Follow
Bihuan Chen
Bihuan Chen
Associate Professor, Fudan University
Verified email at fudan.edu.cn - Homepage
Title
Cited by
Cited by
Year
Skyfire: Data-driven seed generation for fuzzing
J Wang, B Chen, L Wei, Y Liu
Proceedings of the 38th IEEE Symposium on Security and Privacy, 579-594, 2017
3712017
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 11th Joint Meeting of the European Software Engineering …, 2017
3392017
Hawkeye: Towards a Desired Directed Grey-box Fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2722018
Superion: Grammar-aware greybox fuzzing
J Wang, B Chen, L Wei, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
257*2019
Spain: security patch analysis for binaries towards understanding the pain and pills
Z Xu, B Chen, M Chandramohan, Y Liu, F Song
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1512017
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics
X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
1062019
Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop
X Peng, B Chen, Y Yu, W Zhao
Journal of Systems and Software 85 (12), 2707-2719, 2012
101*2012
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects
Y Wang, B Chen, K Huang, B Shi, C Xu, X Peng, Y Wu, Y Liu
2020 IEEE International Conference on Software Maintenance and Evolution …, 2020
832020
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures
Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ...
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
822020
Generating Performance Distributions via Probabilistic Symbolic Execution
B Chen, Y Liu, W Le
Proceedings of the 38th International Conference on Software Engineering, 49-60, 2016
752016
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis
X Xie, B Chen, Y Liu, W Le, X Li
Proceedings of the 24th ACM SIGSOFT International Symposium on the …, 2016
722016
Self-adaptation through incremental generative model transformations at runtime
B Chen, X Peng, Y Yu, B Nuseibeh, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
702014
ClDiff: Generating Concise Linked Code Differences
K Huang, B Chen, X Peng, D Zhou, Y Wang, Y Liu, W Zhao
Proceedings of the 33rd IEEE/ACM International Conference on Automated …, 2018
572018
Patch based vulnerability matching for binary programs
Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
552020
Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem
C Liu, S Chen, L Fan, B Chen, Y Liu, X Peng
Proceedings of the 44th International Conference on Software Engineering …, 2022
522022
DeepLink: Recovering issue-commit links based on deep learning
H Ruan, B Chen, X Peng, W Zhao
Journal of Systems and Software 158, 110406, 2019
382019
A Large-Scale Empirical Study of Compiler Errors in Continuous Integration
C Zhang, B Chen, L Chen, X Peng, W Zhao
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
352019
Automatic loop summarization via path dependency analysis
X Xie, B Chen, L Zou, Y Liu, W Le, X Li
IEEE Transactions on Software Engineering 45 (6), 537-557, 2017
342017
Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation
W Qian, X Peng, B Chen, J Mylopoulos, H Wang, W Zhao
2014 IEEE 22nd International Requirements Engineering Conference (RE), 113-122, 2014
312014
Requirements-driven self-optimization of composite services using feedback control
B Chen, X Peng, Y Yu, W Zhao
IEEE Transactions on Services Computing 8 (1), 107-120, 2015
302015
The system can't perform the operation now. Try again later.
Articles 1–20