


default search action
Jiashui Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j6]Yangxi Xiang
, Feng Wang, Yuan Chen
, Qiang Liu
, Haoyu Wang
, Jiashui Wang, Lei Wu
, Chaoyuan Chen, Yajin Zhou
:
Minoris: Practical Out-of-Emulator Kernel Module Fuzzing. IEEE Trans. Dependable Secur. Comput. 23(1): 1360-1372 (2026)
[i10]Zhijie Zhong, Yuhong Nan, Mingxi Ye, Qing Xue, Jiashui Wang, Xinlei Ying, Long Liu, Zibin Zheng:
Is My RPC Response Reliable? Detecting RPC Bugs in Ethereum Blockchain Client under Context. CoRR abs/2601.21593 (2026)- 2025
[j5]Jiaqi Li
, Ke Wang, Yaoguang Chen, Yajin Zhou, Lei Wu
, Jiashui Wang:
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution. Comput. Secur. 157: 104564 (2025)
[j4]Peng Qian
, Xinlei Ying
, Jiashui Wang
, Long Liu
, Lun Zhang
, Jianhai Chen
, Qinming He
:
FreeWavm: Enhanced WebAssembly Runtime Fuzzing Guided by Parse Tree Mutation and Snapshot. Proc. ACM Softw. Eng. 2(ISSTA): 159-181 (2025)
[j3]Xiangxiang Chen
, Xingwei Lin
, Jingyi Wang
, Jun Sun
, Jiashui Wang
, Wenhai Wang
:
Scuzer: A Scheduling Optimization Fuzzer for TVM. ACM Trans. Softw. Eng. Methodol. 34(4): 102:1-102:28 (2025)
[j2]Zhijie Zhong
, Jiachi Chen
, Jiashui Wang
, Qing Xue
, Jiajing Wu
, Long Liu
, Xinlei Ying
, Zibin Zheng
:
Towards Exploring Developers' Struggles in Developing Upgradeable Smart Contracts. IEEE Trans. Software Eng. 51(11): 3072-3087 (2025)
[c12]Xiangmin Shen
, Lingzhi Wang
, Zhenyuan Li
, Yan Chen
, Wencheng Zhao
, Dawei Sun
, Jiashui Wang
, Wei Ruan
:
PentestAgent: Incorporating LLM Agents to Automated Penetration Testing. AsiaCCS 2025: 375-391
[c11]Xinyi Wang, Jiashui Wang, Jinbo Su, Ke Wang, Peng Chen, Yanming Liu, Long Liu, Xiang Li, Yangdong Wang, Qiyuan Chen, Rongze Chen, Chunfu Jia:
ASMA-Tune: Unlocking LLMs' Assembly Code Comprehension via Structural-Semantic Instruction Tuning. ECAI 2025: 3968-3975
[c10]Haonan Zhang, Dongxia Wang, Yi Liu, Kexin Chen, Jiashui Wang, Xinlei Ying, Long Liu, Wenhai Wang:
ORFuzz: Fuzzing the "Other Side" of LLM Safety - Testing Over-Refusal. ASE 2025: 1869-1880
[i9]Xinyi Wang, Jiashui Wang, Peng Chen, Jinbo Su, Yanming Liu, Long Liu, Yangdong Wang, Qiyuan Chen, Kai Yun, Chunfu Jia:
ASMA-Tune: Unlocking LLMs' Assembly Code Comprehension via Structural-Semantic Instruction Tuning. CoRR abs/2503.11617 (2025)
[i8]Hao Song, Yiming Shen, Wenxuan Luo, Leixin Guo, Ting Chen, Jiashui Wang, Beibei Li, Xiaosong Zhang, Jiachi Chen:
Beyond the Protocol: Unveiling Attack Vectors in the Model Context Protocol Ecosystem. CoRR abs/2506.02040 (2025)
[i7]Jiachi Chen, Yiming Shen, Jiashuo Zhang, Zihao Li, John Grundy, Zhenzhe Shao, Yanlin Wang, Jiashui Wang, Ting Chen, Zibin Zheng:
FORGE: An LLM-driven Framework for Large-Scale Smart Contract Vulnerability Dataset Construction. CoRR abs/2506.18795 (2025)
[i6]Haonan Zhang, Dongxia Wang, Yi Liu, Kexin Chen, Jiashui Wang, Xinlei Ying, Long Liu, Wenhai Wang:
ORFuzz: Fuzzing the "Other Side" of LLM Safety - Testing Over-Refusal. CoRR abs/2508.11222 (2025)
[i5]Xiangmin Shen, Wenyuan Cheng, Yan Chen, Zhenyuan Li, Yuqiao Gu, Lingzhi Wang, Wencheng Zhao, Dawei Sun, Jiashui Wang:
AEAS: Actionable Exploit Assessment System. CoRR abs/2509.17832 (2025)- 2024
[c9]Jiashui Wang, Jiahui Wang, Jundong Xie, Zhenyuan Li, Yan Chen, Peng Qian:
Exploring Depths of WebAudio: Advancing Greybox Fuzzing for Vulnerability Detection in Safari. APSEC 2024: 181-190
[c8]Jiashui Wang, Ziyi Guo, Xinlei Ying, Peng Qian, Yan Chen:
S$w$Fuzz: Structure-Sensitive WebAssembly Fuzzing. APSEC 2024: 343-352
[c7]Jiashui Wang
, Peng Qian
, Xilin Huang
, Xinlei Ying
, Yan Chen
, Shouling Ji
, Jianhai Chen
, Jundong Xie
, Long Liu
:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. ISSTA 2024: 1174-1185
[c6]Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue:
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection. USENIX Security Symposium 2024
[i4]Xiangmin Shen, Lingzhi Wang, Zhenyuan Li, Yan Chen, Wencheng Zhao, Dawei Sun, Jiashui Wang, Wei Ruan:
PentestAgent: Incorporating LLM Agents to Automated Penetration Testing. CoRR abs/2411.05185 (2024)- 2023
[j1]Guangke Chen
, Zhe Zhao
, Fu Song
, Sen Chen
, Lingling Fan
, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. IEEE Trans. Dependable Secur. Comput. 20(5): 3970-3987 (2023)
[c5]Wenya Wang
, Xingwei Lin
, Jingyi Wang
, Wang Gao
, Dawu Gu
, Wei Lv
, Jiashui Wang
:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CCS 2023: 2800-2814
[c4]Jie Liang, Yaoguang Chen, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Yu Jiang, Xiangdong Huang, Ting Chen, Jiashui Wang, Jiajia Li:
Sequence-Oriented DBMS Fuzzing. ICDE 2023: 668-681
[c3]Jianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen
, Zibin Zheng, Wei Lv, Jiashui Wang:
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities. ASE 2023: 1664-1675
[i3]Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CoRR abs/2306.13984 (2023)
[i2]Jiaqi Li, Ke Wang, Yaoguang Chen, Yajin Zhou, Lei Wu, Jiashui Wang:
Detecting DBMS Bugs with Context-Sensitive Instantiation and Multi-Plan Execution. CoRR abs/2312.04941 (2023)- 2022
[i1]Guangke Chen
, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. CoRR abs/2206.03393 (2022)- 2021
[c2]Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, Yanjun Wu:
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing. CCS 2021: 2197-2213
[c1]Cen Zhang, Xingwei Lin, Yuekang Li, Yinxing Xue, Jundong Xie, Hongxu Chen, Xinlei Ying, Jiashui Wang, Yang Liu:
APICraft: Fuzz Driver Generation for Closed-source SDK Libraries. USENIX Security Symposium 2021: 2811-2828
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-28 00:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







