Weihang Wang
Cited by
Cited by
Trojaning attack on neural networks
Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS 2, 4, 2018
Webranz: web page randomization for better advertisement delivery and web-bot prevention
W Wang, Y Zheng, X Xing, Y Kwon, X Zhang, P Eugster
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
Exploring the wild birds’ migration data for the disease spread study of H5N1: a clustering and association approach
M Tang, Y Zhou, J Li, W Wang, P Cui, Y Hou, Z Luo, J Li, F Lei, B Yan
Knowledge and Information Systems 27 (2), 227-251, 2011
ARROW: Automated repair of races on client-side web pages
W Wang, Y Zheng, P Liu, L Xu, X Zhang, P Eugster
Proceedings of the 25th International Symposium on Software Testing and …, 2016
An empirical analysis of UI-based flaky tests
A Romano, Z Song, S Grandhi, W Yang, W Wang
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
Understanding the performance of webassembly applications
Y Yan, T Tu, L Zhao, Y Zhou, W Wang
Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021
Minerray: Semantics-aware analysis for ever-evolving cryptojacking detection
A Romano, Y Zheng, W Wang
2020 35th IEEE/ACM International Conference on Automated Software …, 2020
Adbudgetkiller: Online advertising budget draining attack
IL Kim, W Wang, Y Kwon, Y Zheng, Y Aafer, W Meng, X Zhang
Proceedings of the 2018 World Wide Web Conference, 297-307, 2018
Cpr: cross platform binary code reuse via platform independent trace program
Y Kwon, W Wang, Y Zheng, X Zhang, D Xu
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
Bird flu outbreak prediction via satellite tracking
Y Zhou, M Tang, W Pan, J Li, W Wang, J Shao, L Wu, J Li, Q Yang, B Yan
IEEE Intelligent Systems 29 (4), 10-17, 2013
Wasim: Understanding webassembly applications through classification
A Romano, W Wang
2020 35th IEEE/ACM International Conference on Automated Software …, 2020
Subscription normalization for effective content-based messaging
KR Jayaram, W Wang, P Eugster
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3184-3193, 2015
End-system performance aware transport protocols
W Wang, Y Ren, M Tang, J Li, H Qian
Journal of Software 21 (7), 1635-1645, 2010
Birds bring flues? Mining frequent and high weighted cliques from birds migration networks
MJ Tang, W Wang, Y Jiang, Y Zhou, J Li, P Cui, Y Liu, B Yan
International Conference on Database Systems for Advanced Applications, 359-369, 2010
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly
A Romano, D Lehmann, M Pradel, W Wang
43rd IEEE Symposium on Security and Privacy, 2022
Wasmview: Visual testing for webassembly applications
A Romano, W Wang
2020 IEEE/ACM 42nd International Conference on Software Engineering …, 2020
Finding client-side business flow tampering vulnerabilities
IL Kim, Y Zheng, H Park, W Wang, W You, Y Aafer, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
An Empirical Study of Bugs in WebAssembly Compilers
A Romano, X Liu, Y Kwon, W Wang
36th ACM/IEEE International Conference on Automated Software Engineering, 2021
Characterization and evaluation of end-system performance aware transport schemes for fast long-distance optical networks
W Wang, M Tang, Y Ren, J Li
Information Technology Journal 9 (4), 766-773, 2010
The system can't perform the operation now. Try again later.
Articles 1–20