Follow
Haoyu WANG (王浩宇)
Haoyu WANG (王浩宇)
Full Professor@HUST <- BUPT <- PKU
Verified email at hust.edu.cn - Homepage
Title
Cited by
Cited by
Year
Libradar: Fast and accurate detection of third-party libraries in android apps
Z Ma, H Wang, Y Guo, X Chen
Proceedings of the 38th international conference on software engineering …, 2016
2772016
Wukong: A scalable and accurate two-phase approach to android app clone detection
H Wang, Y Guo, Z Ma, X Chen
Proceedings of the 2015 international symposium on software testing and …, 2015
2492015
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network
X Cheng, H Wang, J Hua, G Xu, Y Sui
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-33, 2021
1732021
Large Language Models for Software Engineering: A Systematic Literature Review
X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li, X Luo, D Lo, J Grundy, ...
https://arxiv.org/abs/2308.10620, 112011, 2023
155*2023
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets
H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ...
Proceedings of the 2018 Internet Measurement Conference (IMC), 2018
1552018
Cid: Automating the detection of api-related compatibility issues in android apps
L Li, TF Bissyandé, H Wang, J Klein
Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018
1402018
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, YC Hu
The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019
1282019
Towards a first step to understand flash loan and its applications in defi ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021
115*2021
A comprehensive study on challenges in deploying deep learning based software
Z Chen, Y Cao, Y Liu, H Wang, T Xie, X Liu
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
1062020
Jailbreaker: Automated jailbreak across multiple large language model chatbots
G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu
arXiv preprint arXiv:2307.08715, 2023
1022023
Prompt Injection attack against LLM-integrated Applications
Y Liu, G Deng, Y Li, K Wang, T Zhang, Y Liu, H Wang, Y Zheng, Y Liu
arXiv preprint arXiv:2306.05499, 2023
1022023
FraudDroid: Automated Ad Fraud Detection for Android Apps
F Dong, H Wang, L Li, Y Guo, TF Bissyande, T Liu, G Xu, J Klein
ESEC/FSE 2018, 2018
1002018
Characterizing cryptocurrency exchange scams
P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu
Computers & Security 98, 101993, 2020
982020
Flow2vec: Value-flow-based precise code embedding
Y Sui, X Cheng, G Zhang, H Wang
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-27, 2020
962020
Understanding (Mis) Behavior on the EOSIO Blockchain
Y HUANG, H WANG, LEI WU, G TYSON, X LUO, RUN ZHANG, X LIU, ...
ACM SIGMETRICS 2020, 2020
91*2020
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
N He, L Wu, H Wang, Y Guo, X Jiang
The 24th International Conference on Financial Cryptography and Data …, 2020
872020
Make web3. 0 connected
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu
IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021
792021
RmvDroid: Towards A Reliable Android Malware Dataset with App Metadata
H Wang, J Si, H Li, Y Guo
The 16th International Conference on Mining Software Repositories (MSR 2019), 2019
782019
Using text mining to infer the purpose of permission use in mobile apps
H Wang, J Hong, Y Guo
Proceedings of the 2015 ACM international joint conference on pervasive and …, 2015
782015
Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play
H Wang, H Li, Y Guo
THE WEB CONFERENCE 2019 (WWW 2019), 2019
772019
The system can't perform the operation now. Try again later.
Articles 1–20