Cited By
View all- Zhou ZYang YWu SHuang YChen BPeng XFilkov VRay BZhou M(2024)Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed FuzzingProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695531(1633-1644)Online publication date: 27-Oct-2024
- Zhang FFan LChen SCai MXu SZhao L(2024)Does the Vulnerability Threaten Our Projects? Automated Vulnerable API Detection for Third-Party LibrariesIEEE Transactions on Software Engineering10.1109/TSE.2024.345496050:11(2906-2920)Online publication date: 1-Nov-2024
- Sun YXu ZLiu CZhang YLiu YBissyandé TKlein JBird CSarro F(2023)Who is the Real Hero? Measuring Developer Contribution via Multi-Dimensional Data IntegrationProceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering10.1109/ASE56229.2023.00102(825-836)Online publication date: 11-Nov-2023
- Show More Cited By