default search action
Qingkai Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Mingwei Zheng, Qingkai Shi, Xuwei Liu, Xiangzhe Xu, Le Yu, Congyu Liu, Guannan Wei, Xiangyu Zhang:
ParDiff: Practical Static Differential Analysis of Network Protocol Parsers. Proc. ACM Program. Lang. 8(OOPSLA1): 1208-1234 (2024) - [j10]Peisen Yao, Jinguo Zhou, Xiao Xiao, Qingkai Shi, Rongxin Wu, Charles Zhang:
Falcon: A Fused Approach to Path-Sensitive Sparse Data Dependence Analysis. Proc. ACM Program. Lang. 8(PLDI): 567-592 (2024) - [j9]Heqing Huang, Hung-Chun Chiu, Qingkai Shi, Peisen Yao, Charles Zhang:
Balance Seed Scheduling via Monte Carlo Planning. IEEE Trans. Dependable Secur. Comput. 21(3): 1469-1483 (2024) - [j8]Xinmeng Xia, Yang Feng, Qingkai Shi, James A. Jones, Xiangyu Zhang, Baowen Xu:
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing. ACM Trans. Softw. Eng. Methodol. 33(5): 118:1-118:31 (2024) - [j7]Yi Sun, Chengpeng Wang, Gang Fan, Qingkai Shi, Xiangyu Zhang:
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing. IEEE Trans. Software Eng. 50(11): 3022-3036 (2024) - [c32]Jielun Wu, Qingkai Shi:
Poster: Protecting Source Code Privacy When Hunting Bugs. CCS 2024: 5030-5032 - [c31]Rongxin Wu, Yuxuan He, Jiafeng Huang, Chengpeng Wang, Wensheng Tang, Qingkai Shi, Xiao Xiao, Charles Zhang:
LibAlchemy: A Two-Layer Persistent Summary Design for Taming Third-Party Libraries in Static Bug-Finding Systems. ICSE 2024: 105:1-105:13 - [c30]Xizhe Yin, Yang Feng, Qingkai Shi, Zixi Liu, Hongwang Liu, Baowen Xu:
FRIES: Fuzzing Rust Library Interactions via Efficient Ecosystem-Guided Target Generation. ISSTA 2024: 1137-1148 - [c29]Timothy Fraser, Xuwei Liu, Qingkai Shi, Xiangyu Zhang, Mark Wutka, Daniel Balasubramanian, Hao Chen, Zhong Shao:
A NAND Use Case for Cybersecurity Experiments. SecDev 2024: 178-179 - [c28]Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung:
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. SP 2024: 2198-2216 - [i9]Shiwei Feng, Yapeng Ye, Qingkai Shi, Zhiyuan Cheng, Xiangzhe Xu, Siyuan Cheng, Hongjun Choi, Xiangyu Zhang:
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation. CoRR abs/2409.07774 (2024) - 2023
- [j6]Chengpeng Wang, Wenyang Wang, Peisen Yao, Qingkai Shi, Jinguo Zhou, Xiao Xiao, Charles Zhang:
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation. ACM Trans. Softw. Eng. Methodol. 32(3): 66:1-66:39 (2023) - [c27]Qingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. CCS 2023: 1287-1301 - [c26]Xiangzhe Xu, Shiwei Feng, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, Xiangyu Zhang:
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis. ISSTA 2023: 1106-1118 - [c25]Xinmeng Xia, Yang Feng, Qingkai Shi:
Understanding Bugs in Rust Compilers. QRS 2023: 138-149 - [c24]Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang, Xiangyu Zhang:
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model. ESEC/SIGSOFT FSE 2023: 401-412 - [c23]Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, Xiangyu Zhang:
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling. SP 2023: 2391-2408 - [c22]Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang:
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis. USENIX Security Symposium 2023: 7019-7036 - [i8]Qingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. CoRR abs/2305.11781 (2023) - [i7]Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang:
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis. CoRR abs/2305.13483 (2023) - [i6]Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang, Xiangyu Zhang:
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model. CoRR abs/2308.15449 (2023) - 2022
- [j5]Chengpeng Wang, Peisen Yao, Wensheng Tang, Qingkai Shi, Charles Zhang:
Complexity-guided container replacement synthesis. Proc. ACM Program. Lang. 6(OOPSLA1): 1-31 (2022) - [j4]Qingkai Shi, Yongchao Wang, Peisen Yao, Charles Zhang:
Indexing the extended Dyck-CFL reachability for context-sensitive program analysis. Proc. ACM Program. Lang. 6(OOPSLA2): 1438-1468 (2022) - [c21]Yiyuan Guo, Jinguo Zhou, Peisen Yao, Qingkai Shi, Charles Zhang:
Precise Divide-By-Zero Detection with Affirmative Evidence. ICSE 2022: 1718-1729 - [c20]Yuandao Cai, Chengfeng Ye, Qingkai Shi, Charles Zhang:
Peahen: fast and precise static deadlock detection via context reduction. ESEC/SIGSOFT FSE 2022: 784-796 - [c19]Heqing Huang, Yiyuan Guo, Qingkai Shi, Peisen Yao, Rongxin Wu, Charles Zhang:
BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning. SP 2022: 36-50 - 2021
- [j3]Peisen Yao, Qingkai Shi, Heqing Huang, Charles Zhang:
Program analysis via efficient symbolic abstraction. Proc. ACM Program. Lang. 5(OOPSLA): 1-32 (2021) - [c18]Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang:
Fuzzing SMT solvers via two-dimensional input space exploration. ISSTA 2021: 322-335 - [c17]Qingkai Shi, Peisen Yao, Rongxin Wu, Charles Zhang:
Path-sensitive sparse analysis without path conditions. PLDI 2021: 930-943 - [c16]Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang:
Skeletal approximation enumeration for SMT solver testing. ESEC/SIGSOFT FSE 2021: 1141-1153 - [i5]Qingkai Shi, Yongchao Wang, Charles Zhang:
Indexing Context-Sensitive Reachability. CoRR abs/2109.01321 (2021) - [i4]Peisen Yao, Jinguo Zhou, Xiao Xiao, Qingkai Shi, Rongxin Wu, Charles Zhang:
Efficient Path-Sensitive Data-Dependence Analysis. CoRR abs/2109.07923 (2021) - 2020
- [c15]Qingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang:
Conquering the extensional scalability problem for value-flow analysis frameworks. ICSE 2020: 812-823 - [c14]Qingkai Shi, Charles Zhang:
Pipelining bottom-up data flow analysis. ICSE 2020: 835-847 - [c13]Peisen Yao, Qingkai Shi, Heqing Huang, Charles Zhang:
Fast bit-vector satisfiability. ISSTA 2020: 38-50 - [c12]Yang Feng, Qingkai Shi, Xinyu Gao, Jun Wan, Chunrong Fang, Zhenyu Chen:
DeepGini: prioritizing massive tests to enhance the robustness of deep neural networks. ISSTA 2020: 177-188 - [c11]Gang Fan, Chengpeng Wang, Rongxin Wu, Xiao Xiao, Qingkai Shi, Charles Zhang:
Escaping dependency hell: finding build dependency errors with the unified dependency graph. ISSTA 2020: 463-474 - [c10]Chunrong Fang, Zixi Liu, Yangyang Shi, Jeff Huang, Qingkai Shi:
Functional code clone detection with syntax and semantics fusion learning. ISSTA 2020: 516-527 - [c9]Ruixiang Qian, Yuan Zhao, Duo Men, Yang Feng, Qingkai Shi, Yong Huang, Zhenyu Chen:
Test recommendation system based on slicing coverage filtering. ISSTA 2020: 573-576 - [c8]Heqing Huang, Peisen Yao, Rongxin Wu, Qingkai Shi, Charles Zhang:
Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction. SP 2020: 1613-1627
2010 – 2019
- 2019
- [c7]Gang Fan, Rongxin Wu, Qingkai Shi, Xiao Xiao, Jinguo Zhou, Charles Zhang:
Smoke: scalable path-sensitive memory leak detection for millions of lines of code. ICSE 2019: 72-82 - [c6]Xufan Zhang, Ziyue Yin, Yang Feng, Qingkai Shi, Jia Liu, Zhenyu Chen:
NeuralVis: Visualizing and Interpreting Deep Learning Models. ASE 2019: 1106-1109 - [i3]Qingkai Shi, Jun Wan, Yang Feng, Chunrong Fang, Zhenyu Chen:
DeepGini: Prioritizing Massive Tests to Reduce Labeling Cost. CoRR abs/1903.00661 (2019) - [i2]Xufan Zhang, Ziyue Yin, Yang Feng, Qingkai Shi, Jia Liu, Zhenyu Chen:
NeuralVis: Visualizing and Interpreting Deep Learning Models. CoRR abs/1906.00690 (2019) - [i1]Qingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang:
Conquering the Extensional Scalability Problem for Value-Flow Analysis Frameworks. CoRR abs/1912.06878 (2019) - 2018
- [c5]Qingkai Shi, Xiao Xiao, Rongxin Wu, Jinguo Zhou, Gang Fan, Charles Zhang:
Pinpoint: fast and precise sparse value flow analysis for million lines of code. PLDI 2018: 693-706 - 2017
- [c4]Chunrong Fang, Qingkai Shi, Yang Feng, Zicong Liu, Xiaofang Zhang, Baowen Xu:
Predicate Interpretation Analysis Based on Soot. SEKE 2017: 278-282 - [c3]Chunrong Fang, Yang Feng, Qingkai Shi, Zicong Liu, Shuying Li, Baowen Xu:
Fault Interference and Coupling Effect. SEKE 2017: 501-506 - 2016
- [j2]Qingkai Shi, Zhenyu Chen, Chunrong Fang, Yang Feng, Baowen Xu:
Measuring the Diversity of a Test Set With Distance Entropy. IEEE Trans. Reliab. 65(1): 19-27 (2016) - [j1]Qingkai Shi, Jeff Huang, Zhenyu Chen, Baowen Xu:
Verifying Synchronization for Atomicity Violation Fixing. IEEE Trans. Software Eng. 42(3): 285-301 (2016) - 2014
- [c2]Zicong Liu, Zhenyu Chen, Chunrong Fang, Qingkai Shi:
Hybrid test data generation. ICSE Companion 2014: 630-631 - [c1]Haoyu Yang, Chen Wang, Qingkai Shi, Yang Feng, Zhenyu Chen:
Bug Inducing Analysis to Prevent Fault Prone Bug Fixes. SEKE 2014: 620-625
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint