


default search action
Wei You 0001
Person information
- affiliation: Renmin University of China, School of Information, Beijing, China
- affiliation (2017 - 2019): Purdue University, Department of Computer Science, West Lafayette, IN, USA
- affiliation (2016 - 2017): Indiana University, School of Informatics and Computing, Bloomington, IN, USA
- affiliation (PhD 2016): Renmin University of China, Beijing, China
Other persons with the same name
- Wei You — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[c27]Dongchen Xie, Dongnan He, Wei You, Jianjun Huang, Bin Liang, Shuitao Gan, Wenchang Shi:
BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel. SP 2025: 810-828
[c26]Jianan Feng
, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. SP 2025: 2133-2151- 2024
[c25]Xuwei Liu
, Wei You
, Yapeng Ye
, Zhuo Zhang
, Jianjun Huang
, Xiangyu Zhang
:
FuzzInMem: Fuzzing Programs via In-memory Structures. ICSE 2024: 131:1-131:13
[c24]Jianjun Huang
, Jianglei Nie
, Yuanjun Gong
, Wei You
, Bin Liang
, Pan Bian
:
Raisin: Identifying Rare Sensitive Functions for Bug Detection. ICSE 2024: 175:1-175:12
[c23]Dongnan He
, Dongchen Xie
, Yujie Wang
, Wei You
, Bin Liang
, Jianjun Huang
, Wenchang Shi
, Zhuo Zhang
, Xiangyu Zhang
:
Define-Use Guided Path Exploration for Better Forced Execution. ISSTA 2024: 287-299
[c22]Yuanjun Gong
, Jianglei Nie
, Wei You
, Wenchang Shi
, Jianjun Huang
, Bin Liang
, Jian Zhang
:
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection. ICPC 2024: 304-315
[c21]Huanyao Rong, Wei You, Xiaofeng Wang, Tianhao Mao:
Toward Unbiased Multiple-Target Fuzzing with Path Diversity. USENIX Security Symposium 2024- 2023
[j8]Jianjun Huang
, Bo Xue
, Jiasheng Jiang
, Wei You
, Bin Liang
, Jingzheng Wu, Yanjun Wu:
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering. IEEE Trans. Software Eng. 49(4): 2272-2284 (2023)
[c20]Changqing Miao
, Jianan Feng
, Wei You
, Wenchang Shi
, Jianjun Huang
, Bin Liang
:
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. CCS 2023: 2486-2500
[c19]Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang
, Jian Zhang:
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers. ICSE 2023: 95-107
[c18]Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang:
AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering. USENIX Security Symposium 2023: 4967-4984
[i2]Huanyao Rong, Wei You, XiaoFeng Wang, Tianhao Mao:
Toward Unbiased Multiple-Target Fuzzing with Path Diversity. CoRR abs/2310.12419 (2023)
[i1]Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. CoRR abs/2311.06122 (2023)- 2022
[j7]Yu Zhang, Nanyu Zhong, Wei You, Yanyan Zou
, Kunpeng Jian, Jiahuan Xu, Jian Sun, Baoxu Liu, Wei Huo:
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices. Cybersecur. 5(1): 21 (2022)
[j6]Jianjun Huang
, Jiasheng Jiang
, Wei You
, Bin Liang
:
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts. IEEE Trans. Computers 71(7): 1551-1563 (2022)
[c17]Xiaohui Zhang, Yuanjun Gong
, Bin Liang, Jianjun Huang
, Wei You, Wenchang Shi, Jian Zhang:
Hunting bugs with accelerated optimal graph vertex matching. ISSTA 2022: 64-76
[c16]Xuwei Liu, Wei You, Zhuo Zhang
, Xiangyu Zhang:
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving. ISSTA 2022: 391-403- 2021
[j5]Shilei Bai
, Bin Liang
, Jianjun Huang
, Wei You
, Jiachun Li, Yaping Li, Wenchang Shi
:
Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness. IEEE Trans. Computers 70(9): 1374-1387 (2021)
[j4]Jianjun Huang
, Songming Han, Wei You
, Wenchang Shi
, Bin Liang
, Jingzheng Wu, Yanjun Wu:
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching. IEEE Trans. Inf. Forensics Secur. 16: 2144-2156 (2021)
[c15]Zhuo Zhang
, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu
, Xiangyu Zhang:
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting. SP 2021: 659-676
[c14]Zhuo Zhang
, Yapeng Ye
, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. SP 2021: 813-832
[c13]Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin:
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. USENIX Security Symposium 2021: 2759-2776- 2020
[j3]Wei You
, Bin Liang
, Wenchang Shi
, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. IEEE Trans. Dependable Secur. Comput. 17(1): 209-222 (2020)
[c12]I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang:
Finding client-side business flow tampering vulnerabilities. ICSE 2020: 222-233
[c11]Wei You, Zhuo Zhang
, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang:
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. SP 2020: 1121-1138
2010 – 2019
- 2019
[j2]Zhuo Zhang
, Wei You, Guanhong Tao, Guannan Wei
, Yonghwi Kwon, Xiangyu Zhang:
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. Proc. ACM Program. Lang. 3(OOPSLA): 137:1-137:31 (2019)
[c10]Wei You, Xuwei Liu
, Shiqing Ma, David Mitchel Perry, Xiangyu Zhang, Bin Liang:
SLF: fuzzing without valid seed inputs. ICSE 2019: 712-723
[c9]Wei You, Xueqiang Wang
, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786- 2017
[j1]Weigang Gong, Wei You, Zan Li, Wenchang Shi, Bin Liang:
一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation). 计算机科学 44(11): 22-26 (2017)
[c8]Yi Chen, Wei You, Yeonjoon Lee
, Kai Chen, XiaoFeng Wang, Wei Zou:
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution. CCS 2017: 815-828
[c7]Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang:
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. CCS 2017: 2139-2154- 2016
[c6]Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai
:
AntMiner: mining more bugs by reducing noise interference. ICSE 2016: 333-344
[c5]Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang:
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices. ICSE 2016: 959-970
[c4]Bin Liang, Miaoqiang Su, Wei You, Wenchang Shi, Gang Yang:
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter. WWW 2016: 345-356- 2015
[c3]Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang:
Android Implicit Information Flow Demystified. AsiaCCS 2015: 585-590- 2014
[c2]Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich:
Scriptless Timing Attacks on Web Browser Privacy. DSN 2014: 112-123- 2011
[c1]Bin Liang, Wei You, Wenchang Shi, Zhaohui Liang:
Detecting stealthy malware with inter-structure and imported signatures. AsiaCCS 2011: 217-227
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-03 00:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







