Follow
Xiangzhe Xu
Title
Cited by
Cited by
Year
CPC: Automatically classifying and propagating natural language comments via program analysis
J Zhai, X Xu, Y Shi, G Tao, M Pan, S Ma, L Xu, W Zhang, L Tan, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
422020
Detecting backdoors in pre-trained encoders
S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
202023
CompCertELF: verified separate compilation of C programs into ELF object files
Y Wang, X Xu, P Wilke, Z Shao
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-28, 2020
142020
Beagle: Forensics of deep learning backdoor attack for better defense
S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ...
arXiv preprint arXiv:2301.06241, 2023
72023
Automatic generation and validation of instruction encoders and decoders
X Xu, J Wu, Y Wang, Z Yin, P Li
Computer Aided Verification: 33rd International Conference, CAV 2021 …, 2021
42021
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
32023
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis
X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang
arXiv preprint arXiv:2306.02546, 2023
32023
Nova: Generative Language Models for Binaries
N Jiang, C Wang, K Liu, X Xu, L Tan, X Zhang
arXiv preprint arXiv:2311.13721, 2023
22023
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
Extracting protocol format as state machine via controlled static loop analysis
Q Shi, X Xu, X Zhang
32nd USENIX Security Symposium (USENIX Security 23), 7019-7036, 2023
12023
Checkpointing and deterministic training for deep learning
X Xu, H Liu, G Tao, Z Xuan, X Zhang
Proceedings of the 1st International Conference on AI Engineering: Software …, 2022
12022
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
S Cheng, G Tao, Y Liu, G Shen, S An, S Feng, X Xu, K Zhang, S Ma, ...
arXiv preprint arXiv:2403.17188, 2024
2024
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
Z Su, X Xu, Z Huang, Z Zhang, Y Ye, J Huang, X Zhang
arXiv preprint arXiv:2402.11842, 2024
2024
When Dataflow Analysis Meets Large Language Models
C Wang, W Zhang, Z Su, X Xu, X Xie, X Zhang
arXiv preprint arXiv:2402.10754, 2024
2024
ODSCAN: Backdoor Scanning for Object Detection Models
S Cheng, G Shen, G Tao, K Zhang, Z Zhang, S An, X Xu, Y Liu, S Ma, ...
2024 IEEE Symposium on Security and Privacy (SP), 119-119, 2024
2024
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-Guided Emulation
A Zhou, Y Hu, X Xu, C Zhang
ACM Transactions on Software Engineering and Methodology, 2024
2024
ParDiff: Practical Static Differential Analysis of Network Protocol Parsers
M ZHENG, Q SHI, X LIU, X XU, LE YU, C LIU, G WEI, X ZHANG
2024
Towards a Framework for Developing Verified Assemblers for the ELF Format
J Wu, Y Wang, M Sun, X Xu, Y Song
Asian Symposium on Programming Languages and Systems, 205-224, 2023
2023
Zhang, Haiyin 217 Zhang, Xiangyu 65 Zhu, Liming 101
P Zvyagina, C Procope, L Quaranta, M Rahimi, R Ramler, S Rico, ...
The system can't perform the operation now. Try again later.
Articles 1–19