​
Login / Signup
Daoyuan Wu
ORCID
Publication Activity (10 Years)
Years Active: 2014-2024
Publications (10 Years): 47
Top Topics
Api Calls
Face Detection And Recognition
Android Application
Lightweight
Top Venues
CoRR
NDSS
ICSE
ISC
</>
Publications
</>
Xiuting Ge
,
Chunrong Fang
,
Quanjun Zhang
,
Daoyuan Wu
,
Bowen Yu
,
Qirui Zheng
,
An Guo
,
Shangwei Lin
,
Zhihong Zhao
,
Yang Liu
,
Zhenyu Chen
Pre-trained Model-based Actionable Warning Identification: A Feasibility Study.
CoRR
(2024)
Lyuye Zhang
,
Kaixuan Li
,
Kairan Sun
,
Daoyuan Wu
,
Ye Liu
,
Haoye Tian
,
Yang Liu
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts.
CoRR
(2024)
Yuqiang Sun
,
Daoyuan Wu
,
Yue Xue
,
Han Liu
,
Haijun Wang
,
Zhengzi Xu
,
Xiaofei Xie
,
Yang Liu
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis.
ICSE
(2024)
Han Liu
,
Daoyuan Wu
,
Yuqiang Sun
,
Haijun Wang
,
Kaixuan Li
,
Yang Liu
,
Yixiang Chen
Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts.
USENIX Security Symposium
(2024)
Zongjie Li
,
Chaozheng Wang
,
Pingchuan Ma
,
Chaowei Liu
,
Shuai Wang
,
Daoyuan Wu
,
Cuiyun Gao
,
Yang Liu
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study.
ICSE
(2024)
Ye Liu
,
Yue Xue
,
Daoyuan Wu
,
Yuqiang Sun
,
Yi Li
,
Miaolei Shi
,
Yang Liu
PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation.
CoRR
(2024)
Liwen Wang
,
Yuanyuan Yuan
,
Ao Sun
,
Zongjie Li
,
Pingchuan Ma
,
Daoyuan Wu
,
Shuai Wang
How do LLMs Support Deep Learning Testing? A Comprehensive Study Through the Lens of Image Mutation.
CoRR
(2024)
Yuqiang Sun
,
Daoyuan Wu
,
Yue Xue
,
Han Liu
,
Wei Ma
,
Lyuye Zhang
,
Miaolei Shi
,
Yang Liu
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning.
CoRR
(2024)
Daoyuan Wu
,
Shuai Wang
,
Yang Liu
,
Ning Liu
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper.
CoRR
(2024)
Zhenlan Ji
,
Daoyuan Wu
,
Pingchuan Ma
,
Zongjie Li
,
Shuai Wang
Testing and Understanding Erroneous Planning in LLM Agents through Synthesized User Inputs.
CoRR
(2024)
Xunguang Wang
,
Daoyuan Wu
,
Zhenlan Ji
,
Zongjie Li
,
Pingchuan Ma
,
Shuai Wang
,
Yingjiu Li
,
Yang Liu
,
Ning Liu
,
Juergen Rahmel
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner.
CoRR
(2024)
Wei Ma
,
Daoyuan Wu
,
Yuqiang Sun
,
Tianwen Wang
,
Shangqing Liu
,
Jian Zhang
,
Yue Xue
,
Yang Liu
Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications.
CoRR
(2024)
Xiao Yi
,
Yuzhou Fang
,
Daoyuan Wu
,
Lingxiao Jiang
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
NDSS
(2023)
Xiuting Ge
,
Chunrong Fang
,
Xuanye Li
,
Weisong Sun
,
Daoyuan Wu
,
Juan Zhai
,
Shangwei Lin
,
Zhihong Zhao
,
Yang Liu
,
Zhenyu Chen
Machine Learning for Actionable Warning Identification: A Comprehensive Survey.
CoRR
(2023)
Zongjie Li
,
Chaozheng Wang
,
Pingchuan Ma
,
Chaowei Liu
,
Shuai Wang
,
Daoyuan Wu
,
Cuiyun Gao
On the Feasibility of Specialized Ability Stealing for Large Language Code Models.
CoRR
(2023)
Yuzhou Fang
,
Daoyuan Wu
,
Xiao Yi
,
Shuai Wang
,
Yufan Chen
,
Mengjie Chen
,
Yang Liu
,
Lingxiao Jiang
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
ISSTA
(2023)
Zongjie Li
,
Chaozheng Wang
,
Pingchuan Ma
,
Daoyuan Wu
,
Shuai Wang
,
Cuiyun Gao
,
Yang Liu
Split and Merge: Aligning Position Biases in Large Language Model based Evaluators.
CoRR
(2023)
Yuqiang Sun
,
Daoyuan Wu
,
Yue Xue
,
Han Liu
,
Haijun Wang
,
Zhengzi Xu
,
Xiaofei Xie
,
Yang Liu
When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan.
CoRR
(2023)
Zongjie Li
,
Chaozheng Wang
,
Chaowei Liu
,
Pingchuan Ma
,
Daoyuan Wu
,
Shuai Wang
,
Cuiyun Gao
VRPTEST: Evaluating Visual Referring Prompting in Large Multimodal Models.
CoRR
(2023)
Xiao Yi
,
Daoyuan Wu
,
Lingxiao Jiang
,
Yuzhou Fang
,
Kehuan Zhang
,
Wei Zhang
An empirical study of blockchain system vulnerabilities: modules, types, and patterns.
ESEC/SIGSOFT FSE
(2022)
Xiao Yi
,
Yuzhou Fang
,
Daoyuan Wu
,
Lingxiao Jiang
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
CoRR
(2022)
Menghan Sun
,
Zirui Song
,
Xiaoxi Ren
,
Daoyuan Wu
,
Kehuan Zhang
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework.
RAID
(2022)
Haoyu Ma
,
Shijia Li
,
Debin Gao
,
Daoyuan Wu
,
Qiaowen Jia
,
Chunfu Jia
Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Xu Yang
,
Daoyuan Wu
,
Xiao Yi
,
Jimmy H. M. Lee
,
Tan Lee
iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition.
CoRR
(2022)
Zicheng Zhang
,
Daoyuan Wu
,
Lixiang Li
,
Debin Gao
On the Usability (In)Security of In-App Browsing Interfaces in Mobile Apps.
CoRR
(2022)
Daoyuan Wu
,
Debin Gao
,
Robert H. Deng
,
Rocky K. C. Chang
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
DSN
(2021)
Xiao Yi
,
Daoyuan Wu
,
Lingxiao Jiang
,
Kehuan Zhang
,
Wei Zhang
Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities.
CoRR
(2021)
Daoyuan Wu
,
Debin Gao
,
David Lo
Scalable online vetting of Android apps for measuring declared SDK versions and their consistency with API calls.
Empir. Softw. Eng.
26 (1) (2021)
Mengjie Chen
,
Daoyuan Wu
,
Xiao Yi
,
Jianliang Xu
AGChain: A Blockchain-based Gateway for Permanent, Distributed, and Secure App Delegation from Existing Mobile App Markets.
CoRR
(2021)
Haoyu Ma
,
Jianwen Tian
,
Kefan Qiu
,
David Lo
,
Debin Gao
,
Daoyuan Wu
,
Chunfu Jia
,
Thar Baker
Deep-Learning-Based App Sensitive Behavior Surveillance for Android Powered Cyber-Physical Systems.
IEEE Trans. Ind. Informatics
17 (8) (2021)
Daoyuan Wu
,
Debin Gao
,
Robert H. Deng
,
Rocky K. C. Chang
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
CoRR
(2020)
En He
,
Daoyuan Wu
,
Robert H. Deng
Understanding Android VoIP Security: A System-Level Vulnerability Assessment.
DIMVA
(2020)
Shiwei Zhang
,
Weichao Li
,
Daoyuan Wu
,
Bo Jin
,
Rocky K. C. Chang
,
Debin Gao
,
Yi Wang
,
Ricky K. P. Mok
An empirical study of mobile network behavior and application performance in the wild.
IWQoS
(2019)
Daoyuan Wu
,
Debin Gao
,
Rocky K. C. Chang
,
En He
,
Eric K. T. Cheng
,
Robert H. Deng
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
NDSS
(2019)
Daoyuan Wu
,
Debin Gao
,
David Lo
Scalable Online Vetting of Android Apps for Measuring Declared SDK Versions and Their Consistency with API Calls.
CoRR
(2019)
Daoyuan Wu
,
Debin Gao
,
Eric K. T. Cheng
,
Yichen Cao
,
Jintao Jiang
,
Robert H. Deng
Towards Understanding Android System Vulnerabilities: Techniques and Insights.
AsiaCCS
(2019)
Daoyuan Wu
,
Yao Cheng
,
Debin Gao
,
Yingjiu Li
,
Robert H. Deng
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
CODASPY
(2018)
Daoyuan Wu
,
Yao Cheng
,
Debin Gao
,
Yingjiu Li
,
Robert H. Deng
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
CoRR
(2018)
Weichao Li
,
Daoyuan Wu
,
Rocky K. C. Chang
,
Ricky K. P. Mok
Toward Accurate Network Delay Measurement on Android Phones.
IEEE Trans. Mob. Comput.
17 (3) (2018)
Xiaoxiao Tang
,
Yan Lin
,
Daoyuan Wu
,
Debin Gao
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
WISEC
(2018)
Daoyuan Wu
,
Rocky K. C. Chang
,
Weichao Li
,
Eric K. T. Cheng
,
Debin Gao
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance.
USENIX Annual Technical Conference
(2017)
Daoyuan Wu
,
Ximing Liu
,
Jiayun Xu
,
David Lo
,
Debin Gao
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps.
WASA
(2017)
Daoyuan Wu
,
Rocky K. C. Chang
,
Weichao Li
,
Eric K. T. Cheng
,
Debin Gao
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance.
CoRR
(2017)
Daoyuan Wu
,
Ximing Liu
,
Jiayun Xu
,
David Lo
,
Debin Gao
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps.
CoRR
(2017)
Daoyuan Wu
,
Weichao Li
,
Rocky K. C. Chang
,
Debin Gao
MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic.
CoRR
(2016)
Daoyuan Wu
,
Debin Gao
,
Yingjiu Li
,
Robert H. Deng
SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
CoRR
(2016)
Weichao Li
,
Daoyuan Wu
,
Rocky K. C. Chang
,
Ricky K. P. Mok
Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement.
CoNEXT
(2016)
Weichao Li
,
Ricky K. P. Mok
,
Daoyuan Wu
,
Rocky K. C. Chang
On the accuracy of smartphone-based mobile network measurement.
INFOCOM
(2015)
Daoyuan Wu
,
Rocky K. C. Chang
Indirect File Leaks in Mobile Applications.
CoRR
(2015)
Yu Liang
,
Xinjie Ma
,
Daoyuan Wu
,
Xiaoxiao Tang
,
Debin Gao
,
Guojun Peng
,
Chunfu Jia
,
Huanguo Zhang
Stack Layout Randomization with Minimal Rewriting of Android Binaries.
ICISC
(2015)
Daoyuan Wu
,
Rocky K. C. Chang
Analyzing Android Browser Apps for file: // Vulnerabilities.
ISC
(2014)
Daoyuan Wu
,
Xiapu Luo
,
Rocky K. C. Chang
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps.
CoRR
(2014)
Daoyuan Wu
,
Rocky K. C. Chang
Analyzing Android Browser Apps for file: // Vulnerabilities.
CoRR
(2014)