Login / Signup
Peiyu Liu
ORCID
Publication Activity (10 Years)
Years Active: 2023-2024
Publications (10 Years): 11
Top Topics
Source Code
Misuse Detection
Open Source
Flow Graph
Top Venues
CoRR
USENIX Security Symposium
EMNLP
SP
</>
Publications
</>
Yifan Xia
,
Zichen Xie
,
Peiyu Liu
,
Kangjie Lu
,
Yan Liu
,
Wenhai Wang
,
Shouling Ji
Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs.
CoRR
(2024)
Jiahui Xiang
,
Wenhai Wang
,
Tong Ye
,
Peiyu Liu
LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices.
CoRR
(2024)
Peiyu Liu
,
Junming Liu
,
Lirong Fu
,
Kangjie Lu
,
Yifan Xia
,
Xuhong Zhang
,
Wenzhi Chen
,
Haiqin Weng
,
Shouling Ji
,
Wenhai Wang
Exploring ChatGPT's Capabilities on Vulnerability Management.
USENIX Security Symposium
(2024)
Yi Xiang
,
Xuhong Zhang
,
Peiyu Liu
,
Shouling Ji
,
Xiao Xiao
,
Hong Liang
,
Jiacheng Xu
,
Wenhai Wang
Critical Code Guided Directed Greybox Fuzzing for Commits.
USENIX Security Symposium
(2024)
Yifan Xia
,
Ping He
,
Xuhong Zhang
,
Peiyu Liu
,
Shouling Ji
,
Wenhai Wang
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
ESORICS (2)
(2023)
Peiyu Liu
,
Junming Liu
,
Lirong Fu
,
Kangjie Lu
,
Yifan Xia
,
Xuhong Zhang
,
Wenzhi Chen
,
Haiqin Weng
,
Shouling Ji
,
Wenhai Wang
How ChatGPT is Solving Vulnerability Management Problem.
CoRR
(2023)
Tong Ye
,
Lingfei Wu
,
Tengfei Ma
,
Xuhong Zhang
,
Yangkai Du
,
Peiyu Liu
,
Shouling Ji
,
Wenhai Wang
CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code.
CoRR
(2023)
Yifan Xia
,
Ping He
,
Xuhong Zhang
,
Peiyu Liu
,
Shouling Ji
,
Wenhai Wang
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
CoRR
(2023)
Tong Ye
,
Lingfei Wu
,
Tengfei Ma
,
Xuhong Zhang
,
Yangkai Du
,
Peiyu Liu
,
Wenhai Wang
,
Shouling Ji
Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization.
CoRR
(2023)
Peiyu Liu
,
Shouling Ji
,
Lirong Fu
,
Kangjie Lu
,
Xuhong Zhang
,
Jingchang Qin
,
Wenhai Wang
,
Wenzhi Chen
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
SP
(2023)
Tong Ye
,
Lingfei Wu
,
Tengfei Ma
,
Xuhong Zhang
,
Yangkai Du
,
Peiyu Liu
,
Shouling Ji
,
Wenhai Wang
CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code.
EMNLP
(2023)