default search action
Charles Zhang 0001
Person information
- affiliation: Hong Kong University of Science and Technology, Department of Computer Science and Engineering, Cybersecurity Laboratory, Hong Kong, China
Other persons with the same name
- Charles Zhang — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Peisen Yao, Jinguo Zhou, Xiao Xiao, Qingkai Shi, Rongxin Wu, Charles Zhang:
Falcon: A Fused Approach to Path-Sensitive Sparse Data Dependence Analysis. Proc. ACM Program. Lang. 8(PLDI): 567-592 (2024) - [j16]Chengpeng Wang, Jipeng Zhang, Rongxin Wu, Charles Zhang:
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization. Proc. ACM Softw. Eng. 1(FSE): 2469-2492 (2024) - [j15]Heqing Huang, Hung-Chun Chiu, Qingkai Shi, Peisen Yao, Charles Zhang:
Balance Seed Scheduling via Monte Carlo Planning. IEEE Trans. Dependable Secur. Comput. 21(3): 1469-1483 (2024) - [j14]Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. IEEE Trans. Inf. Forensics Secur. 19: 1357-1371 (2024) - [j13]Wensheng Tang, Dejun Dong, Shijie Li, Chengpeng Wang, Peisen Yao, Jinguo Zhou, Charles Chuan Zhang:
Octopus: Scaling Value-Flow Analysis via Parallel Collection of Realizable Path Conditions. ACM Trans. Softw. Eng. Methodol. 33(3): 66:1-66:33 (2024) - [j12]Anshunkang Zhou, Yikun Hu, Xiangzhe Xu, Charles Zhang:
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation. ACM Trans. Softw. Eng. Methodol. 33(4): 96:1-96:31 (2024) - [j11]Maryam Masoudian, Heqing Huang, Morteza Amini, Charles Zhang:
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events. IEEE Trans. Software Eng. 50(8): 2200-2218 (2024) - [c60]Hao Ling, Heqing Huang, Chengpeng Wang, Yuandao Cai, Charles Zhang:
GIANTSAN: Efficient Memory Sanitization with Segment Folding. ASPLOS (2) 2024: 433-449 - [c59]Bowen Zhang, Wei Chen, Peisen Yao, Chengpeng Wang, Wensheng Tang, Charles Zhang:
SIRO: Empowering Version Compatibility in Intermediate Representations via Program Synthesis. ASPLOS (3) 2024: 882-899 - [c58]Anshunkang Zhou, Chengfeng Ye, Heqing Huang, Yuandao Cai, Charles Zhang:
Plankton: Reconciling Binary Code and Debug Information. ASPLOS (2) 2024: 912-928 - [c57]Rongxin Wu, Yuxuan He, Jiafeng Huang, Chengpeng Wang, Wensheng Tang, Qingkai Shi, Xiao Xiao, Charles Zhang:
LibAlchemy: A Two-Layer Persistent Summary Design for Taming Third-Party Libraries in Static Bug-Finding Systems. ICSE 2024: 105:1-105:13 - [c56]Yiyuan Guo, Peisen Yao, Charles Zhang:
Precise Compositional Buffer Overflow Detection via Heap Disjointness. ISSTA 2024: 63-75 - [c55]Heqing Huang, Peisen Yao, Hung-Chun Chiu, Yiyuan Guo, Charles Zhang:
Titan : Efficient Multi-target Directed Greybox Fuzzing. SP 2024: 1849-1864 - [c54]Heqing Huang, Anshunkang Zhou, Mathias Payer, Charles Zhang:
Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference. SP 2024: 1956-1973 - [c53]Yuandao Cai, Yibo Jin, Charles Zhang:
Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information. USENIX Security Symposium 2024 - [c52]Chengfeng Ye, Yuandao Cai, Charles Zhang:
When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux. USENIX Security Symposium 2024 - 2023
- [j10]Yuandao Cai, Charles Zhang:
A Cocktail Approach to Practical Call Graph Construction. Proc. ACM Program. Lang. 7(OOPSLA2): 1001-1033 (2023) - [j9]Chengpeng Wang, Wenyang Wang, Peisen Yao, Qingkai Shi, Jinguo Zhou, Xiao Xiao, Charles Zhang:
Anchor: Fast and Precise Value-flow Analysis for Containers via Memory Orientation. ACM Trans. Softw. Eng. Methodol. 32(3): 66:1-66:39 (2023) - [c51]Chengpeng Wang, Peisen Yao, Wensheng Tang, Gang Fan, Charles Zhang:
Synthesizing Conjunctive Queries for Code Search. ECOOP 2023: 36:1-36:30 - [c50]Chengpeng Wang, Gang Fan, Peisen Yao, Fuxiong Pan, Charles Zhang:
Verifying Data Constraint Equivalence in FinTech Systems. ICSE 2023: 1329-1341 - [c49]Wensheng Tang, Chengpeng Wang, Peisen Yao, Rongxin Wu, Xianjin Fu, Gang Fan, Charles Zhang:
DCLINK: Bridging Data Constraint Changes and Implementations in FinTech Systems. ASE 2023: 914-925 - [c48]Zongyin Hao, Quanfeng Huang, Chengpeng Wang, Jianfeng Wang, Yushan Zhang, Rongxin Wu, Charles Zhang:
Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis. USENIX ATC 2023: 345-358 - [c47]Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang:
Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs. USENIX Security Symposium 2023: 3727-3744 - [i7]Chengpeng Wang, Gang Fan, Peisen Yao, Fuxiong Pan, Charles Zhang:
Verifying Data Constraint Equivalence in FinTech Systems. CoRR abs/2301.11011 (2023) - [i6]Chengpeng Wang, Peisen Yao, Wensheng Tang, Gang Fan, Charles Zhang:
Synthesizing Conjunctive Queries for Code Search. CoRR abs/2305.04316 (2023) - 2022
- [j8]Chengpeng Wang, Peisen Yao, Wensheng Tang, Qingkai Shi, Charles Zhang:
Complexity-guided container replacement synthesis. Proc. ACM Program. Lang. 6(OOPSLA1): 1-31 (2022) - [j7]Qingkai Shi, Yongchao Wang, Peisen Yao, Charles Zhang:
Indexing the extended Dyck-CFL reachability for context-sensitive program analysis. Proc. ACM Program. Lang. 6(OOPSLA2): 1438-1468 (2022) - [c46]Yiyuan Guo, Jinguo Zhou, Peisen Yao, Qingkai Shi, Charles Zhang:
Precise Divide-By-Zero Detection with Affirmative Evidence. ICSE 2022: 1718-1729 - [c45]Rongxin Wu, Minglei Chen, Chengpeng Wang, Gang Fan, Jiguang Qiu, Charles Zhang:
Accelerating Build Dependency Error Detection via Virtual Build. ASE 2022: 5:1-5:12 - [c44]Yuandao Cai, Chengfeng Ye, Qingkai Shi, Charles Zhang:
Peahen: fast and precise static deadlock detection via context reduction. ESEC/SIGSOFT FSE 2022: 784-796 - [c43]Heqing Huang, Yiyuan Guo, Qingkai Shi, Peisen Yao, Rongxin Wu, Charles Zhang:
BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning. SP 2022: 36-50 - [c42]Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense. SP 2022: 1558-1573 - 2021
- [j6]Peisen Yao, Qingkai Shi, Heqing Huang, Charles Zhang:
Program analysis via efficient symbolic abstraction. Proc. ACM Program. Lang. 5(OOPSLA): 1-32 (2021) - [c41]Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang:
Fuzzing SMT solvers via two-dimensional input space exploration. ISSTA 2021: 322-335 - [c40]Wensheng Tang, Yikun Hu, Gang Fan, Peisen Yao, Rongxin Wu, Guangyuan Bai, Pengcheng Wang, Charles Zhang:
Transcode: Detecting Status Code Mapping Errors in Large-Scale Systems. ASE 2021: 829-841 - [c39]Qingkai Shi, Peisen Yao, Rongxin Wu, Charles Zhang:
Path-sensitive sparse analysis without path conditions. PLDI 2021: 930-943 - [c38]Yuandao Cai, Peisen Yao, Charles Zhang:
Canary: practical static detection of inter-thread value-flow bugs. PLDI 2021: 1126-1140 - [c37]Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang:
Skeletal approximation enumeration for SMT solver testing. ESEC/SIGSOFT FSE 2021: 1141-1153 - [i5]Yushan Zhang, Peisen Yao, Rongxin Wu, Charles Zhang:
Duplicate-sensitivity Guided Transformation Synthesis for DBMS Correctness Bug Detection. CoRR abs/2107.03660 (2021) - [i4]Qingkai Shi, Yongchao Wang, Charles Zhang:
Indexing Context-Sensitive Reachability. CoRR abs/2109.01321 (2021) - [i3]Peisen Yao, Jinguo Zhou, Xiao Xiao, Qingkai Shi, Rongxin Wu, Charles Zhang:
Efficient Path-Sensitive Data-Dependence Analysis. CoRR abs/2109.07923 (2021) - [i2]Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
WFDefProxy: Modularly Implementing and Empirically Evaluating Website Fingerprinting Defenses. CoRR abs/2111.12629 (2021) - 2020
- [c36]Qingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang:
Conquering the extensional scalability problem for value-flow analysis frameworks. ICSE 2020: 812-823 - [c35]Qingkai Shi, Charles Zhang:
Pipelining bottom-up data flow analysis. ICSE 2020: 835-847 - [c34]Peisen Yao, Qingkai Shi, Heqing Huang, Charles Zhang:
Fast bit-vector satisfiability. ISSTA 2020: 38-50 - [c33]Gang Fan, Chengpeng Wang, Rongxin Wu, Xiao Xiao, Qingkai Shi, Charles Zhang:
Escaping dependency hell: finding build dependency errors with the unified dependency graph. ISSTA 2020: 463-474 - [c32]Heqing Huang, Peisen Yao, Rongxin Wu, Qingkai Shi, Charles Zhang:
Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction. SP 2020: 1613-1627
2010 – 2019
- 2019
- [c31]Gang Fan, Rongxin Wu, Qingkai Shi, Xiao Xiao, Jinguo Zhou, Charles Zhang:
Smoke: scalable path-sensitive memory leak detection for millions of lines of code. ICSE 2019: 72-82 - [i1]Qingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang:
Conquering the Extensional Scalability Problem for Value-Flow Analysis Frameworks. CoRR abs/1912.06878 (2019) - 2018
- [c30]Qingkai Shi, Xiao Xiao, Rongxin Wu, Jinguo Zhou, Gang Fan, Charles Zhang:
Pinpoint: fast and precise sparse value flow analysis for million lines of code. PLDI 2018: 693-706 - 2016
- [j5]Jeff Huang, Charles Zhang:
Debugging Concurrent Software: Advances and Challenges. J. Comput. Sci. Technol. 31(5): 861-868 (2016) - [c29]Rongxin Wu, Xiao Xiao, Shing-Chi Cheung, Hongyu Zhang, Charles Zhang:
Casper: an efficient approach to call trace collection. POPL 2016: 678-690 - [e2]Charles Zhang, Xavier Rival:
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP@PLDI 2016, Santa Barbara, CA, USA, June 14, 2016. ACM 2016, ISBN 978-1-4503-4385-5 [contents] - 2015
- [c28]Xiao Xiao, Shi Han, Charles Zhang, Dongmei Zhang:
Uncovering JavaScript Performance Code Smells Relevant to Type Mutations. APLAS 2015: 335-355 - [c27]Valerio Terragni, Shing-Chi Cheung, Charles Zhang:
RECONTEST: Effective Regression Testing of Concurrent Programs. ICSE (1) 2015: 246-256 - 2014
- [c26]Peng Liu, Charles Zhang:
Unleashing concurrency for irregular data structures. ICSE 2014: 480-490 - [c25]Qirun Zhang, Xiao Xiao, Charles Zhang, Hao Yuan, Zhendong Su:
Efficient subcubic alias analysis for C. OOPSLA 2014: 829-845 - [c24]Xiao Xiao, Qirun Zhang, Jinguo Zhou, Charles Zhang:
Persistent pointer information. PLDI 2014: 463-474 - [c23]Peng Liu, Omer Tripp, Charles Zhang:
Grail: context-aware fixing of concurrency bugs. SIGSOFT FSE 2014: 318-329 - [e1]Hong Mei, Jian Lv, Minghui Zhou, Charles Zhang:
Proceedings of the 6th Asia-Pacific Symposium on Internetware, Internetware 2014, Hong Kong, China, November 17, 2014. ACM 2014, ISBN 978-1-4503-3303-0 [contents] - 2013
- [j4]Jeff Huang, Jinguo Zhou, Charles Zhang:
Scaling predictive analysis of concurrent programs by removing trace redundancy. ACM Trans. Softw. Eng. Methodol. 22(1): 8:1-8:21 (2013) - [c22]Jeff Huang, Charles Zhang, Julian Dolby:
CLAP: recording local executions to reproduce concurrency failures. PLDI 2013: 141-152 - [c21]Peng Liu, Julian Dolby, Charles Zhang:
Finding incorrect compositions of atomicity. ESEC/SIGSOFT FSE 2013: 158-168 - 2012
- [j3]Peng Liu, Charles Zhang:
Pert: The Application-Aware Tailoring of Java Object Persistence. IEEE Trans. Software Eng. 38(4): 909-922 (2012) - [j2]Charles Zhang, Hans-Arno Jacobsen:
Mining Crosscutting Concerns through Random Walks. IEEE Trans. Software Eng. 38(5): 1123-1137 (2012) - [c20]Peng Liu, Charles Zhang:
Axis: Automatically fixing atomicity violations through solving control constraints. ICSE 2012: 299-309 - [c19]Jinguo Zhou, Xiao Xiao, Charles Zhang:
Stride: Search-based deterministic replay in polynomial time via bounded linkage. ICSE 2012: 892-902 - [c18]Jeff Huang, Charles Zhang:
LEAN: simplifying concurrency bug reproduction via replay-supported execution reduction. OOPSLA 2012: 451-466 - [c17]Jeff Huang, Charles Zhang:
Execution privatization for scheduler-oblivious concurrent programs. OOPSLA 2012: 737-752 - 2011
- [c16]Xiao Xiao, Jinguo Zhou, Charles Zhang:
Tracking data structures for postmortem analysis. ICSE 2011: 896-899 - [c15]Jeff Huang, Charles Zhang:
Persuasive prediction of concurrency access anomalies. ISSTA 2011: 144-154 - [c14]Xiao Xiao, Charles Zhang:
Geometric encoding: forging the high performance context sensitive points-to analysis for Java. ISSTA 2011: 188-198 - [c13]Jeff Huang, Charles Zhang:
An Efficient Static Trace Simplification Technique for Debugging Concurrent Programs. SAS 2011: 163-179 - 2010
- [c12]Wei Li, Charles Zhang, Songlin Hu:
G-Finder: routing programming questions closer to the experts. OOPSLA 2010: 62-73 - [c11]Jeff Huang, Peng Liu, Charles Zhang:
LEAP: lightweight deterministic multi-processor replay of concurrent java programs. SIGSOFT FSE 2010: 207-216 - [c10]Jeff Huang, Peng Liu, Charles Zhang:
LEAP: lightweight deterministic multi-processor replay of concurrent java programs. SIGSOFT FSE 2010: 385-386
2000 – 2009
- 2009
- [c9]Charles Zhang:
FlexSync: An aspect-oriented approach to Java synchronization. ICSE 2009: 375-385 - 2008
- [c8]Charles Zhang, Hans-Arno Jacobsen:
Externalizing Java Server Concurrency with CAL. ECOOP 2008: 362-386 - 2007
- [c7]Charles Zhang, Hans-Arno Jacobsen:
Efficiently mining crosscutting concerns through random walks. AOSD 2007: 226-238 - 2005
- [c6]Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen:
Towards just-in-time middleware architectures. AOSD 2005: 63-74 - [c5]Charles Zhang, Dapeng Gao, Hans-Arno Jacobsen:
Generic Middleware Substrate Through Modelware. Middleware 2005: 314-333 - 2004
- [c4]Charles Zhang, Hans-Arno Jacobsen:
PRISM is research in aSpect mining. OOPSLA Companion 2004: 20-21 - [c3]Charles Zhang, Hans-Arno Jacobsen:
Resolving feature convolution in middleware systems. OOPSLA 2004: 188-205 - 2003
- [j1]Charles Zhang, Hans-Arno Jacobsen:
Refactoring Middleware with Aspects. IEEE Trans. Parallel Distributed Syst. 14(11): 1058-1073 (2003) - [c2]Charles Zhang, Hans-Arno Jacobsen:
Quantifying aspects in middleware platforms. AOSD 2003: 130-139 - [c1]Charles Zhang, Hans-Arno Jacobsen:
Re-factoring Middleware Systems: A Case Study. OTM 2003: 1243-1262
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint