Follow
susheng wu
susheng wu
Verified email at m.fudan.edu.cn
Title
Cited by
Cited by
Year
Demystifying dependency bugs in deep learning stack
K Huang, B Chen, S Wu, J Cao, L Ma, X Peng
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
152023
Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities
S Wu, W Song, K Huang, B Chen, X Peng
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
72024
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing
Z Zhou, Y Yang, S Wu, Y Huang, B Chen, X Peng
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
22024
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching
Y Huang, R Wang, W Zheng, Z Zhou, S Wu, S Ke, B Chen, S Gao, X Peng
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
22024
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities
S Wu, R Wang, K Huang, Y Cao, W Song, Z Zhou, Y Huang, B Chen, ...
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
12024
Lifting the Veil on the Large Language Model Supply Chain: Composition, Risks, and Mitigations
K Huang, B Chen, Y Lu, S Wu, D Wang, Y Huang, H Jiang, Z Zhou, J Cao, ...
arXiv preprint arXiv:2410.21218, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–6