Search Results for author: W. K. Chan

Found 5 papers, 4 papers with code

A study on the impact of pre-trained model on Just-In-Time defect prediction

1 code implementation5 Sep 2023 Yuxiang Guo, Xiaopeng Gao, Zhenyu Zhang, W. K. Chan, Bo Jiang

These findings emphasize the effectiveness of transformer-based pre-trained models in JIT defect prediction tasks, especially in scenarios with limited training data.

Defect Detection

A Majority Invariant Approach to Patch Robustness Certification for Deep Learning Models

1 code implementation1 Aug 2023 Qilin Zhou, Zhengyuan Wei, Haipeng Wang, W. K. Chan

Patch robustness certification ensures no patch within a given bound on a sample can manipulate a deep learning model to predict a different label.

WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection

1 code implementation30 Jul 2020 Dong Wang, Bo Jiang, W. K. Chan

Furthermore, WANA proposes a set of test oracles to detect the vulnerabilities in EOSIO and Ethereum smart contracts based on WebAssembly bytecode analysis.

Software Engineering D.2.5

EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection

1 code implementation29 Jul 2020 Yuhe Huang, Bo Jiang, W. K. Chan

Our fuzzing experiment on 3963 EOSIO smart contracts shows that EOSFuzzer is both effective and efficient to detect EOSIO smart contract vulnerabilities with high accuracy.

Software Engineering D.2.5

ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection

no code implementations11 Jul 2018 Bo Jiang, Ye Liu, W. K. Chan

Decentralized cryptocurrencies feature the use of blockchain to transfer values among peers on networks without central agency.

Software Engineering Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.