- Software Testing and Debugging Techniques
- Advanced Malware Detection Techniques
- Software Engineering Research
- Radiation Detection and Scintillator Technologies
- Luminescence Properties of Advanced Materials
- Decision-Making and Behavioral Economics
- Advanced Semiconductor Detectors and Materials
- Software Reliability and Analysis Research
- Atomic and Subatomic Physics Research
- Water resources management and optimization
- Web Application Security Vulnerabilities
- Water-Energy-Food Nexus Studies
- Radiation Effects in Electronics
- Risk Perception and Management
- Climate Change Communication and Perception
- Software System Performance and Reliability
- Experimental Behavioral Economics Studies
- Psychology of Moral and Emotional Judgment
- Environmental Education and Sustainability
- Irrigation Practices and Water Management
Chinese University of Hong Kong
2021-2023
Nankai University
2023
Inner Mongolia University
2019
Abstract To what degree are Chinese citizens concerned about the seriousness of global warming and climate change (GWCC) key factors that shape their concern? Drawing theoretical insights from extant literature using recent data a national representative public survey (N = 3,748) provincial environmental economic statistics, this study, first its kind, examines variations determinants GWCC concern. Our show in China, compared to other countries, average concern is relatively low, varies...
Regular expression Denial-of-Service (ReDoS) is a class of algorithmic complexity attacks. Attackers can craft particular strings to trigger the worst-case super-linear matching time some vulnerable regular expressions (regex) with extended features that are commonly supported by popular programming languages. ReDoS attacks severely degrade performance web applications, which extensively employ regexes in their server-side logic. Nevertheless, characteristics remain understudied, making it...
Markdown compilers are widely used for translating plain text into formatted text, yet they suffer from performance bugs that cause degradation and resource exhaustion. Currently, there is little knowledge understanding about these in the wild. In this work, we first conduct a comprehensive study of known compilers. We identify ways handle language's context-sensitive features dominant root bugs. To detect unknown bugs, develop MdPerfFuzz, fuzzing framework with syntax-tree based mutation...
Traditional random mutation-based fuzzers are ineffective at reaching deep program states that require specific input values. Consequently, a large number of bugs remain undiscovered. To enhance the effectiveness mutation, previous research has utilized taint analysis to identify control-dependent critical bytes and only mutates those bytes. However, existing works do not consider indirect control dependencies, in which for taking one branch can be set basic block is dependent on series...
It is a common sense that an individual would feel disappointed when his work results overpass other team members while final reward determined by the poorest performance of group. One question raised: How people decide level their working effort in next period having experienced disappointing feeling previous one? In this study, we try to test two hypotheses potential impacts disappoint feeling: disappointment aversion and self-achievement. To do so, conducted laboratory experiment applying...
Algorithmic Complexity (AC) Denial-of-Service attacks have been a threat for over twenty years. Attackers craft particular input vectors to trigger the worst-case logic of some code running on server side, which leads high resource consumption and performance degradation. In response, several vulnerability detection tools developed help developers prevent such attacks. Nevertheless, these state-of-the-art either focus specific type or suffer from state explosion. They are limited small scope...