Yuwei Li

ORCID: 0000-0002-8878-510X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Software Testing and Debugging Techniques
  • Software Engineering Research
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Software Reliability and Analysis Research
  • Security and Verification in Computing
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Geochemistry and Geologic Mapping
  • Web Application Security Vulnerabilities
  • Advanced Computational Techniques and Applications
  • Distributed and Parallel Computing Systems
  • Optimization and Variational Analysis
  • Computational Drug Discovery Methods
  • Wireless Networks and Protocols
  • Image and Video Quality Assessment
  • IPv6, Mobility, Handover, Networks, Security
  • Quantum Information and Cryptography
  • Cloud Data Security Solutions
  • Innovation in Digital Healthcare Systems
  • Recommender Systems and Techniques
  • Advanced Algorithms and Applications
  • Advanced Steganography and Watermarking Techniques
  • Mineral Processing and Grinding

National University of Defense Technology
2021-2024

University of Electronic Science and Technology of China
2024

Zhejiang University of Science and Technology
2020-2023

Anhui University
2021-2023

Shanghai Jiao Tong University
2019-2022

Huawei Technologies (China)
2022

South China Agricultural University
2022

Dalian University of Technology
2020

Zhejiang University
2020

Compliment Corporation (United States)
2017

With the popularity of mobile devices and development computationally intensive applications, researchers are focusing on offloading computation to Mobile Edge Computing (MEC) server due its high computational efficiency low communication delay. As computing resources an MEC limited, vehicles in urban area who have abundant idle should be fully utilized. However, tasks faces many challenging issues. In this paper, we introduce a vehicular fog-edge paradigm formulate it as multi-stage...

10.1109/jiot.2022.3150955 article EN IEEE Internet of Things Journal 2022-02-12

Fuzzing is a technique of finding bugs by executing target program recurrently with large number abnormal inputs. Most the coverage-based fuzzers consider all parts equally and pay too much attention to how improve code coverage. It inefficient as vulnerable only takes tiny fraction entire code. In this article, we design implement an evolutionary fuzzing framework called V-Fuzz, which aims find efficiently quickly in limited time for binary programs. V-Fuzz consists two main components: 1)...

10.1109/tcyb.2020.3013675 article EN IEEE Transactions on Cybernetics 2020-09-18

Fuzzing is a technique of finding bugs by executing software recurrently with large number abnormal inputs. Most the existing fuzzers consider all parts equally, and pay too much attention on how to improve code coverage. It inefficient as vulnerable only takes tiny fraction entire code. In this paper, we design implement vulnerability-oriented evolutionary fuzzing prototype named V-Fuzz, which aims find efficiently quickly in limited time. V-Fuzz consists two main components: neural...

10.48550/arxiv.1901.01142 preprint EN other-oa arXiv (Cornell University) 2019-01-01

A flurry of fuzzing tools (fuzzers) have been proposed in the literature, aiming at detecting software vulnerabilities effectively and efficiently. To date, it is however still challenging to compare fuzzers due inconsistency benchmarks, performance metrics, and/or environments for evaluation, which buries useful insights thus impedes discovery promising primitives. In this paper, we design develop UNIFUZZ, an open-source metrics-driven platform assessing a comprehensive quantitative manner....

10.48550/arxiv.2010.01785 preprint EN other-oa arXiv (Cornell University) 2020-01-01

The centralization of the global DNS ecosystem may accelerate creation an oligopoly market, thereby, increasing risk a single point failure and network traffic manipulation. Earlier studies have revealed level in terms market share public services seen by major CDN providers. However, infrastructure Ecosystem is not well understood. In this paper, we present novel lightweight measurement approach that effectively discovers resolver pools from probing point. We conduct Internet-wide active on...

10.3390/app13095739 article EN cc-by Applied Sciences 2023-05-06

Internet users have suffered from phishing attacks for a long time. Attackers deceive through malicious constructed websites to steal sensitive information, such as bank account numbers, website usernames, and passwords. In recent years, many detection solutions been proposed, which mainly leverage whitelists or blacklists, content, side channel-based techniques. However, with the continuous improvement of technology, current methods difficulty in achieving effective detection. Hence, this...

10.3390/app11209733 article EN cc-by Applied Sciences 2021-10-18

gVisor is a Google-published application-level kernel for containers. As lightweight and has sound isolation, it been widely used in many IT enterprises [1],[2],[3]. When new vulnerability of the upstream found, important downstream developers to test corresponding code maintain security. To achieve this aim, directed fuzzing promising. Nevertheless, there are challenges applying existing methods gVisor. The core reason that fuzzers mainly general C/C++ applications, while an OS written Go...

10.1109/tdsc.2023.3244825 article EN IEEE Transactions on Dependable and Secure Computing 2023-02-22

With the development of smart vehicles and computation-intensive vehicular applications, it is a challenge to maintain high performance for with scarce local computational resources. Mobile Edge Computing (MEC) computing paradigm potential improve services by offloading tasks MEC servers. However, as resources servers are limited, parking lots (PLs) having abundant idle should be utilized. We introduce new paradigm, named Vehicular Parked-Edge (VPEC). formulate three-stage...

10.1109/vtcspring.2019.8746454 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2019-04-01

Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable (UEFU) pose severe security risks to web servers. For instance, attackers can leverage such vulnerabilities execute arbitrary code gain the control of a whole server. Therefore, it is significant develop effective and efficient methods detect UFU UEFU vulnerabilities. Towards this, most state-of-the-art are designed based on dynamic testing. Nevertheless, they still entail two critical limitations. 1) They...

10.1109/tifs.2023.3335885 article EN IEEE Transactions on Information Forensics and Security 2023-11-21

Domain science experts are commonly limited by computational efficiency of their code and hardware resources available for execution desired simulations. Here, we detail a collaboration between domain scientists focused on simulating an ensemble climate human management decisions to drive environmental (e.g., water quality) economic crop yield) outcomes. Briefly, the developed message passing interface execute formerly serial across number processors, anticipating significant performance...

10.1145/3093338.3093381 article EN 2017-07-05

10.1007/s11433-016-0158-4 article EN Science China Physics Mechanics and Astronomy 2016-07-25

This paper presents a novel multi-dimensional asymmetric game model for network attack–defense decision-making, called “Catch the Cyber Thief”. The is built upon concept of partially observable stochastic games (POSG) and designed to systematically incorporate asymmetry into problems. attack agent “thief” who wants control key host by exploring unfamiliar environment, defense “police” needs catch opponent before its goal accomplished. results indicate that not only influenced strategies but...

10.3390/app14209234 article EN cc-by Applied Sciences 2024-10-11

This paper considers a bilevel program, which has many applications in practice. To develop effective numerical algorithms, it is generally necessary to transform the program into single-level optimization problem. The most popular approach replace lower-level by its KKT conditions and then can be reformulated as mathematical with equilibrium constraints (MPEC for short). However, since MPEC does not satisfy Mangasarian-Fromovitz constraint qualification at any feasible point, well-developed...

10.48550/arxiv.2302.06838 preprint EN cc-by-sa arXiv (Cornell University) 2023-01-01

Abstract Directed greybox fuzzing (DGF) is an effective method to detect vulnerabilities of the specified target code. Nevertheless, there are three main issues in existing DGFs. First, vulnerable code DGFs needs be manually selected, which tedious. Second, mainly leverage distance information as feedback, neglects unequal roles different snippets reaching targets. Third, most need source test programs, not available for binary programs. In this paper, we propose a vulnerability-oriented...

10.1038/s41598-022-07355-5 article EN cc-by Scientific Reports 2022-03-11
Coming Soon ...