Ruishi Li

ORCID: 0000-0003-2513-1704
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Advanced Malware Detection Techniques
  • Water-Energy-Food Nexus Studies
  • Metallurgy and Material Forming
  • Environmental Impact and Sustainability
  • Web Application Security Vulnerabilities
  • Powder Metallurgy Techniques and Materials
  • Intracerebral and Subarachnoid Hemorrhage Research
  • Energy, Environment, Economic Growth
  • Mechanical Engineering and Vibrations Research
  • Software Testing and Debugging Techniques
  • Urban Transport and Accessibility
  • Botulinum Toxin and Related Neurological Disorders
  • Energy and Environment Impacts
  • Aluminum Alloy Microstructure Properties
  • Energy Harvesting in Wireless Networks
  • Climate Change Policy and Economics
  • Software Reliability and Analysis Research
  • Air Quality and Health Impacts
  • Social Acceptance of Renewable Energy
  • Security and Verification in Computing
  • Impact of Light on Environment and Health
  • Neurological Disease Mechanisms and Treatments
  • Microstructure and mechanical properties
  • Medical Research and Treatments

North China University of Water Resources and Electric Power
2022-2023

National University of Singapore
2023

Institute of Information Engineering
2020-2022

Chinese Academy of Sciences
2022

University of Chinese Academy of Sciences
2020

Tianjin University
2011

Rust aims to offer full memory safety for programs, a guarantee that untamed C programs do not enjoy. How difficult is it translate existing code Rust? To get complementary view from of automatic translators, we report on user study asking humans real-world Rust. Our participants are able produce safe translations, whereas state-of-the-art tools so. analysis highlights the high-level strategy taken by users departs significantly those study. We also find often choose zero-cost (static)...

10.14722/ndss.2025.241407 preprint EN 2025-01-01

To use library APIs, a developer is supposed to follow guidance and respect some constraints, which we call integration assumptions (IAs). Violations of these can have serious consequences, introducing security-critical flaws such as use-after-free, NULL-dereference, authentication errors. Analyzing program for compliance with IAs involves significant effort needs be automated. A promising direction automatically recover from document using Natural Language Processing (NLP) then verify their...

10.1145/3372297.3423360 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

The microstructure,composition and mechanical properties of cage-free caged chicken's humeral compact bones were systematically analyzed from the perspective material science.The bone microstructure was observed by scanning electron microscopy;the energy dispersive spectrometer analysis,X-ray diffraction(XRD) tests ashes calcined experiments used to discuss close relationship between organic inorganic components in bones;mechanics materials testing machine microhardness tester for measuring...

10.3724/sp.j.1260.2013.30005 article EN ACTA BIOPHYSICA SINICA 2013-01-01

The accumulation of buildings not only causes the consumption various resources, but also generates a large amount carbon emissions. Exploring impact accumulated building materials on emission is great significance for reduction and resource intensive utilization under neutrality. Based linear regression analysis method, coefficient method exploratory spatial data this paper estimated material stock at provincial scale according to nighttime light, visualize its emission, reflect...

10.2139/ssrn.4364207 article EN SSRN Electronic Journal 2023-01-01

Automated code translation between programming languages can greatly reduce the human effort needed in learning new or migrating code. Recent neural machine models, such as Codex, have been shown to be effective on many generation tasks including translation. However, produced by translators often has semantic mistakes. These mistakes are difficult eliminate from translator itself because is a black box, which interpret control compared rule-based transpilers. We propose first automated...

10.1145/3611643.3616322 article EN cc-by 2023-11-30

Abstract The C standard libraries are basic function standardized by the language. Programmers usually refer to their API documentation provided third-party websites. Unfortunately, these documents not necessarily complete or accurate, especially for constraint sentences of usage, which called Security Specifications (SSs). SS issues can prevent programmers from following obligatory constraints, results in misuse vulnerabilities. Previous work studying could only find certain types...

10.1186/s42400-022-00118-9 article EN cc-by Cybersecurity 2022-07-02
Coming Soon ...