Wei Huo

ORCID: 0009-0000-7121-1196
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Security and Verification in Computing
  • Web Application Security Vulnerabilities
  • Parallel Computing and Optimization Techniques
  • Network Security and Intrusion Detection
  • DNA Repair Mechanisms
  • Advanced Algorithms and Applications
  • Software System Performance and Reliability
  • Privacy-Preserving Technologies in Data
  • Fuzzy Logic and Control Systems
  • Neural Networks and Applications
  • Distributed systems and fault tolerance
  • Digital and Cyber Forensics
  • Advanced Neural Network Applications
  • Video Surveillance and Tracking Methods
  • Image Enhancement Techniques
  • Formal Methods in Verification
  • Adversarial Robustness in Machine Learning
  • Advanced Bandit Algorithms Research
  • Spam and Phishing Detection
  • Logic, programming, and type systems
  • Game Theory and Applications

Shanghai University
2024

Institute of Information Engineering
2016-2024

Chinese Academy of Sciences
2012-2024

University of Chinese Academy of Sciences
2015-2024

Hong Kong University of Science and Technology
2024

University of Hong Kong
2024

State Grid Corporation of China (China)
2024

Harbin Engineering University
2006-2023

Anhui University
2023

Dalian University of Technology
2023

Non-homologous end joining (NHEJ) is a major pathway to repair DNA double-strand breaks (DSBs), which can display different types of broken ends. However, it unclear how NHEJ factors organize diverse breaks. Here, through systematic analysis the human factor interactome, we identify PAXX as direct interactor Ku. The crystal structure similar those XRCC4 and XLF. Importantly, PAXX-deficient cells are sensitive DSB-causing agents. Moreover, epistasis demonstrates that functions together with...

10.1038/ncomms7233 article EN cc-by Nature Communications 2015-02-11

With the thriving of mobile app markets, third-party libraries are pervasively integrated in Android applications. Third-party provide functionality such as advertisements, location services, and social networking making multi-functional development much more productive. However, spread vulnerable or harmful may also hurt entire ecosystem, leading to various security problems. The platform suffers severely from problems due way its ecosystem is constructed maintained. Therefore, library...

10.1109/icse.2017.38 article EN 2017-05-01

Binary code similarity detection (BCSD) has many applications, including patch analysis, plagiarism detection, malware and vulnerability search etc. Existing solutions usually perform comparisons over specific syntactic features extracted from binary code, based on expert knowledge. They have either high performance overheads or low accuracy. Moreover, few are suitable for detecting similarities between cross-version binaries, which may not only diverge in structures but also slightly semantics.

10.1145/3238147.3238199 article EN 2018-08-20

Microglia play a pivotal role in clearance of Aβ by degrading them lysosomes, countering amyloid plaque pathogenesis Alzheimer's disease (AD). Recent evidence suggests that lysosomal dysfunction leads to insufficient elimination toxic protein aggregates. We tested whether enhancing function with transcription factor EB (TFEB), an essential regulator modulating pathways, would promote microglia. Here we show microglial expression TFEB facilitates fibrillar (fAβ) degradation and reduces...

10.1007/s13238-016-0269-2 article EN cc-by Protein & Cell 2016-05-21

We present a practical and scalable method for flow- context-sensitive (FSCS) pointer analysis C programs. Our analyzes the pointers in program level by terms of their points-to levels, allowing relations at particular to be discovered based on this higher levels. This level-by-level strategy can enhance scalability FSCS two fundamental ways, enabling (1) fast accurate flow-sensitive full sparse SSA form using flow-insensitive algorithm (2) transfer function meet each procedure.

10.1145/1772954.1772985 article EN 2010-04-24

A novel arginine-rich chitosan (CS) derivates mimicked cell penetration peptides; N-Arginine (N-Arg-CS) was prepared by two reaction methods involving activated L-arginine and the amine group on chitosan. FTIR spectra showed that arginine chemically coupled with CS. Elemental analysis estimated degrees of substitution (DS) in CS were 6%, 31.3% 61.5%, respectively. The drug adefovir chosen as model its permeation flux across excised mice skin investigated using a Franz diffusion cell. results...

10.3390/molecules16086778 article EN cc-by Molecules 2011-08-09

The number of vulnerabilities increases rapidly in recent years, due to advances vulnerability discovery solutions. It enables a thorough analysis on the distribution and provides support for correlation prediction vulnerabilities. Previous research either focuses analyzing bugs rather than vulnerabilities, or only studies general among projects within each project. In this paper, we collected large dataset, consisting all known associated with five representative open source projects, by...

10.1145/3377811.3380923 article EN 2020-06-27

COTS software products are developed extensively on top of OSS projects, resulting in reuse vulnerabilities. To detect such vulnerabilities, finding reuses has become imperative. While scalable to tens thousands existing binary-to-source matching approaches severely imprecise analyzing products, since they support only a limited number code features, compute scores approximately measuring reuses, and neglect the structures projects. We introduce novel approach, called B2SFINDER <sup...

10.1109/ase.2019.00100 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2019-11-01

JavaScript engines have been shown prone to security vulnerabilities, which can lead serious consequences due their popularity. Fuzzing is an effective testing technique discover vulnerabilities. The main challenge of fuzzing generate syntactically and semantically valid inputs such that deep functionalities be explored. However, the dynamic nature special features different engines, it quite challenging meaningful test inputs.

10.1145/3460120.3484823 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

The MRE11-RAD50-NBS1 (MRN) complex is well known for participating in DNA damage response pathways all phases of cell cycle. Here, we show that MRN constitutes a mitosis-specific complex, named mMRN, with protein, MMAP. MMAP directly interacts MRE11 and required optimal stability the during mitosis. colocalizes mitotic spindles, MMAP-deficient cells display abnormal spindle dynamics chromosome segregation similar to MRN-deficient cells. Mechanistically, both are hyperphosphorylated by...

10.1073/pnas.1806665115 article EN Proceedings of the National Academy of Sciences 2018-10-08

SOHO (small office/home office) routers provide services for end devices to connect the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist these routers, especially web server modules, greatly endangering users. To discover vulnerabilities, fuzzing modules of is most popular solution. However, its effectiveness limited, due lack input specification, routers' internal running states, and testing environment recovery mechanisms....

10.1145/3359789.3359826 article EN 2019-11-22

Abstract Purpose Epithelial-to-mesenchymal transition (EMT) is an important cause of high mortality in breast cancer. Twist1 one the EMT transcription factors (EMT-TFs) with a noticeably short half-life, which regulated by proteasome degradation pathways. Recent studies have found that USP13 stabilizes several specific oncogenic proteins. As yet, however, relationship between and has not been investigated. Methods Co-Immunoprecipitation, GST-pulldown, Western blot, qRT-PCR immunofluorescence...

10.1007/s13402-023-00779-9 article EN cc-by Cellular Oncology 2023-02-03

Deep learning (DL) applications are prevalent nowadays as they can help with multiple tasks. DL libraries essential for building applications. Furthermore, operators the important blocks of libraries, that compute multi-dimensional data (tensors). Therefore, bugs in have great impacts. Testing is a practical approach detecting operators. In order to test effectively, it cases pass input validity check and able reach core function logic Hence, extracting validation constraints required...

10.1145/3597926.3598088 preprint EN 2023-07-12

Discovering 1-day vulnerabilities in binary patches is worthwhile but challenging. One of the key difficulties lies generating inputs that could reach patched code snippet while making unpatched program crash. In this paper, we named it as a target-oriented input generation problem or ToIG for clarity. Existing solutions either suffer from path explosion may get stuck by complex checks. present new solution to improve efficiency which leverage combination distance-based directed fuzzing...

10.1109/dsn.2019.00066 article EN 2019-06-01

With the thriving of mobile app markets, third-party libraries are pervasively used in Android applications. The provide functionalities such as advertising, location, and social networking services, making development much more productive. However, spread vulnerable harmful can also hurt ecosystem, leading to various security problems. Therefore, library identification has emerged an important problem, being basis many applications repackaging detection, vulnerability identification,...

10.1109/tse.2018.2872958 article EN publisher-specific-oa IEEE Transactions on Software Engineering 2020-08-19

In this article, we propose a novel state-based fault-localization approach. Given an observed failure that is reproducible under the same program input, new approach uses two main techniques to reduce state exploration cost. Firstly, execution trace be analyzed for successively narrowed by making set of points in each step cut dynamic dependence graph. Such divides remaining into parts and, based on sparse symbolic outcome, one part removed from further exploration. This process continues...

10.1109/tse.2016.2632122 article EN publisher-specific-oa IEEE Transactions on Software Engineering 2016-11-23
Coming Soon ...