- Software Testing and Debugging Techniques
- Advanced Malware Detection Techniques
- Software Engineering Research
- Software Reliability and Analysis Research
- Security and Verification in Computing
- Web Application Security Vulnerabilities
- Parallel Computing and Optimization Techniques
- Network Security and Intrusion Detection
- DNA Repair Mechanisms
- Advanced Algorithms and Applications
- Software System Performance and Reliability
- Privacy-Preserving Technologies in Data
- Fuzzy Logic and Control Systems
- Neural Networks and Applications
- Distributed systems and fault tolerance
- Digital and Cyber Forensics
- Advanced Neural Network Applications
- Video Surveillance and Tracking Methods
- Image Enhancement Techniques
- Formal Methods in Verification
- Adversarial Robustness in Machine Learning
- Advanced Bandit Algorithms Research
- Spam and Phishing Detection
- Logic, programming, and type systems
- Game Theory and Applications
Shanghai University
2024
Institute of Information Engineering
2016-2024
Chinese Academy of Sciences
2012-2024
University of Chinese Academy of Sciences
2015-2024
Hong Kong University of Science and Technology
2024
University of Hong Kong
2024
State Grid Corporation of China (China)
2024
Harbin Engineering University
2006-2023
Anhui University
2023
Dalian University of Technology
2023
Non-homologous end joining (NHEJ) is a major pathway to repair DNA double-strand breaks (DSBs), which can display different types of broken ends. However, it unclear how NHEJ factors organize diverse breaks. Here, through systematic analysis the human factor interactome, we identify PAXX as direct interactor Ku. The crystal structure similar those XRCC4 and XLF. Importantly, PAXX-deficient cells are sensitive DSB-causing agents. Moreover, epistasis demonstrates that functions together with...
With the thriving of mobile app markets, third-party libraries are pervasively integrated in Android applications. Third-party provide functionality such as advertisements, location services, and social networking making multi-functional development much more productive. However, spread vulnerable or harmful may also hurt entire ecosystem, leading to various security problems. The platform suffers severely from problems due way its ecosystem is constructed maintained. Therefore, library...
Binary code similarity detection (BCSD) has many applications, including patch analysis, plagiarism detection, malware and vulnerability search etc. Existing solutions usually perform comparisons over specific syntactic features extracted from binary code, based on expert knowledge. They have either high performance overheads or low accuracy. Moreover, few are suitable for detecting similarities between cross-version binaries, which may not only diverge in structures but also slightly semantics.
Microglia play a pivotal role in clearance of Aβ by degrading them lysosomes, countering amyloid plaque pathogenesis Alzheimer's disease (AD). Recent evidence suggests that lysosomal dysfunction leads to insufficient elimination toxic protein aggregates. We tested whether enhancing function with transcription factor EB (TFEB), an essential regulator modulating pathways, would promote microglia. Here we show microglial expression TFEB facilitates fibrillar (fAβ) degradation and reduces...
We present a practical and scalable method for flow- context-sensitive (FSCS) pointer analysis C programs. Our analyzes the pointers in program level by terms of their points-to levels, allowing relations at particular to be discovered based on this higher levels. This level-by-level strategy can enhance scalability FSCS two fundamental ways, enabling (1) fast accurate flow-sensitive full sparse SSA form using flow-insensitive algorithm (2) transfer function meet each procedure.
A novel arginine-rich chitosan (CS) derivates mimicked cell penetration peptides; N-Arginine (N-Arg-CS) was prepared by two reaction methods involving activated L-arginine and the amine group on chitosan. FTIR spectra showed that arginine chemically coupled with CS. Elemental analysis estimated degrees of substitution (DS) in CS were 6%, 31.3% 61.5%, respectively. The drug adefovir chosen as model its permeation flux across excised mice skin investigated using a Franz diffusion cell. results...
The number of vulnerabilities increases rapidly in recent years, due to advances vulnerability discovery solutions. It enables a thorough analysis on the distribution and provides support for correlation prediction vulnerabilities. Previous research either focuses analyzing bugs rather than vulnerabilities, or only studies general among projects within each project. In this paper, we collected large dataset, consisting all known associated with five representative open source projects, by...
COTS software products are developed extensively on top of OSS projects, resulting in reuse vulnerabilities. To detect such vulnerabilities, finding reuses has become imperative. While scalable to tens thousands existing binary-to-source matching approaches severely imprecise analyzing products, since they support only a limited number code features, compute scores approximately measuring reuses, and neglect the structures projects. We introduce novel approach, called B2SFINDER <sup...
JavaScript engines have been shown prone to security vulnerabilities, which can lead serious consequences due their popularity. Fuzzing is an effective testing technique discover vulnerabilities. The main challenge of fuzzing generate syntactically and semantically valid inputs such that deep functionalities be explored. However, the dynamic nature special features different engines, it quite challenging meaningful test inputs.
The MRE11-RAD50-NBS1 (MRN) complex is well known for participating in DNA damage response pathways all phases of cell cycle. Here, we show that MRN constitutes a mitosis-specific complex, named mMRN, with protein, MMAP. MMAP directly interacts MRE11 and required optimal stability the during mitosis. colocalizes mitotic spindles, MMAP-deficient cells display abnormal spindle dynamics chromosome segregation similar to MRN-deficient cells. Mechanistically, both are hyperphosphorylated by...
SOHO (small office/home office) routers provide services for end devices to connect the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist these routers, especially web server modules, greatly endangering users. To discover vulnerabilities, fuzzing modules of is most popular solution. However, its effectiveness limited, due lack input specification, routers' internal running states, and testing environment recovery mechanisms....
Abstract Purpose Epithelial-to-mesenchymal transition (EMT) is an important cause of high mortality in breast cancer. Twist1 one the EMT transcription factors (EMT-TFs) with a noticeably short half-life, which regulated by proteasome degradation pathways. Recent studies have found that USP13 stabilizes several specific oncogenic proteins. As yet, however, relationship between and has not been investigated. Methods Co-Immunoprecipitation, GST-pulldown, Western blot, qRT-PCR immunofluorescence...
Deep learning (DL) applications are prevalent nowadays as they can help with multiple tasks. DL libraries essential for building applications. Furthermore, operators the important blocks of libraries, that compute multi-dimensional data (tensors). Therefore, bugs in have great impacts. Testing is a practical approach detecting operators. In order to test effectively, it cases pass input validity check and able reach core function logic Hence, extracting validation constraints required...
Discovering 1-day vulnerabilities in binary patches is worthwhile but challenging. One of the key difficulties lies generating inputs that could reach patched code snippet while making unpatched program crash. In this paper, we named it as a target-oriented input generation problem or ToIG for clarity. Existing solutions either suffer from path explosion may get stuck by complex checks. present new solution to improve efficiency which leverage combination distance-based directed fuzzing...
With the thriving of mobile app markets, third-party libraries are pervasively used in Android applications. The provide functionalities such as advertising, location, and social networking services, making development much more productive. However, spread vulnerable harmful can also hurt ecosystem, leading to various security problems. Therefore, library identification has emerged an important problem, being basis many applications repackaging detection, vulnerability identification,...
In this article, we propose a novel state-based fault-localization approach. Given an observed failure that is reproducible under the same program input, new approach uses two main techniques to reduce state exploration cost. Firstly, execution trace be analyzed for successively narrowed by making set of points in each step cut dynamic dependence graph. Such divides remaining into parts and, based on sparse symbolic outcome, one part removed from further exploration. This process continues...