


default search action
Jiongchi Yu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[c8]Xiaofei Yue, Fangming Zhao, Fulun Ye, Jiongchi Yu, Zhaoxuan Li, Tingting Li, Ziming Zhao, Jianwei Yin:
HeteroSim: Towards High-Fidelity Heterogeneous LLM Training Simulation on GPUs. WWW 2026: 5189-5197
[c7]Tingting Li, Ziming Zhao, Zhaoxuan Li, Xiaofei Yue, Jiongchi Yu:
Fair and Carbon-Aware LLM Routing for Web Services. WWW 2026: 9563-9571
[i11]Jiongchi Yu, Yuhan Ma, Xiaoyu Zhang, Junjie Wang, Qiang Hu, Chao Shen, Xiaofei Xie:
PTCBENCH: Benchmarking Contextual Stability of Personality Traits in LLM Systems. CoRR abs/2602.00016 (2026)
[i10]Jiongchi Yu, Xiaolin Wen, Sizhe Cheng, Xiaofei Xie, Qiang Hu, Yong Wang:
Human in the Loop for Fuzz Testing: Literature Review and the Road Ahead. CoRR abs/2603.13411 (2026)
[i9]Yu Li, Qiang Hu, Yao Zhang, Lili Quan, Jiongchi Yu, Junjie Wang:
DynaTrust: Defending Multi-Agent Systems Against Sleeper Agents via Dynamic Trust Graphs. CoRR abs/2603.15661 (2026)- 2025
[j6]Ziming Zhao
, Zhaoxuan Li
, Xiaofei Xie
, Zhipeng Liu, Tingting Li
, Jiongchi Yu
, Fan Zhang
, Binbin Chen
:
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection Against Multipath Routing. IEEE J. Sel. Areas Commun. 43(6): 2155-2171 (2025)
[j5]Jiongchi Yu
, Xiaofei Xie
, Qiang Hu
, Bowen Zhang
, Ziming Zhao
, Yun Lin
, Lei Ma
, Ruitao Feng
, Frank Liauw
:
CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift. Proc. ACM Softw. Eng. 2(FSE): 1687-1709 (2025)
[j4]Cheng Shi, Jiongchi Yu, Ziming Zhao, Jiongyi Chen, Fan Zhang:
CGIFuzz: Enabling Gray-Box Fuzzing for Web CGI of IoT Devices. IEEE Trans. Inf. Forensics Secur. 20: 10921-10936 (2025)
[c6]Jian Wang, Xiaofei Xie, Qiang Hu, Shangqing Liu, Jiongchi Yu, Jiaolong Kong, Yi Li:
Defects4C: Benchmarking Large Language Model Repair Capability with C/C++ Bugs. ASE 2025: 254-265
[c5]Ziming Zhao
, Zhuoxue Song
, Xiaofei Xie
, Zhaoxuan Li
, Jiongchi Yu
, Fan Zhang
, Tingting Li
:
Towards Context-Aware Traffic Classification via Time-Wavelet Fusion Network. KDD (1) 2025: 2089-2100
[i8]Jiongchi Yu, Xiaofei Xie, Qiang Hu, Bowen Zhang, Ziming Zhao, Yun Lin, Lei Ma, Ruitao Feng, Frank Liauw:
CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift. CoRR abs/2504.09115 (2025)
[i7]Weipeng Jiang, Xiaoyu Zhang, Xiaofei Xie, Jiongchi Yu, Yuhan Zhi, Shiqing Ma, Chao Shen:
The Foundation Cracks: A Comprehensive Study on Bugs and Testing Practices in LLM Libraries. CoRR abs/2506.12320 (2025)
[i6]Yujie Ma, Lili Quan
, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen:
Understanding the Supply Chain and Risks of Large Language Model Applications. CoRR abs/2507.18105 (2025)
[i5]Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao:
Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation. CoRR abs/2508.07745 (2025)
[i4]Keke Lian, Bin Wang, Lei Zhang, Libo Chen, Junjie Wang, Ziming Zhao, Yujiu Yang
, Haotong Duan, Haoran Zhao, Shuang Liao, Mingda Guo, Jiazheng Quan, Yilu Zhong, Chenhao He, Zichuan Chen, Jie Wu, Haoling Li, Zhaoxuan Li
, Jiongchi Yu, Hui Li, Dong Zhang:
A.S.E: A Repository-Level Benchmark for Evaluating Security in AI-Generated Code. CoRR abs/2508.18106 (2025)
[i3]Chengjia Wang, Lanling Tang, Ming Yuan, Jiongchi Yu, Xiaofei Xie, Jiajun Bu:
Leveraging LLM Agents for Automated Video Game Testing. CoRR abs/2509.22170 (2025)
[i2]Jiongchi Yu, Weipeng Jiang, Xiaoyu Zhang, Qiang Hu, Xiaofei Xie, Chao Shen:
AutoEmpirical: LLM-Based Automated Research for Empirical Software Fault Analysis. CoRR abs/2510.04997 (2025)
[i1]Jian Wang, Xiaofei Xie, Qiang Hu, Shangqing Liu, Jiongchi Yu, Jiaolong Kong, Yi Li:
Defects4C: Benchmarking Large Language Model Repair Capability with C/C++ Bugs. CoRR abs/2510.11059 (2025)- 2024
[j3]Ziming Zhao
, Zhaoxuan Li
, Zhihao Zhou
, Jiongchi Yu
, Zhuoxue Song
, Xiaofei Xie
, Fan Zhang
, Rui Zhang:
DDoS family: A novel perspective for massive types of DDoS attacks. Comput. Secur. 138: 103663 (2024)
[j2]Ziming Zhao
, Zhaoxuan Li
, Jiongchi Yu
, Fan Zhang
, Xiaofei Xie
, Haitao Xu
, Binbin Chen
:
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains. IEEE Trans. Mob. Comput. 23(5): 5589-5603 (2024)
[j1]Ziming Zhao
, Zhaoxuan Li
, Xiaofei Xie
, Jiongchi Yu
, Fan Zhang
, Rui Zhang
, Binbin Chen
, Xiangyang Luo
, Ming Hu
, Wenrui Ma
:
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic. IEEE/ACM Trans. Netw. 32(5): 3945-3960 (2024)
[c4]Xi Ling, Jiongchi Yu, Ziming Zhao
, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang:
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining. ACNS (2) 2024: 283-309
[c3]Jiongchi Yu
, Xiaofei Xie
, Cen Zhang
, Sen Chen
, Yuekang Li
, Wenbo Shen
:
Bugs in Pods: Understanding Bugs in Container Runtime Systems. ISSTA 2024: 1364-1376
[c2]Ziming Zhao
, Zhaoxuan Li
, Tingting Li
, Jiongchi Yu
, Fan Zhang
, Rui Zhang
:
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer. WWW (Companion Volume) 2024: 529-532- 2023
[c1]Jiongchi Yu
, Yuechen Wu, Xiaofei Xie
, Wei Le, Lei Ma, Yingfeng Chen, Jingyu Hu, Fan Zhang:
GameRTS: A Regression Testing Framework for Video Games. ICSE 2023: 1393-1404
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-17 01:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







