


default search action
Haijun Wang 0002
Person information
- affiliation: Xi'an Jiaotong University, Xi'an, China
Other persons with the same name
- Haijun Wang — disambiguation page
- Haijun Wang 0001
— Taizhou University, Taizhou, Zhejiang, China
- Haijun Wang 0003
— National University of Defense Technology, Changsha, Hunan, China
- Haijun Wang 0004
— Fintech Research Center, Zhejiang Lab, Hangzhou, China
- Haijun Wang 0005
— Binzhou University, Binzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j10]Ziqiao Kong
, Cen Zhang
, Maoyi Xie
, Ming Hu
, Yue Xue
, Ye Liu
, Haijun Wang
, Yang Liu
:
Smart Contract Fuzzing Towards Profitable Vulnerabilities. Proc. ACM Softw. Eng. 2(FSE): 153-175 (2025) - [d1]Ziqiao Kong
, Cen Zhang
, Maoyi Xie
, Ming Hu
, Yue Xue
, Ye Liu
, Haijun Wang
, Yang Liu
:
Materials of "Smart Contract Fuzzing Towards Profitable Vulnerabilities". Zenodo, 2025 - [i14]Jiali Wei, Ming Fan, Xicheng Zhang, Wenjing Jiao, Haijun Wang, Ting Liu:
Stealthy Backdoor Attack to Real-world Models in Android Apps. CoRR abs/2501.01263 (2025) - [i13]Ziqiao Kong, Cen Zhang, Maoyi Xie, Ming Hu, Yue Xue, Ye Liu, Haijun Wang, Yang Liu:
Smart Contract Fuzzing Towards Profitable Vulnerabilities. CoRR abs/2501.08834 (2025) - [i12]Hao Wu, Haijun Wang, Shangwang Li, Yin Wu, Ming Fan, Yitao Zhao, Ting Liu:
Detecting State Manipulation Vulnerabilities in Smart Contracts Using LLM and Static Analysis. CoRR abs/2506.08561 (2025) - [i11]Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu:
ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis. CoRR abs/2506.15790 (2025) - [i10]Hao Wu, Haijun Wang, Shangwang Li, Yin Wu, Ming Fan, Wuxia Jin, Yitao Zhao, Ting Liu:
RPHunter: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis. CoRR abs/2506.18398 (2025) - 2024
- [j9]Kaixuan Li
, Yue Xue
, Sen Chen
, Han Liu
, Kairan Sun
, Ming Hu
, Haijun Wang
, Yang Liu
, Yixiang Chen
:
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? Proc. ACM Softw. Eng. 1(FSE): 1447-1470 (2024) - [j8]Yinxing Xue
, Jiaming Ye
, Wei Zhang, Jun Sun
, Lei Ma, Haijun Wang, Jianjun Zhao
:
xFuzz: Machine Learning Guided Cross-Contract Fuzzing. IEEE Trans. Dependable Secur. Comput. 21(2): 515-529 (2024) - [j7]Jingwen Liu
, Wuxia Jin
, Junhui Zhou
, Qiong Feng
, Ming Fan
, Haijun Wang
, Ting Liu
:
3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency. IEEE Trans. Software Eng. 50(10): 2633-2655 (2024) - [j6]Yin Wang
, Ming Fan
, Junfeng Liu
, Junjie Tao
, Wuxia Jin
, Haijun Wang
, Qi Xiong
, Ting Liu
:
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. IEEE Trans. Software Eng. 50(12): 3225-3248 (2024) - [c26]Cong Wu
, Jing Chen
, Ziming Zhao
, Kun He
, Guowen Xu
, Yueming Wu
, Haijun Wang
, Hongwei Li
, Yang Liu
, Yang Xiang
:
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. CCS 2024: 956-970 - [c25]Yuqiang Sun
, Daoyuan Wu
, Yue Xue
, Han Liu
, Haijun Wang
, Zhengzi Xu
, Xiaofei Xie
, Yang Liu
:
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis. ICSE 2024: 166:1-166:13 - [c24]Ang Jia
, Ming Fan
, Xi Xu
, Wuxia Jin
, Haijun Wang
, Ting Liu
:
Cross-Inlining Binary Function Similarity Detection. ICSE 2024: 223:1-223:13 - [c23]Yi Hou, Wuxia Jin
, Zhijun Wang, Liuming Wang, Shuguang Chen, Yihan Wang
, Lei Sang, Haijun Wang, Ting Liu
:
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java. Internetware 2024 - [c22]Yin Wang
, Ming Fan
, Xicheng Zhang
, Jifei Shi
, Zhaoyu Qiu
, Haijun Wang
, Ting Liu
:
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication. Internetware 2024 - [c21]Jingyi Lei, Yi Wu, Nan Hu, Junjie Tao, Yin Wang, Haijun Wang, Ming Fan:
Dynamic Testing for Mobile Privacy Compliance. ISSRE (Workshops) 2024: 113-114 - [c20]Yin Wu, Haijun Wang, Yuanhui Zhang, Xitao Li, Hao Wu
, Ming Fan, Ting Liu:
Business Compliance Detection of Smart Contracts in Electricity and Carbon Trading Scenarios. ISSRE (Workshops) 2024: 177-178 - [c19]Maoyi Xie
, Ming Hu
, Ziqiao Kong
, Cen Zhang
, Yebo Feng
, Haijun Wang
, Yue Xue
, Hao Zhang
, Ye Liu
, Yang Liu
:
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications. ISSTA 2024: 402-414 - [c18]Yin Wu
, Xiaofei Xie
, Chenyang Peng, Dijun Liu
, Hao Wu
, Ming Fan, Ting Liu
, Haijun Wang:
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. ASE 2024: 1019-1031 - [c17]Haijun Wang, Yurui Hu, Hao Wu
, Dijun Liu
, Chenyang Peng, Yin Wu
, Ming Fan, Ting Liu
:
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. ASE 2024: 1570-1582 - [c16]Ming Fan, Jifei Shi
, Yin Wang
, Le Yu
, Xicheng Zhang, Haijun Wang, Wuxia Jin
, Ting Liu
:
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps. ASE 2024: 1595-1606 - [c15]Yin Wang
, Ming Fan, Hao Zhou
, Haijun Wang, Wuxia Jin
, Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang
, Deqiang Han, Ting Liu:
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs. ASE 2024: 1667-1679 - [c14]Han Liu, Daoyuan Wu, Yuqiang Sun, Haijun Wang, Kaixuan Li, Yang Liu, Yixiang Chen:
Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts. USENIX Security Symposium 2024 - [i9]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu:
Cross-Inlining Binary Function Similarity Detection. CoRR abs/2401.05739 (2024) - [i8]Kaixuan Li, Yue Xue, Sen Chen, Han Liu, Kairan Sun, Ming Hu, Haijun Wang, Yang Liu, Yixiang Chen:
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? CoRR abs/2404.18186 (2024) - [i7]Yu Wang, Shiwan Zhao, Zhihu Wang, Heyuan Huang, Ming Fan, Yubo Zhang, Zhixing Wang, Haijun Wang, Ting Liu:
Strategic Chain-of-Thought: Guiding Accurate Reasoning in LLMs through Strategy Elicitation. CoRR abs/2409.03271 (2024) - 2023
- [j5]Xi Xu
, Qinghua Zheng, Zheng Yan
, Ming Fan
, Ang Jia
, Zhaohui Zhou
, Haijun Wang
, Ting Liu
:
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. IEEE Trans. Software Eng. 49(12): 5279-5294 (2023) - [i6]Yuqiang Sun
, Daoyuan Wu, Yue Xue
, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie
, Yang Liu:
When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan. CoRR abs/2308.03314 (2023) - 2022
- [j4]Haijun Wang, Ye Liu
, Yi Li
, Shangwei Lin
, Cyrille Artho
, Lei Ma
, Yang Liu
:
Oracle-Supported Dynamic Exploit Generation for Smart Contracts. IEEE Trans. Dependable Secur. Comput. 19(3): 1795-1809 (2022) - [i5]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Qiyi Tang, Sen Nie, Shi Wu, Ting Liu:
Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining. CoRR abs/2210.15159 (2022) - 2021
- [j3]Haijun Wang, Yun Lin
, Zijiang Yang, Jun Sun, Yang Liu
, Jin Song Dong, Qinghua Zheng, Ting Liu
:
Explaining Regressions via Alignment Slicing and Mending. IEEE Trans. Software Eng. 47(11): 2421-2437 (2021) - [c13]Yuekang Li
, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie
, Haijun Wang, Yang Liu
:
Vall-nut: Principled Anti-Grey box - Fuzzing. ISSRE 2021: 288-299 - [i4]Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao:
Machine Learning Guided Cross-Contract Fuzzing. CoRR abs/2111.12423 (2021) - 2020
- [c12]Cheng Wen
, Haijun Wang, Yuekang Li
, Shengchao Qin
, Yang Liu
, Zhiwu Xu, Hongxu Chen, Xiaofei Xie
, Geguang Pu, Ting Liu:
MemLock: memory usage guided fuzzing. ICSE 2020: 765-777 - [c11]Haijun Wang, Xiaofei Xie
, Yi Li
, Cheng Wen
, Yuekang Li
, Yang Liu
, Shengchao Qin
, Hongxu Chen, Yulei Sui:
Typestate-guided fuzzer for discovering use-after-free vulnerabilities. ICSE 2020: 999-1010 - [c10]Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. USENIX Security Symposium 2020: 2325-2342 - [i3]Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. CoRR abs/2007.15943 (2020)
2010 – 2019
- 2019
- [c9]Haijun Wang, Yi Li
, Shang-Wei Lin
, Lei Ma, Yang Liu
:
Vultron: catching vulnerable smart contracts once and for all. ICSE (NIER) 2019: 1-4 - [c8]Xiaofei Xie
, Lei Ma, Haijun Wang, Yuekang Li
, Yang Liu
, Xiaohong Li:
DiffChaser: Detecting Disagreements for Deep Neural Networks. IJCAI 2019: 5772-5778 - [c7]Yuekang Li
, Yinxing Xue, Hongxu Chen, Xiuheng Wu, Cen Zhang, Xiaofei Xie
, Haijun Wang, Yang Liu
:
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection. ESEC/SIGSOFT FSE 2019: 533-544 - [c6]Haijun Wang, Xiaofei Xie
, Shang-Wei Lin
, Yun Lin, Yuekang Li
, Shengchao Qin, Yang Liu
, Ting Liu:
Locating vulnerabilities in binaries via memory layout recovering. ESEC/SIGSOFT FSE 2019: 718-728 - [i2]Haijun Wang, Yi Li, Shang-Wei Lin, Cyrille Artho, Lei Ma, Yang Liu:
Oracle-Supported Dynamic Exploit Generation for Smart Contracts. CoRR abs/1909.06605 (2019) - [i1]Yinxing Xue, Jiaming Ye, Mingliang Ma, Lei Ma, Yi Li, Haijun Wang, Yun Lin, Tianyong Peng, Yang Liu:
Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules. CoRR abs/1912.04466 (2019) - 2018
- [c5]Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai
, Haijun Wang, Jin Song Dong:
Break the dead end of dynamic slicing: localizing data and control omission bug. ASE 2018: 509-519 - 2017
- [j2]Haijun Wang, Ting Liu
, Xiaohong Guan, Chao Shen
, Qinghua Zheng, Zijiang Yang:
Dependence Guided Symbolic Execution. IEEE Trans. Software Eng. 43(3): 252-271 (2017) - 2016
- [c4]Chao Shen
, Haodi Xu, Haijun Wang, Xiaohong Guan:
Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis. Trustcom/BigDataSE/ISPA 2016: 1054-1060 - 2014
- [c3]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Chao Shen
, Zijiang Yang:
Directed test suite augmentation via exploiting program dependency. CSTVA 2014: 1-6 - [c2]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Xiangyang Li, Lechen Yu, Zijiang Yang:
Reducing Test Cases with Causality Partitions. SEKE 2014: 223-228 - [c1]Zhenzhou Tian, Qinghua Zheng, Ming Fan, Eryue Zhuang, Haijun Wang, Ting Liu:
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool. SEKE 2014: 740-741 - 2012
- [j1]Ting Liu, Zhiwen Wang, Haijun Wang, Ke Lu:
An Entropy-based Method for Attack Detection in Large Scale Network. Int. J. Comput. Commun. Control 7(3): 509-517 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-09-17 01:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint