Dr Xiaogang Zhu
Lecturer
School of Computer Science and Information Technology
College of Engineering and Information Technology
Eligible to supervise Masters and PhD - email supervisor to discuss availability.
Sean (Xiaogang) Zhu is currently a Lecturer focusing on software testing. He is interested in Fuzzing and other detection techniques. He has published papers on top-tier venues, such as S&P, NDSS, CCS, USENIX, ICSE, ASE, AAAI, TDSC, TIFS and CSUR. Contact me to discuss PhD opportunities.
| Date | Type | Title | Institution Name | Country | Amount |
|---|---|---|---|---|---|
| 2025 | Award | ACM SIGSOFT Distinguished Paper | 40th IEEE/ACM International Conference on Automated Software Engineering (ASE 2025) | Korea, Republic of | - |
| Year | Citation |
|---|---|
| 2025 | Li, N., Qi, M., Xu, Z., Zhu, X., Zhou, W., Wen, S., & Xiang, Y. (2025). Blockchain Cross-Chain Bridge Security: Challenges, Solutions, and Future Outlook. Distributed Ledger Technologies: Research and Practice, 4(1), 1-34. Scopus9 |
| 2025 | Zhu, X., Zhou, W., Han, Q. -L., Ma, W., Wen, S., & Xiang, Y. (2025). When Software Security Meets Large Language Models: A Survey. IEEE/CAA Journal of Automatica Sinica, 12(2), 317-334. Scopus42 WoS35 |
| 2025 | Sheng, C., Zhou, W., Han, Q. -L., Ma, W., Zhu, X., Wen, S., & Xiang, Y. (2025). Network Traffic Fingerprinting for IIoT Device Identification: A Survey. IEEE Transactions on Industrial Informatics, 21(5), 1-14. Scopus30 WoS31 |
| 2025 | Dong, R., Tong, F., Huang, H., Zhu, X., Xiao, X., Wang, S., . . . Xiang, Y. (2025). One Mutation Fits All: Exploring Universal Library Fuzzing based on Exogenous Mutation. IEEE Transactions on Dependable and Secure Computing, 22(6), 1-12. |
| 2025 | Deng, Z., Ma, W., Han, Q. L., Zhou, W., Zhu, X., Wen, S., & Xiang, Y. (2025). Exploring DeepSeek: A Survey on Advances, Applications, Challenges and Future Directions. IEEE/CAA Journal of Automatica Sinica, 12(5), 872-893. Scopus28 WoS24 |
| 2024 | Ye, K., Zhu, X., Xiao, X., Wen, S., Xue, M., & Xiang, Y. (2024). BazzAFL: Moving Fuzzing Campaigns Towards Bugs Via Grouping Bug-Oriented Seeds. IEEE Transactions on Dependable and Secure Computing, 22(1), 179-191. |
| 2024 | Tang, L., Wu, T., Chen, X., Wen, S., Zhou, W., Zhu, X., & Xiang, Y. (2024). How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse. Connection Science, 36(1), 31 pages. Scopus4 WoS2 |
| 2024 | Sheng, C., Ma, W., Han, Q. -L., Zhou, W., Zhu, X., Wen, S., . . . Wang, F. -Y. (2024). Pager Explosion: Cybersecurity Insights and Afterthoughts. IEEE/CAA Journal of Automatica Sinica, 11(12), 2359-2362. Scopus7 WoS7 |
| 2024 | Zhou, W., Zhu, X., Han, Q. L., Li, L., Chen, X., Wen, S., & Xiang, Y. (2024). The security of using large language models: A survey with emphasis on ChatGPT. IEEE/CAA Journal of Automatica Sinica, 12(1), 1-26. Scopus41 WoS36 |
| 2024 | Zhu, X., Zhang, S., Li, C., Wen, S., & Xiang, Y. (2024). Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. IEEE Transactions on Information Forensics and Security, 19, 3733-3744. Scopus3 WoS3 |
| 2023 | Peng, Z., Zhou, W., Zhu, X., Wu, Y., & Wen, S. (2023). On the security of fully homomorphic encryption for data privacy in Internet of Things. Concurrency and Computation: Practice and Experience, 35(19), 10 pages. Scopus6 WoS7 |
| 2023 | Feng, X., Zhu, X., Han, Q. L., Zhou, W., Wen, S., & Xiang, Y. (2023). Detecting Vulnerability on IoT Device Firmware: A Survey. IEEE/CAA Journal of Automatica Sinica, 10(1), 25-41. Scopus137 WoS107 |
| 2022 | Zhu, X., Wen, S., Camtepe, S., & Xiang, Y. (2022). Fuzzing: A Survey for Roadmap. ACM Computing Surveys, 54(11s), 230-1-230-36. Scopus262 WoS199 |
| 2022 | Zhu, X., Wen, S., Jolfaei, A., Haghighi, M. S., Camtepe, S., & Xiang, Y. (2022). Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. IEEE Transactions on Network Science and Engineering, 9(3), 970-979. Scopus7 WoS7 |
| 2022 | Zhu, X., Feng, X., Meng, X., Wen, S., Camtepe, S., Xiang, Y., & Ren, K. (2022). CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Transactions on Dependable and Secure Computing, 19(2), 912-923. Scopus19 WoS14 |
| 2022 | Li, H., He, D., Zhu, X., & Chan, S. (2022). P1OVD: Patch-Based 1-Day Out-of-Bounds Vulnerabilities Detection Tool for Downstream Binaries. Electronics (Switzerland), 11(2), 260. Scopus2 WoS2 |
| Year | Citation |
|---|---|
| 2025 | Guo, Y., Ma, W., Xiao, X., Wen, S., Di, P., & Zhu, X. (2025). Patch the Leak: Strengthening CodeLLMs Against Privacy Extraction Threats. In Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis (pp. 195-199). Trondheim, Norway: ACM. DOI |
| 2025 | Han, C., Deng, Z., Ma, W., Zhu, X., Xue, M., Zhu, T., . . . Xiang, Y. (2025). Codebreaker: Dynamic Extraction Attacks on Code Language Models. In Proceedings IEEE Symposium on Security and Privacy (pp. 559-575). San Francisco, CA, USA: IEEE. DOI |
| 2025 | Zhang, K., Wang, S., Han, J., Zhu, X., Li, X., Wang, S., & Wen, S. (2025). Your Fix Is My Exploit: Enabling Comprehensive DL Library API Fuzzing with Large Language Models. In Proceedings International Conference on Software Engineering (pp. 3110-3122). Ottawa, ON, Canada: IEEE. DOI Scopus1 WoS1 |
| 2025 | Su, K., Wu, Q., Cai, P., Zhu, X., Lu, X., Wang, Z., & Hu, K. (2025). RI-MAE: Rotation-Invariant Masked AutoEncoders for Self-Supervised Point Cloud Representation Learning. In Proceedings of the AAAI Conference on Artificial Intelligence Vol. 39 (pp. 7015-7023). Philadelphia, USA: Association for the Advancement of Artificial Intelligence. DOI Scopus2 WoS3 |
| 2024 | Liu, S., Wang, L., Zhu, X., Lu, X., Wang, Z., & Hu, K. (2024). SITransformer: Shared Information-Guided Transformer for Extreme Multimodal Summarization. In Proceedings of the 6th ACM International Conference on Multimedia in Asia (pp. 1-7). Auckland, New Zealand: ACM. DOI Scopus2 |
| 2024 | Zhang, K., Zhu, X., Xiao, X., Xue, M., Zhang, C., & Wen, S. (2024). ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection. In Proceedings 2024 Network and Distributed System Security Symposium. Online: Internet Society. DOI |
| 2023 | Zhang, Y., Zhu, X., He, D., Xue, M., Ji, S., Haghighi, M. S., . . . Peng, Z. (2023). Detecting Union Type Confusion in Component Object Model. In 32nd USENIX Security Symposium, USENIX Security 2023 Vol. 6 (pp. 4265-4282). Online: USENIX Association. Scopus4 WoS3 |
| 2022 | Zhang, K., Xi, X., Zhu, X., Sun, R., Xue, M., & Wen, S. (2022). Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States. In ICSE '22: Proceedings of the 44th International Conference on Software Engineering Vol. 2022-May (pp. 1658-1668). Pittsburgh, USA: ACM. DOI Scopus27 WoS19 |
| 2021 | Feng, X., Sun, R., Zhu, X., Xue, M., Wen, S., Liu, D., . . . Xiang, Y. (2021). Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. In Proceedings of the 28th ACM SIGSAC Conference on Computer and Communications Security (CCS 2021) (pp. 337-350). Virtual Online: Association for Computing Machinery. DOI Scopus146 WoS99 |
| 2021 | Zhu, X., & Böhme, M. (2021). Regression Greybox Fuzzing. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2169-2182). Republic of Korea: ASSOC COMPUTING MACHINERY. DOI Scopus79 WoS60 |
| 2021 | Li, Y., Xiao, X., Zhu, X., Chen, X., Wen, S., & Zhang, B. (2021). SpeedNeuzz: Speed up neural program approximation with neighbor edge knowledge. In G. J. Wang, R. Ko, M. Z. A. Bhuiyan, & Y. Pan (Eds.), Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 (pp. 450-457). PEOPLES R CHINA, Guangzhou: IEEE COMPUTER SOC. DOI Scopus4 WoS2 |
| 2019 | Zhu, X., Feng, X., Jiao, T., Wen, S., Xiang, Y., Camtepe, S., & Xue, J. (2019). A Feature-oriented corpus for understanding, evaluating and improving fuzz testing. In Asiaccs 2019 Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (pp. 658-663). NEW ZEALAND, Auckland: ASSOC COMPUTING MACHINERY. DOI Scopus14 WoS12 |
| Date | Role | Research Topic | Program | Degree Type | Student Load | Student Name |
|---|---|---|---|---|---|---|
| 2025 | Co-Supervisor | Explainable AI for Individual-level Trustworthiness in Decision Making Systems | Doctor of Philosophy | Doctorate | Full Time | Mr Zhenlin Xu |
| 2024 | Co-Supervisor | Understanding and enhancing the robustness of machine learning models for cyber security applications | Doctor of Philosophy | Doctorate | Full Time | Miss Yingxin Xu |
| Date | Role | Committee | Institution | Country |
|---|---|---|---|---|
| 2025 - 2026 | Member | ISSTA 2026 | ACM | United States |
| 2025 - 2026 | Member | USENIX 2026 | USENIX | United States |