Lincoln Memorial Jianjun Huang
Wing Building for Science Complex
School of Information, Renmin University of China
No. 59 Zhongguancun Street, Haidian District
Beijing, China (100872)

hjj at ruc.edu.cn
Chinese Address
Chinese name


I am now an Assistant Professor in School of Information, Renmin University of China. I am a member of the Smart Software Security Research Group.
I received my Ph.D. degree in December 2017. I completed my Ph.D. study in Department of Computer Science, Purdue University since Fall 2012. My advisor is Prof. Xiangyu Zhang. I got my B.E. and M.S. degrees in School of Information, Renmin University of China.
Publications [Google Scholar, DBLP]

Dongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang, Jianjun Huang, Wenchang Shi, Zhuo Zhang, Xiangyu Zhang
Define-Use Guided Path Exploration for Better Forced Execution
ISSTA'24, Vienna, Austria, September 2024.

Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang, Yapeng Ye, Jianjun Huang, Xiangyu Zhang
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
FSE'24, Porto de Galinhas, Brazil, July 2024.

Jianjun Huang, Jianglei Nie, Yuanjun Gong, Wei You, Bin Liang, Pan Bian
Raisin: Identifying Rare Sensitive Functions for Bug Detection
ICSE'24, Lisbon, Portugal, April, 2024.

Xuwei Liu, Wei You, Yapeng Ye, Zhuo Zhang, Jianjun Huang, Xiangyu Zhang
FuzzInMem: Fuzzing Programs via In-memory Structures
ICSE'24, Lisbon, Portugal, April, 2024.

Yuanjun Gong, Jianglei Nie, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang, Jian Zhang
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection
ICPC'24, Lisbon, Portugal, April, 2024.

Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifiers
CCS'23, Copenhagen, Denmark, November 2023. (Slides)

Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang, Jian Zhang
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers
ICSE'23, Melbourne, Australia, May 2023.

Jianjun Huang, Bo Xue, Jiasheng Jiang, Wei You, Bin Liang, Jingzheng Wu, Yanjun Wu
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering
IEEE Transactions on Software Engineering, vol. 49, issue 4, pp. 2272-2284, 01 Apr. 2023.

Jianjun Huang, Jiasheng Jiang, Wei You, Bin Liang
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts
IEEE Transactions on Computers, vol. 71, no. 7, pp. 1551-1563, 01 Jul. 2022.

Xiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang, Wei You, Wenchang Shi, Jian Zhang
Hunting Bugs with Accelerated Optimal Graph Vertex Matching
ISSTA'22, Virtual, South Korea, July 2022.

Jianjun Huang, Songming Han, Wei You, Wenchang Shi, Bin Liang, Jingzheng Wu, Yanjun Wu
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2144-2156.

Shilei Bai, Bin Liang, Jianjun Huang, Wei You, Jiachun Li, Yaping Li, Wenchang Shi
Detecting the Capacitance-based Gamepad for Protecting Mobile Game Fairness
IEEE Transactions on Computers, vol. 70, no. 9, pp. 1374-1387, 01 Sept. 2021.

Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang
SinkFinder: Harvesting Hundreds of Unknown Interesting Function Pairs with Just One Seed
ESEC/FSE'20, Virtual Event, USA, November 2020.

Hongcheng Li, Jianjun Huang, Bin Liang, Wenchang Shi, Yifang Wu, Shilei Bai
Identifying Parasitic Malware as Outliers by Code Clustering
Journal of Computer Security, vol.28, no.2, pp.157-189. Jan. 2020.

Yifang Wu, Jianjun Huang, Bin Liang, Wenchang Shi
Do Not Jail My App: Detecting the Android Plugin Environments by Time Lag Contradiction
Journal of Computer Security, vol.28, no.2, pp.269-293. Jan. 2020.

Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Detection
S&P'19, San Francisco, California, USA, May 2019.

Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai.
NAR-Miner: Discovering Negative Association Rules from Code for Bug Detection
ESEC/FSE'18, Lake Buena Vista, Florida, USA, November 2018. (Slides, BibTex)

Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li.
Precise Android API Protection Mapping Derivation and Reasoning
CCS'18, Toronto, Canada, October 2018. (Slides, BibTex)

Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian.
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection
NDSS'18, San Diego, California, USA, February 2018. (Slides, BibTex)

Jianjun Huang
STATIC ANALYSIS OF ANDROID APPS WITH TEXT ANALYSIS AND BI-DIRECTIONAL PROPAGATION
PhD Dissertation, Purdue University, December 2017.

Jianjun Huang, Yousra Aafer, David Perry, Xiangyu Zhang, Chen Tian.
UI Driven Android Application Reduction
ASE'17, Urbana-Champaign, Illinois, USA, October - November 2017. (Slides, BibTex)

Jianjun Huang, Xiangyu Zhang, Lin Tan.
Detecting Sensitive Data Disclosure via Bi-directional Text Correlation Analysis
FSE'16, Seattle, Washington, USA, November 2016. (Slides, BibTex)
(ACM SIGSOFT Distinguished Paper Award)

Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin.
Automatic Model Generation from Documentation for Java API Functions
ICSE'16, Austin, Texas, USA, May 2016. (Slides, BibTex)

Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang.
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
USENIX Security'15, Washington D.C., USA, August 2015. (Slides, BibTex)
(CSAW 2015 Best Applied Security Paper Award TOP-10 Finalists: acceptance rate = 10/82 = 12.2%)

Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang.
AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction
ICSE'14, Hyderabad, India, June 2014. (Slides, BibTex)
Awards

2016 ACM SIGSOFT Distinguished Paper Award
CSAW 2015 Best Applied Security Paper Award TOP-10 Finalists