Stebėti
Lei Zhao
Lei Zhao
School of Cyber Science and Engineering, Wuhan University
Patvirtintas el. paštas whu.edu.cn
Pavadinimas
Cituota
Cituota
Metai
Send hardest problems my way: Probabilistic path prioritization for hybrid fuzzing
L Zhao, Y Duan, J XUAN
Network and Distributed System Security Symposium (NDSS), 2019
1642019
PatchScope: Memory object centric patch diffing
L Zhao, Y Zhu, J Ming, Y Zhang, H Zhang, H Yin
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
272020
Capturing the persistence of facial expression features for deepfake video detection
Y Zhao, W Ge, W Li, R Wang, L Zhao, J Ming
Information and Communications Security: 21st International Conference …, 2020
252020
Smartpi: Understanding permission implications of android apps from user reviews
R Wang, Z Wang, B Tang, L Zhao, L Wang
IEEE Transactions on Mobile Computing 19 (12), 2933-2945, 2019
232019
Execution-aware fault localization based on the control flow analysis
L Zhao, L Wang, Z Xiong, D Gao
Information Computing and Applications, 158-165, 2010
162010
Context-Aware Fault Localization via Control Flow Analysis
L Zhao, L Wang, X Yin
Journal of Software 6 (10), 1977-1984, 2011
142011
RapidFuzz: Accelerating fuzzing via generative adversarial networks
A Ye, L Wang, L Zhao, J Ke, W Wang, Q Liu
Neurocomputing 460, 195-204, 2021
112021
Niffler: A Context‐Aware and User‐Independent Side‐Channel Attack System for Password Inference
B Tang, Z Wang, R Wang, L Zhao, L Wang
Wireless Communications and Mobile Computing 2018 (1), 4627108, 2018
112018
Alphuzz: Monte carlo search on seed-mutation tree for coverage-guided fuzzing
Y Zhao, X Wang, L Zhao, Y Cheng, H Yin
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
92022
{VScape}: Assessing and escaping virtual call protections
K Chen, C Zhang, T Yin, X Chen, L Zhao
30th USENIX Security Symposium (USENIX Security 21), 1719-1736, 2021
92021
Attack provenance tracing in cyberspace: Solutions, challenges and future directions
C Tan, Q Wang, L Wang, L Zhao
IEEE network 33 (2), 174-180, 2018
92018
Regression identification of coincidental correctness via weighted clustering
X Yang, M Liu, M Cao, L Zhao, L Wang
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 115-120, 2015
92015
PAFL: Fault Localization via Noise Reduction on Coverage Vector.
L Zhao, Z Zhang, L Wang, X Yin
SEKE, 203-206, 2011
92011
Probabilistic path prioritization for hybrid fuzzing
L Zhao, P Cao, Y Duan, H Yin, J Xuan
IEEE Transactions on Dependable and Secure Computing 19 (3), 1955-1973, 2020
82020
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level
R Wang, P Liu, L Zhao, Y Cheng, L Wang
Journal of Systems and Software 124, 153-168, 2017
72017
Statistical fault localization via semi-dynamic program slicing
R Yu, L Zhao, L Wang, X Yin
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
72011
Collaborative reversing of input formats and program data structures for security applications
L Zhao, X Ren, M Liu, L Wang, H Zhang, H Zhang
China Communications 11 (9), 135-147, 2014
62014
APICAD: Augmenting API Misuse Detection through Specifications from Code and Documents
X Wang, L Zhao
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
52023
vpatcher: Vmi-based transparent data patching to secure software in the cloud
H Zhang, L Zhao, L Xu, L Wang, D Wu
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
52014
基于关联挖掘的软件错误定位方法
赵磊, 王丽娜, 高东明, 张震宇, 熊作婷
计算机学报 35 (012), 2528-2540, 2012
52012
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20