Obserwuj
Peiyuan Zong
Tytuł
Cytowane przez
Cytowane przez
Rok
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
872017
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
632017
{FuzzGuard}: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning
P Zong, T Lv, D Wang, Z Deng, R Liang, K Chen
29th USENIX Security Symposium (USENIX Security 20), 2255-2269, 2020
532020
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
32017
Understanding iot security through the data crystal ball: Where we are now and where weare going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
Scanning Electron Microsc Meet at, 2017
32017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–5