Obserwuj
Dinghao Wu
Tytuł
Cytowane przez
Cytowane przez
Rok
KISS: keep it simple and sequential
S Qadeer, D Wu
ACM SIGPLAN Notices 39 (6), 14-24, 2004
2812004
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
2602014
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless …, 2014
2472014
Classifying text messages for the haiti earthquake.
C Caragea, NJ McNeese, AR Jaiswal, G Traylor, HW Kim, P Mitra, D Wu, ...
ISCRAM, 2011
2472011
LibD: scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1842017
Reassembleable Disassembling.
S Wang, P Wang, D Wu
USENIX Security Symposium, 627-642, 2015
1702015
Get online support, feel better--sentiment analysis and dynamics in an online cancer survivor community
B Qiu, K Zhao, P Mitra, D Wu, C Caragea, J Yen, GE Greer, K Portier
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1472011
Cached: Identifying cache-based timing channels in production software
S Wang, P Wang, X Liu, D Zhang, D Wu
Proceedings of the 26th USENIX Security Symposium, 2017
1432017
{BinSim}: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security 17), 253-270, 2017
1282017
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
1242017
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
1222011
A framework for evaluating mobile app repackaging detection algorithms
H Huang, S Zhu, P Liu, D Wu
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
1192013
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
NDSS, 2020
1162020
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1042015
TaintPipe: Pipelined Symbolic Taint Analysis.
J Ming, D Wu, G Xiao, J Wang, P Liu
USENIX Security Symposium, 65-80, 2015
1042015
Deepfuzz: Automatic generation of syntax valid c programs for fuzz testing
X Liu, X Li, R Prajapati, D Wu
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 1044-1051, 2019
952019
Adaptive unpacking of Android apps
L Xue, X Luo, L Yu, S Wang, D Wu
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
932017
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
D Xu, J Ming, D Wu
2017 IEEE Symposium on Security and Privacy (SP), 921-937, 2017
912017
Local augmentation for graph neural networks
S Liu, R Ying, H Dong, L Li, T Xu, Y Rong, P Zhao, J Huang, D Wu
International Conference on Machine Learning, 14054-14072, 2022
902022
Jred: Program customization and bloatware mitigation based on static analysis
Y Jiang, D Wu, P Liu
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
862016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20