متابعة
Lei Zhao
Lei Zhao
School of Cyber Science and Engineering, Wuhan University
بريد إلكتروني تم التحقق منه على whu.edu.cn
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Send hardest problems my way: Probabilistic path prioritization for hybrid fuzzing
L Zhao, Y Duan, J XUAN
Network and Distributed System Security Symposium (NDSS), 2019
1712019
PatchScope: Memory object centric patch diffing
L Zhao, Y Zhu, J Ming, Y Zhang, H Zhang, H Yin
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
282020
Capturing the persistence of facial expression features for deepfake video detection
Y Zhao, W Ge, W Li, R Wang, L Zhao, J Ming
Information and Communications Security: 21st International Conference …, 2020
272020
Smartpi: Understanding permission implications of android apps from user reviews
R Wang, Z Wang, B Tang, L Zhao, L Wang
IEEE Transactions on Mobile Computing 19 (12), 2933-2945, 2019
242019
Execution-aware fault localization based on the control flow analysis
L Zhao, L Wang, Z Xiong, D Gao
Information Computing and Applications, 158-165, 2010
162010
Context-Aware Fault Localization via Control Flow Analysis
L Zhao, L Wang, X Yin
Journal of Software 6 (10), 1977-1984, 2011
142011
RapidFuzz: Accelerating fuzzing via generative adversarial networks
A Ye, L Wang, L Zhao, J Ke, W Wang, Q Liu
Neurocomputing 460, 195-204, 2021
132021
Alphuzz: Monte carlo search on seed-mutation tree for coverage-guided fuzzing
Y Zhao, X Wang, L Zhao, Y Cheng, H Yin
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
112022
Niffler: A Context‐Aware and User‐Independent Side‐Channel Attack System for Password Inference
B Tang, Z Wang, R Wang, L Zhao, L Wang
Wireless Communications and Mobile Computing 2018 (1), 4627108, 2018
112018
{VScape}: Assessing and escaping virtual call protections
K Chen, C Zhang, T Yin, X Chen, L Zhao
30th USENIX Security Symposium (USENIX Security 21), 1719-1736, 2021
92021
Probabilistic path prioritization for hybrid fuzzing
L Zhao, P Cao, Y Duan, H Yin, J Xuan
IEEE Transactions on Dependable and Secure Computing 19 (3), 1955-1973, 2020
92020
Attack provenance tracing in cyberspace: Solutions, challenges and future directions
C Tan, Q Wang, L Wang, L Zhao
IEEE network 33 (2), 174-180, 2018
92018
Regression identification of coincidental correctness via weighted clustering
X Yang, M Liu, M Cao, L Zhao, L Wang
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 115-120, 2015
92015
PAFL: Fault Localization via Noise Reduction on Coverage Vector.
L Zhao, Z Zhang, L Wang, X Yin
SEKE, 203-206, 2011
92011
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level
R Wang, P Liu, L Zhao, Y Cheng, L Wang
Journal of Systems and Software 124, 153-168, 2017
72017
Statistical fault localization via semi-dynamic program slicing
R Yu, L Zhao, L Wang, X Yin
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
72011
APICAD: Augmenting API Misuse Detection through Specifications from Code and Documents
X Wang, L Zhao
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
62023
Collaborative reversing of input formats and program data structures for security applications
L Zhao, X Ren, M Liu, L Wang, H Zhang, H Zhang
China Communications 11 (9), 135-147, 2014
62014
vpatcher: Vmi-based transparent data patching to secure software in the cloud
H Zhang, L Zhao, L Xu, L Wang, D Wu
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
52014
A fault localization framework to alleviate the impact of execution similarity
L Zhao, Z Zhang, L Wang, X Yin
International Journal of Software Engineering and Knowledge Engineering 23 …, 2013
52013
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20