Folgen
Fei Zuo
Titel
Zitiert von
Zitiert von
Jahr
Neural Machine Translation Inspired Binary Code Similarity Comparison Beyond Function Pairs
F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019
2882019
Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices
X Li, F Yan, F Zuo, Q Zeng, L Luo
The 25th Annual International Conference on Mobile Computing and Networking …, 2019
652019
Digital Image Processing: Technique and Practice with Visual C++
F Zuo, J Wan, H Liu
Publishing House of Electronics Industry, Beijing, 2014
40*2014
Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore
F Zuo, Q Zeng
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
292021
Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms
L Luo, Q Zeng, B Yang, F Zuo, J Wang
Annual Computer Security Applications Conference (ACSAC), 982-995, 2021
212021
K-regret Queries Using Multiplicative Utility Functions
J Qi, F Zuo, H Samet, JC Yao
ACM Transactions on Database Systems (TODS) 43 (2), 1-41, 2018
19*2018
Exploiting the Inherent Limitation of L0 Adversarial Examples
F Zuo, B Yang, X Li, Q Zeng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
17*2019
Digital Image Processing: Principle and Practice (MATLAB Version)
F Zuo
Publishing House of Electronics Industry, Beijing, 2014
17*2014
Digital Image Processing: Principles and Practice
F Zuo, JS Wan, H Liu
Publishing House of Electronics Industry, Beijing, 2011
12*2011
Use It-No Need to Shake It! Accurate Implicit Authentication for Everyday Objects with Smart Sensing
C Wu, X Li, F Zuo, L Luo, X Du, J Di, Q Zeng
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
112022
Applied Mathematics in Digital Image Processing
F Zuo
Tsinghua University Press: Beijing, China, 2020
8*2020
Vulnerability discovery based on source code patch commit mining: a systematic literature review
F Zuo, J Rhee
International Journal of Information Security 23 (2), 1513-1526, 2024
72024
Digital Image Processing: Explain in Details and Practice in Visual C++
F Zuo
Publishing House of Electronics Industry, Beijing, 2014
6*2014
Commit message can help: security patch detection in open source software via transformer
F Zuo, X Zhang, Y Song, J Rhee, J Fu
2023 IEEE/ACIS 21st International Conference on Software Engineering …, 2023
52023
Introduction to TD-SCDMA
F Zuo
Posts & Telecom Press, Beijing, 2010
5*2010
A Comprehensive Dataset Towards Hands-on Experience Enhancement in a Research-Involved Cybersecurity Program
F Zuo, J Rhee, Y Kim, J Oh, G Qian
The 24th ACM Annual Conference on Information Technology Education, 118-124, 2023
42023
Developing Incident Response-Focused Cybersecurity Undergraduate Curricula
J Rhee, M Park, F Zuo, S Zhang, G Qian, G Mylavarapu, H Sung, T Turner
The Journal of Computing Sciences in Colleges 38 (7), 65-74, 2023
42023
ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset
M Shrestha, Y Kim, J Oh, J Rhee, YR Choe, F Zuo, M Park, G Qian
2023 IEEE/ACIS 21st International Conference on Software Engineering …, 2023
32023
Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels
X Zhang, Y Song, F Zuo, Z Zhou, X Wang
Proceedings of the 21st IEEE/ACIS International Conference on Software …, 2023
32023
D-Score: A White-Box Diagnosis Score for CNNs Based on Mutation Operators
X Zhang, Y Song, X Wang, F Zuo
International Conference on Advanced Data Mining and Applications (ADMA), 2023
32023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20