Artikkelit, joihin on yleisen käytön mandaatti - Tao WeiLisätietoja
Ei saatavilla missään: 6
Phishing website detection based on effective CSS features of web pages
J Mao, W Tian, P Li, T Wei, Z Liang
Wireless Algorithms, Systems, and Applications: 12th International …, 2017
Mandaatit: National Natural Science Foundation of China
SF-DRDoS: The store-and-flood distributed reflective denial of service attack
B Liu, J Li, T Wei, S Berg, J Ye, C Li, C Zhang, J Zhang, X Han
Computer communications 69, 107-115, 2015
Mandaatit: National Natural Science Foundation of China
CVTEE: A compatible verified TEE architecture with enhanced security
X Miao, R Chang, J Zhao, Y Zhao, S Cao, T Wei, L Jiang, K Ren
IEEE Transactions on Dependable and Secure Computing 20 (1), 377-391, 2021
Mandaatit: National Natural Science Foundation of China
Improving lookup reliability in Kad
B Liu, T Wei, C Zhang, J Li, J Zhang
Peer-to-Peer Networking and Applications 8, 156-170, 2015
Mandaatit: National Natural Science Foundation of China
Privilege-escalation vulnerability discovery for large-scale RPC services: Principle, design, and deployment
Z Liu, H Zhao, S Li, Q Li, T Wei, Y Wang
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
Mandaatit: National Natural Science Foundation of China
快速准确的 Exploit 自动捕获与分类方法和系统
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Science China Information Sciences 60, 1-17, 2017
Mandaatit: National Natural Science Foundation of China
Saatavilla jossain: 16
Phishing-alarm: Robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
Mandaatit: National Natural Science Foundation of China
Fooling detection alone is not enough: Adversarial attack against multiple object tracking
Y Jia, Y Lu, J Shen, QA Chen, H Chen, Z Zhong, T Wei
International Conference on Learning Representations (ICLR'20), 2020
Mandaatit: US National Science Foundation
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Mandaatit: US National Science Foundation
Adaptive Android Kernel Live Patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
Usenix Security, 2017
Mandaatit: US National Science Foundation
Phishing page detection via learning classifiers from page layout feature
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
EURASIP Journal on Wireless Communications and Networking 2019, 1-14, 2019
Mandaatit: National Natural Science Foundation of China
COIN attacks: On insecurity of enclave untrusted interfaces in SGX
MR Khandaker, Y Cheng, Z Wang, T Wei
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
Mandaatit: US National Science Foundation
Fairness-aware adversarial perturbation towards bias mitigation for deployed deep models
Z Wang, X Dong, H Xue, Z Zhang, W Chiu, T Wei, K Ren
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022
Mandaatit: National Natural Science Foundation of China
Detecting phishing websites via aggregation analysis of page layouts
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
Procedia Computer Science 129, 224-230, 2018
Mandaatit: National Natural Science Foundation of China
Black-box dataset ownership verification via backdoor watermarking
Y Li, M Zhu, X Yang, Y Jiang, T Wei, ST Xia
IEEE Transactions on Information Forensics and Security 18, 2318-2332, 2023
Mandaatit: National Natural Science Foundation of China
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Z Qi, Q Feng, Y Cheng, M Yan, P Li, H Yin, T Wei
NDSS, 1-14, 2021
Mandaatit: US Department of Defense
Software protection on the go: A large-scale empirical study on mobile app obfuscation
P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu
Proceedings of the 40th International Conference on Software Engineering, 26-36, 2018
Mandaatit: US National Science Foundation, US Department of Defense
Aegis: Mitigating targeted bit-flip attacks against deep neural networks
J Wang, Z Zhang, M Wang, H Qiu, T Zhang, Q Li, Z Li, T Wei, C Zhang
32nd USENIX Security Symposium (USENIX Security 23), 2329-2346, 2023
Mandaatit: National Natural Science Foundation of China
Accurate and efficient exploit capture and classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Science China. Information Sciences 60 (5), 052110, 2017
Mandaatit: National Natural Science Foundation of China
Protecting million-user ios apps with obfuscation: motivations, pitfalls, and experience
P Wang, D Wu, Z Chen, T Wei
Proceedings of the 40th International Conference on Software Engineering …, 2018
Mandaatit: US National Science Foundation, US Department of Defense
Tietokoneohjelma arvioi ja määrittää julkaisu- ja rahoitustiedot automaattisesti