フォロー
TANG QIYI
TANG QIYI
Information Security Researcher, Tencent
確認したメール アドレス: tencent.com
タイトル
引用先
引用先
Order matters: Semantic-aware neural networks for binary code similarity detection
Z Yu, R Cao, Q Tang, S Nie, J Huang, S Wu
Proceedings of the AAAI conference on artificial intelligence 34 (01), 1145-1152, 2020
2382020
Codecmr: Cross-modal retrieval for function-level binary source code matching
Z Yu, W Zheng, J Wang, Q Tang, S Nie, S Wu
Advances in Neural Information Processing Systems 33, 3872-3883, 2020
832020
Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations
P Jing, Q Tang, Y Du, L Xue, X Luo, T Wang, S Nie, S Wu
30th USENIX Security Symposium (USENIX Security 21), 3237-3254, 2021
652021
Unleashing the power of compiler intermediate representation to enhance neural program embeddings
Z Li, P Ma, H Wang, S Wang, Q Tang, S Nie, S Wu
Proceedings of the 44th International Conference on Software Engineering …, 2022
312022
Third-party library dependency for large-scale SCA in the C/C++ ecosystem: How far are we?
L Jiang, H Yuan, Q Tang, S Nie, S Wu, Y Zhang
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
192023
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis
A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang, S Nie, S Wu, T Liu
ACM Transactions on Software Engineering and Methodology 32 (4), 1-26, 2023
172023
Refining decompiled c code with large language models
WK Wong, H Wang, Z Li, Z Liu, S Wang, Q Tang, S Nie, S Wu
arXiv preprint arXiv:2310.06530, 2023
152023
Enhancing dnn-based binary code function search with low-cost equivalence checking
H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu
IEEE Transactions on Software Engineering 49 (1), 226-250, 2022
142022
sem2vec: Semantics-aware Assembly Tracelet Embedding
H Wang, P Ma, S Wang, Q Tang, S Nie, S Wu
ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023
112023
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching
L Jiang, J An, H Huang, Q Tang, S Nie, S Wu, Y Zhang
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
82024
Comparing One with Many--Solving Binary2source Function Matching Under Function Inlining
A Jia, M Fan, X Xu, W Jin, H Wang, Q Tang, S Nie, S Wu, T Liu
arXiv preprint arXiv:2210.15159, 2022
32022
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs
WK Wong, H Wang, P Ma, S Wang, M Jiang, TY Chen, Q Tang, S Nie, ...
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
32022
Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis
H Wang, Z Liu, S Wang, Y Wang, Q Tang, S Nie, S Wu
2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 506-523, 2024
12024
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements
H Wang, Z Liu, Y Dai, S Wang, Q Tang, S Nie, S Wu
arXiv preprint arXiv:2412.00898, 2024
2024
Update If You Dare: Demystifying Bare-Metal Device Firmware Update Security of Appified IoT Systems
L Xue, Y Yan, Q Tang, L Yu, X Luo, Z Cai, S Nie, S Wu, G Gu, C Wang
IEEE Transactions on Dependable and Secure Computing, 2024
2024
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–15