Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis Y Chen, Y Yao, XF Wang, D Xu, C Yue, X Liu, K Chen, H Tang, B Liu 2021 IEEE Symposium on Security and Privacy (SP), 1197-1214, 2021 | 51 | 2021 |
Demystifying hidden privacy settings in mobile apps Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ... 2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019 | 49 | 2019 |
AutoPwn: Artifact-assisted Heap Exploit Generation for CTF PWN Competitions D Xu, K Chen, M Lin, C Lin, X Wang IEEE Transactions on Information Forensics and Security, 2023 | 6 | 2023 |
Racing on the Negative Force: Efficient Vulnerability {Root-Cause} Analysis through Reinforcement Learning on Counterexamples D Xu, D Tang, Y Chen, XF Wang, K Chen, H Tang, L Li 33rd USENIX Security Symposium (USENIX Security 24), 4229-4246, 2024 | 2 | 2024 |
Spidey: Secure Dynamic Encrypted Property Graph Search With Lightweight Access Control Y Wu, J Wang, D Xu, Y Zhou IEEE Internet of Things Journal, 2024 | | 2024 |
面向人类编程习惯的反编译代码控制结构恢复技术 曹颖, 梁瑞刚, 张润泽, 徐丹丹 信息安全学报, 0 | | |