ติดตาม
shi wu
shi wu
engineer of tencent
ยืนยันอีเมลแล้วที่ tencent.com
ชื่อ
อ้างโดย
อ้างโดย
ปี
Order matters: Semantic-aware neural networks for binary code similarity detection
Z Yu, R Cao, Q Tang, S Nie, J Huang, S Wu
Proceedings of the AAAI conference on artificial intelligence 34 (01), 1145-1152, 2020
2392020
Codecmr: Cross-modal retrieval for function-level binary source code matching
Z Yu, W Zheng, J Wang, Q Tang, S Nie, S Wu
Advances in Neural Information Processing Systems 33, 3872-3883, 2020
862020
Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models
S Mehnaz, SV Dibbo, R De Viti, E Kabir, BB Brandenburg, S Mangard, ...
31st USENIX Security Symposium (USENIX Security 22), 4579-4596, 2022
762022
Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations
P Jing, Q Tang, Y Du, L Xue, X Luo, T Wang, S Nie, S Wu
30th USENIX Security Symposium (USENIX Security 21), 3237-3254, 2021
662021
Rolling colors: Adversarial laser exploits against traffic light recognition
C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ...
31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022
512022
Evaluating and improving neural program-smoothing-based fuzzing
M Wu, L Jiang, J Xiang, Y Zhang, G Yang, H Ma, S Nie, S Wu, H Cui, ...
Proceedings of the 44th International Conference on Software Engineering …, 2022
332022
Unleashing the power of compiler intermediate representation to enhance neural program embeddings
Z Li, P Ma, H Wang, S Wang, Q Tang, S Nie, S Wu
Proceedings of the 44th International Conference on Software Engineering …, 2022
312022
Third-party library dependency for large-scale sca in the c/c++ ecosystem: How far are we?
L Jiang, H Yuan, Q Tang, S Nie, S Wu, Y Zhang
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
192023
Refining decompiled c code with large language models
WK Wong, H Wang, Z Li, Z Liu, S Wang, Q Tang, S Nie, S Wu
arXiv preprint arXiv:2310.06530, 2023
172023
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis
A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang, S Nie, S Wu, T Liu
ACM Transactions on Software Engineering and Methodology 32 (4), 1-26, 2023
162023
Towards automatically reverse engineering vehicle diagnostic protocols
L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ...
31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022
152022
Enhancing dnn-based binary code function search with low-cost equivalence checking
H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu
IEEE Transactions on Software Engineering 49 (1), 226-250, 2022
142022
sem2vec: Semantics-aware Assembly Tracelet Embedding
H Wang, P Ma, S Wang, Q Tang, S Nie, S Wu
ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023
122023
Binaryai: binary software composition analysis via intelligent binary source code matching
L Jiang, J An, H Huang, Q Tang, S Nie, S Wu, Y Zhang
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
92024
Revisiting automotive attack surfaces: A practitioners’ perspective
P Jing, Z Cai, Y Cao, L Yu, Y Du, W Zhang, C Qian, X Luo, S Nie, S Wu
2024 IEEE Symposium on Security and Privacy (SP), 2348-2365, 2024
72024
Comparing One with Many--Solving Binary2source Function Matching Under Function Inlining
A Jia, M Fan, X Xu, W Jin, H Wang, Q Tang, S Nie, S Wu, T Liu
arXiv preprint arXiv:2210.15159, 2022
32022
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs
WK Wong, H Wang, P Ma, S Wang, M Jiang, TY Chen, Q Tang, S Nie, ...
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
32022
Tbdetector: Transformer-based detector for advanced persistent threats with provenance graph
N Wang, X Wen, D Zhang, X Zhao, J Ma, M Luo, S Nie, S Wu, J Liu
arXiv preprint arXiv:2304.02838, 2023
22023
Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis
H Wang, Z Liu, S Wang, Y Wang, Q Tang, S Nie, S Wu
2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 506-523, 2024
12024
1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis
A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang, S Nie, S Wu, T Liu
arXiv preprint arXiv:2112.12928, 2021
12021
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20