Follow
Peiyuan Zong
Title
Cited by
Cited by
Year
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1332017
{FuzzGuard}: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning
P Zong, T Lv, D Wang, Z Deng, R Liang, K Chen
29th USENIX security symposium (USENIX security 20), 2255-2269, 2020
1222020
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
742017
Filtering for malice through the data ocean: Large-scale PHA install detection at the communication service provider level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
42017
Understanding iot security through the data crystal ball: Where we are now and where weare going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
Scanning Electron Microsc Meet at, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–5