Lei Zhao
Lei Zhao
School of Cyber Science and Engineering, Wuhan University
Bestätigte E-Mail-Adresse bei whu.edu.cn
Zitiert von
Zitiert von
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
L Zhao, Y Duan, H Yin, J Xuan
NDSS, 2019
Context-Aware Fault Localization via Control Flow Analysis
L Zhao, L Wang, X Yin
Journal of Software 6 (10), 1977-1984, 2011
Execution-aware fault localization based on the control flow analysis
L Zhao, L Wang, Z Xiong, D Gao
Information Computing and Applications, 158-165, 2010
PAFL: Fault Localization via Noise Reduction on Coverage Vector.
L Zhao, Z Zhang, L Wang, X Yin
SEKE, 203-206, 2011
Niffler: A context-aware and user-independent side-channel attack system for password inference
B Tang, Z Wang, R Wang, L Zhao, L Wang
Wireless Communications and Mobile Computing 2018, 2018
Collaborative reversing of input formats and program data structures for security applications
L Zhao, X Ren, M Liu, L Wang, H Zhang, H Zhang
China Communications 11 (9), 135-147, 2014
Smartpi: Understanding permission implications of android apps from user reviews
R Wang, Z Wang, B Tang, L Zhao, L Wang
IEEE Transactions on Mobile Computing 19 (12), 2933-2945, 2019
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level
R Wang, P Liu, L Zhao, Y Cheng, L Wang
Journal of Systems and Software 124, 153-168, 2017
Regression identification of coincidental correctness via weighted clustering
X Yang, M Liu, M Cao, L Zhao, L Wang
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 115-120, 2015
赵磊, 王丽娜, 高东明, 张震宇, 熊作婷
计算机学报 35 (012), 2528-2540, 2012
Baseline is fragile: on the effectiveness of stack pivot defense
F Yan, F Huang, L Zhao, H Peng, Q Wang
2016 IEEE 22nd International Conference on Parallel and Distributed Systems …, 2016
A novel urban traffic prediction mechanism for smart city using learning approach
X Niu, Y Zhu, Q Cao, L Zhao, W Xie
China Conference on Wireless Sensor Networks, 548-557, 2014
Statistical fault localization via semi-dynamic program slicing
R Yu, L Zhao, L Wang, X Yin
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
Patchscope: Memory object centric patch diffing
L Zhao, Y Zhu, J Ming, Y Zhang, H Zhang, H Yin
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
cMonitor: VMI-based fine-grained monitoring mechanism in cloud
H Zhang, L Zhao, L Xu, L Wang
Wuhan University Journal of Natural Sciences 19 (5), 393-397, 2014
vpatcher: Vmi-based transparent data patching to secure software in the cloud
H Zhang, L Zhao, L Xu, L Wang, D Wu
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
Defending against ROP Attacks with Nearly Zero Overhead
P Qin, C Tan, L Zhao, Y Cheng
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
CAPT: Context-aware provenance tracing for attack investigation
C Tan, L Zhao, W Liu, L Xu, L Wang
China Communications 15 (2), 153-169, 2018
Fault Localization Guided Execution Comparison for Failure Comprehension
M Liu, P Liu, X Yang, L Zhao
2016 IEEE International Conference on Software Quality, Reliability and …, 2016
Reversing and identifying overwritten data structures for memory-corruption exploit diagnosis
L Zhao, R Wang, L Wang, Y Cheng
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 434-443, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20