102 results on '"Wei HUO"'
Search Results
2. TGRop: Top Gun of Return-Oriented Programming Automation.
3. Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware.
4. Fuzzing for Stateful Protocol Implementations: Are We There Yet?
5. File Hijacking Vulnerability: The Elephant in the Room.
6. Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of Embedded Systems.
7. Decompilation Based Deep Binary-Source Function Matching.
8. pAFL: Adaptive Energy Allocation with Upper Confidence Bound.
9. RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing.
10. Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
11. EBugDec: Detecting Inconsistency Bugs caused by RFC Evolution in Protocol Implementations.
12. ACETest: Automated Constraint Extraction for Testing Deep Learning Operators.
13. Splendor: Static Detection of Stored XSS in Modern Web Applications.
14. A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs.
15. Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis.
16. VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis.
17. Improving Primal Heuristics for Mixed Integer Programming Problems based on Problem Reduction: A Learning-based Approach.
18. RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol Implementations.
19. SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
20. VIVA: Binary Level Vulnerability Identification via Partial Signature.
21. A large-scale empirical study on vulnerability distribution within projects and the lessons learned.
22. Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
23. MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
24. Design of Remote-Control Multi-view Monitor for Vehicle-Mounted Mobile Phone Based on IoT.
25. 1dVul: Discovering 1-Day Vulnerabilities through Binary Patches.
26. B2SFinder: Detecting Open-Source Software Reuse in COTS Software.
27. Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools.
28. SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
29. Path Following Control for a Stratospheric Airship Based on Disturbance Observer.
30. Open-Source License Violations of Binary Software at Large Scale.
31. Stabilizing a VTOL Aircraft Based on Controlled Lagrangian Method.
32. A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection.
33. αDiff: cross-version binary code similarity detection with DNN.
34. LibD: scalable and precise third-party library detection in android markets.
35. Ordinal Zero-Shot Learning.
36. Adaptive fault-tolerant control for cooperative spacecraft rendezvous and docking.
37. Semi-Supervised Adaptive Label Distribution Learning for Facial Age Estimation.
38. Deep Age Distribution Learning for Apparent Age Estimation.
39. Research on Vehicle Taillight Detection and Semantic Recognition Based on Internet of Vehicle.
40. Deep Label Distribution Learning for Apparent Age Estimation.
41. Adaptive tracking control for a model helicopter with disturbances.
42. Effective fault localization based on minimum debugging frontier set.
43. Robust adaptive control for spacecraft cooperative rendezvous and docking.
44. Can We Make It Faster? Efficient May-Happen-in-Parallel Analysis Revisited.
45. An Extended Continuous Uncertain XML Data Model Research.
46. Modeling and analysis of the working process of the flat valve system of Mechanical Hydraulic Confined Piston Engine.
47. Parallelizing a machine translation decoder for multicore computer.
48. Adaptive backstepping control for a miniature autonomous helicopter.
49. Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code.
50. Trajectory Linearization Control for a quadrotor helicopter.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.