464 results on '"Wenke Lee"'
Search Results
2. Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation.
3. RL-ARNE: A Reinforcement Learning Algorithm for Computing Average Reward Nash Equilibrium of Nonzero-Sum Stochastic Games.
4. Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.
5. Geometric Implications of Classification on Reducing Open Space Risk.
6. WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web.
7. Towards Generic Database Management System Fuzzing.
8. Optimal Classification-based Anomaly Detection with Neural Networks: Theory and Practice.
9. Can Transformers Reason Logically? A Study in SAT Solving.
10. BACKRUNNER: Mitigating Smart Contract Attacks in the Real World.
11. Non-Robust Features are Not Always Useful in One-Class Classification.
12. Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection.
13. VulChecker: Graph-based Vulnerability Localization in Source Code.
14. µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
15. PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
16. TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks.
17. Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.
18. Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats.
19. DeView: Confining Progressive Web Applications by Debloating Web APIs.
20. DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection.
21. Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.
22. The Creation and Detection of Deepfakes: A Survey.
23. Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process.
24. Revisiting Non-separable Binary Classification and its Applications in Anomaly Detection.
25. SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization.
26. Abusing Hidden Properties to Attack the Node.js Ecosystem.
27. ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems.
28. Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
29. DeepReflect: Discovering Malicious Functionality through Binary Reconstruction.
30. One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
31. Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis.
32. Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
33. Identifying Behavior Dispatchers for Malware Analysis.
34. Cryptographic Key Derivation from Biometric Inferences for Remote Authentication.
35. Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach.
36. On the Feasibility of Automating Stock Market Manipulation.
37. SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
38. Slimium: Debloating the Chromium Browser with Feature Subsetting.
39. Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
40. Stopping Memory Disclosures via Diversification and Replicated Execution.
41. Modeling Large-Scale Manipulation in Open Stock Markets.
42. RAZOR: A Framework for Post-deployment Software Debloating.
43. A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
44. Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces.
45. Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning.
46. Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge.
47. Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.
48. A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.
49. SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.
50. The Threat of Offensive AI to Organizations.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.