关注
Wenhao Wang
Wenhao Wang
在 google.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Seismic: Secure in-lined script monitors for interrupting cryptojacks
W Wang, B Ferrell, X Xu, KW Hamlen, S Hao
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
942018
{CONFIRM}: Evaluating compatibility and relevance of control-flow integrity protections for modern software
X Xu, M Ghaffarinia, W Wang, KW Hamlen, Z Lin
28th USENIX Security Symposium (USENIX Security 19), 1805-1821, 2019
462019
Object flow integrity
W Wang, X Xu, KW Hamlen
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
182017
Comparing Twitter and Chinese native microblog
W Wang, B Wu
2011 Second Worldwide Cybersecurity Summit (WCS), 1-4, 2011
62011
Towards interface-driven COTS binary hardening
X Xu, W Wang, KW Hamlen, Z Lin
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018
52018
A complementary method to determine semantic orientations of words based on WordNet
X Lin, W Wang, B Wu
2011 Eighth International Conference on Fuzzy Systems and Knowledge …, 2011
42011
Source-Free, Component-driven Software Security Hardening
W Wang
The University of Texas at Dallas, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–7