Additive manufacturing: A machine learning model of process-structure-property linkages for machining behavior of Ti-6Al-4V X Gong, D Zeng, W Groeneveld-Meijer, G Manogharan Mater Sci Add Manuf 1 (6), 1-16, 2022 | 44 | 2022 |
Refining Indirect Call Targets at the Binary Level SH Kim, C Sun, D Zeng, G Tan The Network and Distributed System Security Symposium (NDSS) 2021, 2021 | 35 | 2021 |
Program-mandering: Quantitative privilege separation S Liu, D Zeng, Y Huang, F Capobianco, S McCamant, T Jaeger, G Tan Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 32 | 2019 |
DeepCatra: Learning flow‐and graph‐based behaviours for Android malware detection Y Wu, J Shi, P Wang, D Zeng, C Sun IET Information Security 17 (1), 118-130, 2023 | 27 | 2023 |
ReCFA: Resilient Control-Flow Attestation Y Zhang, X Liu, C Sun, D Zeng, G Tan, X Kan, S Ma Annual Computer Security Applications Conference, 311-322, 2021 | 20 | 2021 |
From debugging-information based binary-level type inference to cfg generation D Zeng, G Tan Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 20 | 2018 |
Abslearn: a gnn-based framework for aliasing and buffer-size information retrieval K Liang, J Tan, D Zeng, Y Huang, X Huang, G Tan Pattern Analysis and Applications 26 (3), 1171-1189, 2023 | 17 | 2023 |
Motion characteristics of cavitation bubble near the rigid wall with the driving of acoustic wave X Ye, A Zhang, D Zeng China Ocean Engineering 29 (1), 17-32, 2015 | 10 | 2015 |
Numerical simulation of bubble dynamics in an elastic vessel S Wang, A Zhang, Y Liu, D Zeng The European Physical Journal E 36, 1-7, 2013 | 10 | 2013 |
MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies D Zeng, B Niu, G Tan 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2022 | 6 | 2022 |
Binpointer: towards precise, sound, and scalable binary-level pointer analysis SH Kim, D Zeng, C Sun, G Tan Proceedings of the 31st ACM SIGPLAN International Conference on Compiler …, 2022 | 5 | 2022 |
podft: On Accelerating Dynamic Taint Analysis with Precise Path Optimization Z Tian, C Sun, D Zeng, G Tan Proceedings of NDSS Workshop on Binary Analysis Research (San Diego, CA), 2023 | 3 | 2023 |
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code C Sun, Y Ma, D Zeng, G Tan, S Ma, Y Wu IEEE Transactions on Dependable and Secure Computing 20 (2), 1461-1475, 2022 | 3 | 2022 |
{LibScan}: Towards More Precise {Third-Party} Library Identification for Android Applications Y Wu, C Sun, D Zeng, G Tan, S Ma, P Wang 32nd USENIX Security Symposium (USENIX Security 23), 3385-3402, 2023 | 2 | 2023 |
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data‐flow analysis C Sun, X Xu, Y Wu, D Zeng, G Tan, S Ma, P Wang IET Information Security 17 (4), 582-597, 2023 | 1 | 2023 |
Sliver: A Scalable Slicing-Based Verification for Information Flow Security X Rao, C Sun, D Zeng, Y Huang, G Tan IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
Evaluating the Attack Surface of Control Flow Integrity D Zeng The Pennsylvania State University, 2021 | | 2021 |