Send hardest problems my way: Probabilistic path prioritization for hybrid fuzzing L Zhao, Y Duan, J XUAN Network and Distributed System Security Symposium (NDSS), 2019 | 152 | 2019 |
Patchscope: Memory object centric patch diffing L Zhao, Y Zhu, J Ming, Y Zhang, H Zhang, H Yin Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 24 | 2020 |
Capturing the persistence of facial expression features for deepfake video detection Y Zhao, W Ge, W Li, R Wang, L Zhao, J Ming Information and Communications Security: 21st International Conference …, 2020 | 22 | 2020 |
Smartpi: Understanding permission implications of android apps from user reviews R Wang, Z Wang, B Tang, L Zhao, L Wang IEEE Transactions on Mobile Computing 19 (12), 2933-2945, 2019 | 20 | 2019 |
Execution-aware fault localization based on the control flow analysis L Zhao, L Wang, Z Xiong, D Gao Information Computing and Applications, 158-165, 2010 | 16 | 2010 |
Context-Aware Fault Localization via Control Flow Analysis L Zhao, L Wang, X Yin Journal of Software 6 (10), 1977-1984, 2011 | 15 | 2011 |
Niffler: A Context‐Aware and User‐Independent Side‐Channel Attack System for Password Inference B Tang, Z Wang, R Wang, L Zhao, L Wang Wireless Communications and Mobile Computing 2018 (1), 4627108, 2018 | 9 | 2018 |
Regression identification of coincidental correctness via weighted clustering X Yang, M Liu, M Cao, L Zhao, L Wang 2015 IEEE 39th Annual Computer Software and Applications Conference 2, 115-120, 2015 | 9 | 2015 |
PAFL: Fault Localization via Noise Reduction on Coverage Vector. L Zhao, Z Zhang, L Wang, X Yin SEKE, 203-206, 2011 | 9 | 2011 |
Rapidfuzz: Accelerating fuzzing via generative adversarial networks A Ye, L Wang, L Zhao, J Ke, W Wang, Q Liu Neurocomputing 460, 195-204, 2021 | 8 | 2021 |
{VScape}: Assessing and escaping virtual call protections K Chen, C Zhang, T Yin, X Chen, L Zhao 30th USENIX Security Symposium (USENIX Security 21), 1719-1736, 2021 | 8 | 2021 |
Attack provenance tracing in cyberspace: solutions, challenges and future directions C Tan, Q Wang, L Wang, L Zhao IEEE network 33 (2), 174-180, 2018 | 7 | 2018 |
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level R Wang, P Liu, L Zhao, Y Cheng, L Wang Journal of Systems and Software 124, 153-168, 2017 | 7 | 2017 |
Statistical fault localization via semi-dynamic program slicing R Yu, L Zhao, L Wang, X Yin 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 7 | 2011 |
Alphuzz: Monte carlo search on seed-mutation tree for coverage-guided fuzzing Y Zhao, X Wang, L Zhao, Y Cheng, H Yin Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 6 | 2022 |
Collaborative reversing of input formats and program data structures for security applications L Zhao, X Ren, M Liu, L Wang, H Zhang, H Zhang China Communications 11 (9), 135-147, 2014 | 6 | 2014 |
vpatcher: Vmi-based transparent data patching to secure software in the cloud H Zhang, L Zhao, L Xu, L Wang, D Wu 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 5 | 2014 |
Exposing deepfakes via localizing the manipulated artifacts W Li, Q Wang, R Wang, L Zhao, L Wang International Conference on Information and Communications Security, 3-20, 2021 | 4 | 2021 |
Probabilistic path prioritization for hybrid fuzzing L Zhao, P Cao, Y Duan, H Yin, J Xuan IEEE Transactions on Dependable and Secure Computing 19 (3), 1955-1973, 2020 | 4 | 2020 |
Fault localization guided execution comparison for failure comprehension M Liu, P Liu, X Yang, L Zhao 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 4 | 2016 |