Seguir
Purui Su
Purui Su
Dirección de correo verificada de iscas.ac.cn
Título
Citado por
Citado por
Año
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3762018
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
NDSS, 2020
1362020
Binary code continent: Finer-grained control flow integrity for stripped binaries
M Wang, H Yin, AV Bhaskar, P Su, D Feng
Proceedings of the 31st annual computer security applications conference …, 2015
562015
A typical noisy covert channel in the IP protocol
H Qu, P Su, D Feng
38th Annual 2004 International Carnahan Conference on Security Technology …, 2004
512004
Towards efficient heap overflow discovery
X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng
26th USENIX Security Symposium (USENIX Security 17), 989-1006, 2017
452017
基于语义的恶意代码行为特征提取及检测方法
王蕊, 冯登国, 杨轶, 苏璞睿
软件学报 23 (2), 378-393, 2012
452012
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
442019
Detecting concurrency memory corruption vulnerabilities
Y Cai, B Zhu, R Meng, H Yun, L He, P Su, B Liang
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
422019
Notes on packet marking for IP traceback
DQ Li, PR Su, DG Feng
Journal of Software 15 (2), 250-258, 2004
422004
Capability-based security enforcement in named data networking
Q Li, PPC Lee, P Zhang, P Su, L He, K Ren
IEEE/ACM Transactions on Networking 25 (5), 2719-2730, 2017
392017
Automatic polymorphic exploit generation for software vulnerabilities
M Wang, P Su, Q Li, L Ying, Y Yang, D Feng
Security and Privacy in Communication Networks: 9th International ICST …, 2013
352013
IP 追踪中的自适应包标记
李德全, 徐一丁, 苏璞睿, 冯登国
电子学报 32 (8), 1334-1337, 2004
332004
Software and cyber security-a survey
刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民
Journal of Software 29 (1), 42-68, 2017
322017
Bind your phone number with caution: Automated user profiling through address book matching on smartphone
Y Cheng, L Ying, S Jiao, P Su, D Feng
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
302013
CloudSEC: A cloud architecture for composing collaborative security services
J Xu, J Yan, L He, P Su, D Feng
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
292010
P2P 信任模型中基于行为相似度的共谋团体识别模型
苗光胜, 冯登国, 苏璞睿
通信学报, 9-20, 2009
282009
移动社交应用的用户隐私泄漏问题研究
程瑶, 应凌云, 焦四辈, 苏璞睿, 冯登国
计算机学报 37 (001), 87-100, 2014
262014
基于攻击能力增长的网络安全分析模型
张海霞, 苏璞睿, 冯登国
计算机研究与发展 44 (12), 2012-2019, 2007
232007
Semantics-based malware behavior signature extraction and detection method
王蕊, 冯登国, 杨轶, 苏璞睿
Journal of Software 23 (2), 378-393, 2012
222012
恶意软件网络协议的语法和行为语义分析方法
应凌云, 杨轶, 冯登国, 苏璞睿
软件学报 22 (007), 1676-1689, 2011
212011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20