Lemna: Explaining deep learning based security applications W Guo, D Mu, J Xu, P Su, G Wang, X Xing proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 376 | 2018 |
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su NDSS, 2020 | 136 | 2020 |
Binary code continent: Finer-grained control flow integrity for stripped binaries M Wang, H Yin, AV Bhaskar, P Su, D Feng Proceedings of the 31st annual computer security applications conference …, 2015 | 56 | 2015 |
A typical noisy covert channel in the IP protocol H Qu, P Su, D Feng 38th Annual 2004 International Carnahan Conference on Security Technology …, 2004 | 51 | 2004 |
Towards efficient heap overflow discovery X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng 26th USENIX Security Symposium (USENIX Security 17), 989-1006, 2017 | 45 | 2017 |
基于语义的恶意代码行为特征提取及检测方法 王蕊, 冯登国, 杨轶, 苏璞睿 软件学报 23 (2), 378-393, 2012 | 45 | 2012 |
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics. ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su NDSS, 2019 | 44 | 2019 |
Detecting concurrency memory corruption vulnerabilities Y Cai, B Zhu, R Meng, H Yun, L He, P Su, B Liang Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 42 | 2019 |
Notes on packet marking for IP traceback DQ Li, PR Su, DG Feng Journal of Software 15 (2), 250-258, 2004 | 42 | 2004 |
Capability-based security enforcement in named data networking Q Li, PPC Lee, P Zhang, P Su, L He, K Ren IEEE/ACM Transactions on Networking 25 (5), 2719-2730, 2017 | 39 | 2017 |
Automatic polymorphic exploit generation for software vulnerabilities M Wang, P Su, Q Li, L Ying, Y Yang, D Feng Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 35 | 2013 |
IP 追踪中的自适应包标记 李德全, 徐一丁, 苏璞睿, 冯登国 电子学报 32 (8), 1334-1337, 2004 | 33 | 2004 |
Software and cyber security-a survey 刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民 Journal of Software 29 (1), 42-68, 2017 | 32 | 2017 |
Bind your phone number with caution: Automated user profiling through address book matching on smartphone Y Cheng, L Ying, S Jiao, P Su, D Feng Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 30 | 2013 |
CloudSEC: A cloud architecture for composing collaborative security services J Xu, J Yan, L He, P Su, D Feng 2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010 | 29 | 2010 |
P2P 信任模型中基于行为相似度的共谋团体识别模型 苗光胜, 冯登国, 苏璞睿 通信学报, 9-20, 2009 | 28 | 2009 |
移动社交应用的用户隐私泄漏问题研究 程瑶, 应凌云, 焦四辈, 苏璞睿, 冯登国 计算机学报 37 (001), 87-100, 2014 | 26 | 2014 |
基于攻击能力增长的网络安全分析模型 张海霞, 苏璞睿, 冯登国 计算机研究与发展 44 (12), 2012-2019, 2007 | 23 | 2007 |
Semantics-based malware behavior signature extraction and detection method 王蕊, 冯登国, 杨轶, 苏璞睿 Journal of Software 23 (2), 378-393, 2012 | 22 | 2012 |
恶意软件网络协议的语法和行为语义分析方法 应凌云, 杨轶, 冯登国, 苏璞睿 软件学报 22 (007), 1676-1689, 2011 | 21 | 2011 |