Kamu erişimi zorunlu olan makaleler - Kang LiDaha fazla bilgi edinin
Hiçbir yerde sunulmuyor: 4
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses
Z Zhang, W He, Y Cheng, W Wang, Y Gao, D Liu, K Li, S Nepal, A Fu, ...
IEEE Transactions on Dependable and Secure Computing 20 (5), 3716-3733, 2022
Zorunlu olanlar: National Natural Science Foundation of China
Scaling camouflage: Content disguising attack against computer vision applications
Y Chen, C Shen, C Wang, Q Xiao, K Li, Y Chen
IEEE Transactions on Dependable and Secure Computing 18 (5), 2017-2028, 2020
Zorunlu olanlar: National Natural Science Foundation of China
Analysis and measurement of zone dependency in the domain name system
J Jiang, J Zhang, H Duan, K Li, W Liu
2018 IEEE International Conference on Communications (ICC), 1-7, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Path sensitive fuzzing for native applications
S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen
IEEE Transactions on Dependable and Secure Computing 19 (3), 1544-1561, 2020
Zorunlu olanlar: National Natural Science Foundation of China
Bir yerde sunuluyor: 14
Collafl: Path sensitive fuzzing
S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen
2018 IEEE Symposium on Security and Privacy (SP), 679-696, 2018
Zorunlu olanlar: National Natural Science Foundation of China
When HTTPS meets CDN: A case of authentication in delegated service
J Liang, J Jiang, H Duan, K Li, T Wan, J Wu
2014 IEEE Symposium on Security and Privacy, 67-82, 2014
Zorunlu olanlar: National Natural Science Foundation of China
Large online social footprints--an emerging threat
D Irani, S Webb, K Li, C Pu
2009 International conference on computational science and engineering 3 …, 2009
Zorunlu olanlar: US National Institutes of Health
Modeling unintended personal-information leakage from multiple online social networks
D Irani, S Webb, K Li, C Pu
IEEE Internet Computing 15 (3), 13-19, 2011
Zorunlu olanlar: US National Institutes of Health
Seeing is not believing: Camouflage attacks on image scaling algorithms
Q Xiao, Y Chen, C Shen, Y Chen, K Li
28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019
Zorunlu olanlar: National Natural Science Foundation of China
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ...
NDSS 122, 132, 2018
Zorunlu olanlar: US National Science Foundation, US Department of Defense
{SoftTRR}: Protect page tables against rowhammer attacks using software-only target row refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, S Nepal, Y Gao, K Li, ...
2022 USENIX Annual Technical Conference (USENIX ATC 22), 399-414, 2022
Zorunlu olanlar: Chinese Academy of Sciences, National Natural Science Foundation of China
Forwarding-Loop Attacks in Content Delivery Networks.
J Chen, X Zheng, HX Duan, J Liang, J Jiang, K Li, T Wan, V Paxson
NDSS, 2016
Zorunlu olanlar: US National Science Foundation, National Natural Science Foundation of China
GREBE: Unveiling exploitation potential for Linux kernel bugs
Z Lin, Y Chen, Y Wu, D Mu, C Yu, X Xing, K Li
2022 IEEE Symposium on Security and Privacy (SP), 2078-2095, 2022
Zorunlu olanlar: US National Science Foundation, US Department of Defense
Detecting virtualization specific vulnerabilities in cloud computing environment
G Zhu, Y Yin, R Cai, K Li
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 743-748, 2017
Zorunlu olanlar: US National Science Foundation
Whistleblower: A system-level empirical study on rowhammer
W He, Z Zhang, Y Cheng, W Wang, W Song, Y Gao, Q Zhang, K Li, D Liu, ...
IEEE Transactions on Computers, 2023
Zorunlu olanlar: National Natural Science Foundation of China
Detecting localized adversarial examples: A generic approach using critical region analysis
F Li, X Liu, X Zhang, Q Li, K Sun, K Li
IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021
Zorunlu olanlar: US Department of Defense, National Natural Science Foundation of China
BitMine: An end-to-end tool for detecting rowhammer vulnerability
Z Zhang, W He, Y Cheng, W Wang, Y Gao, M Wang, K Li, S Nepal, ...
IEEE Transactions on Information Forensics and Security 16, 5167-5181, 2021
Zorunlu olanlar: National Natural Science Foundation of China
pbse: Phase-based symbolic execution
Q Xiao, Y Chen, C Wu, K Li, J Mao, S Guo, Y Shi
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Zorunlu olanlar: US National Science Foundation, National Natural Science Foundation of China
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir