Author of the publication

iDEV: exploring and exploiting semantic deviations in ARM instruction processing.

, , , and . ISSTA, page 580-592. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploit-oriented Automated Information Leakage., , , and . Int. J. Softw. Informatics, 12 (3): 331-350 (2022)Weighted Supervised Contrastive Learning and Domain Mixture for Generalized Person Re-Identification., , and . ICIP, page 2606-2610. IEEE, (2022)Debiased Contrastive Curriculum Learning for Progressive Generalizable Person Re-Identification., , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (10): 5947-5958 (October 2023)AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects., , , , , , , , and . USENIX Security Symposium, page 4229-4246. USENIX Association, (2023)Camera-Aware Recurrent Learning and Earth Mover's Test-Time Adaption for Generalizable Person Re-Identification., , and . IEEE Trans. Circuits Syst. Video Technol., 34 (1): 357-370 (January 2024)VScape: Assessing and Escaping Virtual Call Protections., , , , and . USENIX Security Symposium, page 1719-1736. USENIX Association, (2021)iDEV: exploring and exploiting semantic deviations in ARM instruction processing., , , and . ISSTA, page 580-592. ACM, (2021)Multi-Scale Query-Adaptive Convolution for Generalizable Person Re-Identification., , and . ICME, page 2411-2416. IEEE, (2023)Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration., , , , , , , and . Comput. Secur., (2023)1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing., , , , , , , and . ISSTA, page 867-879. ACM, (2023)