Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IntelliAV: Building an Effective On-Device Android Malware Detector., , and . CoRR, (2018)PTAuth: Temporal Memory Safety via Robust Points-to Authentication., , and . CoRR, (2020)DLLMiner: structural mining for malware detection., , , , and . Secur. Commun. Networks, 8 (18): 3311-3322 (2015)PTAuth: Temporal Memory Safety via Robust Points-to Authentication., , and . USENIX Security Symposium, page 1037-1054. USENIX Association, (2021)Microsoft Malware Classification Challenge., , , , and . CoRR, (2018)IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices., , and . CD-MAKE, volume 10410 of Lecture Notes in Computer Science, page 137-154. Springer, (2017)Novel feature extraction, selection and fusion for effective malware family classification., , , , and . CoRR, (2015)Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification., , , , and . CODASPY, page 183-194. ACM, (2016)MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing., , , , and . RAID, page 77-92. USENIX Association, (2020)Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code., , , and . USENIX Security Symposium, page 2025-2040. USENIX Association, (2021)