Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metric Sentiment Learning for Label Representation., , , , and . CIKM, page 1703-1712. ACM, (2021)LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution., , , , , and . USENIX Security Symposium, page 125-142. USENIX Association, (2022)Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing., , and . NDSS, The Internet Society, (2021)SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis., , , , , , , and . USENIX Security Symposium, page 2531-2548. USENIX Association, (2022)Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing., , , , and . RAID, page 1-15. USENIX Association, (2019)FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation., , , , , and . USENIX Security Symposium, page 1099-1114. USENIX Association, (2019)Cross-Modal Safety Alignment: Is textual unlearning all you need?, , , , , , , and . CoRR, (2024)Insider Threat Defense Strategies: Survey and Knowledge Integration., , , , , and . KSEM (5), volume 14888 of Lecture Notes in Computer Science, page 106-122. Springer, (2024)Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection., , , , , and . CoRR, (2024)Stopping Memory Disclosures via Diversification and Replicated Execution., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (1): 160-173 (2021)