Author of the publication

XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning.

, , , and . EIDWT, volume 193 of Lecture Notes on Data Engineering and Communications Technologies, page 307-317. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse., , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 296-309. Springer, (2017)A program behavior recognition algorithm based on assembly instruction sequence similarity., , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 13-20. Springer, (2016)Detecting Malware Based on Opcode N-Gram and Machine Learning., , and . 3PGCIC, volume 13 of Lecture Notes on Data Engineering and Communications Technologies, page 99-110. Springer, (2017)Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification., , , , , and . J. Multim., 6 (4): 320-328 (2011)Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism., , and . IMIS, volume 773 of Advances in Intelligent Systems and Computing, page 343-353. Springer, (2018)Bidirectional LSTM: An Innovative Approach for Phishing URL Identification., , and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 326-337. Springer, (2019)A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively., , and . IMIS, page 292-295. IEEE Computer Society, (2015)Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol., , , , , and . IMIS, volume 279 of Lecture Notes in Networks and Systems, page 144-155. Springer, (2021)Simulation-Based Fuzzing for Smart IoT Devices., , , , , and . IMIS, volume 279 of Lecture Notes in Networks and Systems, page 304-313. Springer, (2021)IPT-CFI: Control Flow Integrity Vulnerability Detection Based on Intel Processor Trace., , and . EIDWT, volume 161 of Lecture Notes on Data Engineering and Communications Technologies, page 491-499. Springer, (2023)