Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metric Sentiment Learning for Label Representation., , , , and . CIKM, page 1703-1712. ACM, (2021)SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis., , , , , , , and . USENIX Security Symposium, page 2531-2548. USENIX Association, (2022)LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution., , , , , and . USENIX Security Symposium, page 125-142. USENIX Association, (2022)Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing., , and . NDSS, The Internet Society, (2021)Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing., , , , and . RAID, page 1-15. USENIX Association, (2019)FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation., , , , , and . USENIX Security Symposium, page 1099-1114. USENIX Association, (2019)Cross-Modal Safety Alignment: Is textual unlearning all you need?, , , , , , , and . CoRR, (2024)Insider Threat Defense Strategies: Survey and Knowledge Integration., , , , , and . KSEM (5), volume 14888 of Lecture Notes in Computer Science, page 106-122. Springer, (2024)Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity., , , , and . ECML/PKDD (3), volume 11053 of Lecture Notes in Computer Science, page 389-404. Springer, (2018)SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation., , , , and . SP, page 39-53. IEEE, (2020)