Author of the publication

Codee: A Tensor Embedding Scheme for Binary Code Search.

, , , , and . IEEE Trans. Software Eng., 48 (7): 2224-2244 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers., , , , , and . CoRR, (2020)MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware., , , , , and . AsiaCCS, page 990-1003. ACM, (2022)OS-Sommelier: memory-only operating system fingerprinting in the cloud., , , , and . SoCC, page 5. ACM, (2012)Enforcing system-wide control flow integrity for exploit detection and diagnosis., , and . AsiaCCS, page 311-322. ACM, (2013)DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis., , , and . CCS, page 606-618. ACM, (2018)Polyglot: automatic extraction of protocol message format using dynamic binary analysis., , , and . CCS, page 317-329. ACM, (2007)Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation., , , , , and . CCS, page 66-77. ACM, (2014)DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly., , , and . USENIX Security Symposium, page 2709-2725. USENIX Association, (2022)HookFinder: Identifying and Understanding Malware Hooking Behaviors., , and . NDSS, The Internet Society, (2008)TransBlocker: Transforming and Taming Privacy-Breaching Android Applications., and . NDSS, The Internet Society, (2013)