Author of the publication

SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone Detection.

, , , and . Trustcom/BigDataSE/ISPA, page 511-518. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NEUZZ: Efficient Fuzzing with Neural Program Smoothing., , , , , and . IEEE Symposium on Security and Privacy, page 803-817. IEEE, (2019)Promoting Citizen's Learning Experience in Smart Cities., , and . ICBL, volume 10309 of Lecture Notes in Computer Science, page 15-25. Springer, (2017)Chablis: Fast and General Transactions in Geo-Distributed Systems., , , and . CIDR, www.cidrdb.org, (2024)StateFormer: fine-grained type recovery from binaries using generative state modeling., , , , , , , , , and . ESEC/SIGSOFT FSE, page 690-702. ACM, (2021)Causal Transportability for Visual Recognition., , , , , , and . CVPR, page 7511-7521. IEEE, (2022)Sound and precise analysis of parallel programs through schedule specialization., , , , and . PLDI, page 205-216. ACM, (2012)XRP: In-Kernel Storage Functions with eBPF., , , , , , , , , and 1 other author(s). OSDI, page 375-393. USENIX Association, (2022)Efficient Formal Safety Analysis of Neural Networks., , , , and . NeurIPS, page 6369-6379. (2018)Automatically Generating Malicious Disks using Symbolic Execution., , , , and . S&P, page 243-257. IEEE Computer Society, (2006)Concurrency Attacks., , , and . HotPar, USENIX Association, (2012)