DANCe: Dynamic Adaptive Neuron Coverage for Fuzzing Deep Neural Networks | 0 | 0.34 | 2022 |
Probabilistic Path Prioritization for Hybrid Fuzzing | 0 | 0.34 | 2022 |
TridentShell: A Covert and Scalable Backdoor Injection Attack on Web Applications | 0 | 0.34 | 2021 |
RapidFuzz: Accelerating fuzzing via Generative Adversarial Networks | 1 | 0.35 | 2021 |
VScape: Assessing and Escaping Virtual Call Protections | 0 | 0.34 | 2021 |
Exposing DeepFakes via Localizing the Manipulated Artifacts | 0 | 0.34 | 2021 |
SmartPI: Understanding Permission Implications of Android Apps from User Reviews | 1 | 0.37 | 2020 |
PatchScope: Memory Object Centric Patch Diffing | 1 | 0.34 | 2020 |
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions | 0 | 0.34 | 2019 |
Send Hardest Problems My Way - Probabilistic Path Prioritization for Hybrid Fuzzing. | 0 | 0.34 | 2019 |
Defending Against ROP Attacks with Nearly Zero Overhead | 0 | 0.34 | 2019 |
Capturing The Persistence Of Facial Expression Features For Deepfake Video Detection | 0 | 0.34 | 2019 |
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference. | 1 | 0.34 | 2018 |
Baseline Is Fragile: On the Effectiveness of Stack Pivot Defense | 0 | 0.34 | 2016 |
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis | 1 | 0.34 | 2015 |
vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud | 1 | 0.35 | 2014 |
A Fault Localization Framework To Alleviate The Impact Of Execution Similarity | 0 | 0.34 | 2013 |
Learning fine-grained structured input for memory corruption detection | 0 | 0.34 | 2012 |
Context-Aware Fault Localization via Control Flow Analysis. | 6 | 0.43 | 2011 |
Statistical Fault Localization via Semi-dynamic Program Slicing | 0 | 0.34 | 2011 |
Study on the Internet Behavior's Activity Oriented to Network Survivability | 1 | 0.42 | 2008 |
A Secure Network Admission and Routing Model Based on Trust Theory | 0 | 0.34 | 2008 |