default search action
Chengyu Song
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2016
- [b1]Chengyu Song:
Preventing exploits against memory corruption vulnerabilities. Georgia Institute of Technology, Atlanta, GA, USA, 2016
Journal Articles
- 2024
- [j12]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks Using the Return Stack Buffer. IEEE Des. Test 41(2): 47-55 (2024) - 2023
- [j11]Chengyu Song, Shan Zhu, Yanyan Liu, Wei Zhang, Zhi Wang, Wangxiao Li, Zhenye Sun, Peng Zhao, Shengzhang Tian:
DCNAS-Net: deformation convolution and neural architecture search detection network for bone marrow oedema. BMC Medical Imaging 23(1): 45 (2023) - [j10]Ruyi Zhang, Peng Wang, Yanzhu Bian, Yan Fan, Jianming Li, Xuehui Liu, Jie Shen, Yujing Hu, Xianghe Liao, He Wang, Chengyu Song, Wangxiao Li, Xiaojie Wang, Momo Sun, Jianping Zhang, Miao Wang, Shen Wang, Yiming Shen, Xuemei Zhang, Qiang Jia, Jian Tan, Ning Li, Sen Wang, Lingyun Xu, Weiming Wu, Wei Zhang, Zhaowei Meng:
Establishment and validation of an AI-aid method in the diagnosis of myocardial perfusion imaging. BMC Medical Imaging 23(1): 84 (2023) - [j9]Taihua Shao, Chengyu Song, Jianming Zheng, Fei Cai, Honghui Chen:
Exploring Internal and External Interactions for Semi-Structured Multivariate Attributes in Job-Resume Matching. Int. J. Intell. Syst. 2023: 1-16 (2023) - [j8]Chengyu Song, Fei Cai, Jianming Zheng, Xiang Zhao, Taihua Shao:
AugPrompt: Knowledgeable augmented-trigger prompt for few-shot event classification. Inf. Process. Manag. 60(4): 103153 (2023) - [j7]Siyuan Wang, Jianming Zheng, Fei Cai, Chengyu Song, Xueshan Luo:
MsPrompt: Multi-step prompt learning for debiasing few-shot event detection. Inf. Process. Manag. 60(6): 103509 (2023) - [j6]Yitong Wang, Fei Cai, Zhiqiang Pan, Chengyu Song:
Self-supervised graph learning with target-adaptive masking for session-based recommendation. Frontiers Inf. Technol. Electron. Eng. 24(1): 73-87 (2023) - [j5]Chengyu Song, Fei Cai, Mengru Wang, Jianming Zheng, Taihua Shao:
TaxonPrompt: Taxonomy-aware curriculum prompt learning for few-shot event classification. Knowl. Based Syst. 264: 110290 (2023) - 2022
- [j4]Fei Cai, Zhiqiang Pan, Chengyu Song, Xin Zhang:
Exploring latent connections in graph neural networks for session-based recommendation. Inf. Retr. J. 25(3): 329-363 (2022) - 2021
- [j3]Mingyi Huang, Chengyu Song:
ARMPatch: A Binary Patching Framework for ARM-based IoT Devices. J. Web Eng. 20(6) (2021) - [j2]Kangjie Lu, Meng Xu, Chengyu Song, Taesoo Kim, Wenke Lee:
Stopping Memory Disclosures via Diversification and Replicated Execution. IEEE Trans. Dependable Secur. Comput. 18(1): 160-173 (2021) - 2016
- [j1]Meng Xu, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee, Chenxiong Qian, Sangho Lee, Taesoo Kim:
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques. ACM Comput. Surv. 49(2): 38:1-38:47 (2016)
Conference and Workshop Papers
- 2024
- [c63]Trishna Chakraborty, Erfan Shayegani, Zikui Cai, Nael B. Abu-Ghazaleh, M. Salman Asif, Yue Dong, Amit K. Roy-Chowdhury, Chengyu Song:
Can Textual Unlearning Solve Cross-Modality Safety Alignment? EMNLP (Findings) 2024: 9830-9844 - [c62]Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. EuroS&P 2024: 580-599 - [c61]Chengyu Song, Jingjing Zhang, Linru Ma, Xinxin Hu, Jianming Zheng, Lin Yang:
Insider Threat Defense Strategies: Survey and Knowledge Integration. KSEM (5) 2024: 106-122 - [c60]Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, Chengyu Song:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. MSR 2024: 63-74 - [c59]Zhengchuan Liang, Xiaochen Zou, Chengyu Song, Zhiyun Qian:
K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel. NDSS 2024 - [c58]Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul L. Yu, Srikanth V. Krishnamurthy:
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks. USENIX Security Symposium 2024 - 2023
- [c57]Ju Chen, Chengyu Song, Heng Yin:
R-Fuzz at SBFT'2023. SBFT 2023: 82-83 - [c56]Abhishek Aich, Shasha Li, Chengyu Song, M. Salman Asif, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury:
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks. WACV 2023: 1308-1318 - 2022
- [c55]Zikui Cai, Xinxin Xie, Shasha Li, Mingjun Yin, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif:
Context-Aware Transfer Attacks for Object Detection. AAAI 2022: 149-157 - [c54]Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif:
Zero-Query Transfer Attacks on Context-Aware Object Detectors. CVPR 2022: 15004-15014 - [c53]Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu:
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel. NDSS 2022 - [c52]Abhishek Aich, Calvin-Khang Ta, Akash Gupta, Chengyu Song, Srikanth V. Krishnamurthy, M. Salman Asif, Amit Roy-Chowdhury:
GAMA: Generative Adversarial Multi-Object Scene Attacks. NeurIPS 2022 - [c51]Zikui Cai, Chengyu Song, Srikanth Krishnamurthy, Amit Roy-Chowdhury, Salman Asif:
Blackbox Attacks via Surrogate Ensemble Search. NeurIPS 2022 - [c50]Ju Chen, Jinghan Wang, Chengyu Song, Heng Yin:
JIGSAW: Efficient and Scalable Path Constraints Fuzzing. SP 2022: 18-35 - [c49]Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi:
LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution. USENIX Security Symposium 2022: 125-142 - [c48]Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin:
SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis. USENIX Security Symposium 2022: 2531-2548 - [c47]Mingjun Yin, Shasha Li, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
ADC: Adversarial attacks against object Detection that evade Context consistency checks. WACV 2022: 2836-2845 - 2021
- [c46]Chengyu Song, Fei Cai, Jianming Zheng, Wanyu Chen, Zhiqiang Pan:
Metric Sentiment Learning for Label Representation. CIKM 2021: 1703-1712 - [c45]Mingjun Yin, Shasha Li, Zikui Cai, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes. ICCV 2021: 7838-7847 - [c44]Jinghan Wang, Chengyu Song, Heng Yin:
Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. NDSS 2021 - [c43]Shasha Li, Abhishek Aich, Shitong Zhu, M. Salman Asif, Chengyu Song, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations. NeurIPS 2021: 2085-2096 - 2020
- [c42]Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi, Hai Jin:
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. ASPLOS 2020: 1263-1276 - [c41]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song, Srikanth V. Krishnamurthy, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. ECCV (23) 2020: 396-413 - [c40]Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. NDSS 2020 - [c39]Atri Bhattacharyya, Andrés Sánchez, Esmaeil Mohammadian Koruyeh, Nael B. Abu-Ghazaleh, Chengyu Song, Mathias Payer:
SpecROP: Speculative Exploitation of ROP Chains. RAID 2020: 1-16 - [c38]Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul L. Yu:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. ESEC/SIGSOFT FSE 2020: 221-232 - [c37]Suhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee:
CrFuzz: fuzzing multi-purpose programs through input validation. ESEC/SIGSOFT FSE 2020: 690-700 - [c36]Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation. SP 2020: 39-53 - 2019
- [c35]Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Paul L. Yu:
Principled Unearthing of TCP Side Channel Vulnerabilities. CCS 2019: 211-224 - [c34]Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael B. Abu-Ghazaleh:
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. DAC 2019: 60 - [c33]Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Paul L. Yu:
Figment: Fine-grained Permission Management for Mobile Apps. INFOCOM 2019: 1405-1413 - [c32]Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. ASE 2019: 924-935 - [c31]Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems. NDSS 2019 - [c30]Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. RAID 2019: 1-15 - [c29]Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. USENIX Security Symposium 2019: 1099-1114 - 2018
- [c28]Md. Lutfor Rahman, Ajaya Neupane, Chengyu Song:
IAC: On the Feasibility of Utilizing Neural Signals for Access Control. ACSAC 2018: 641-652 - [c27]Ioannis Gasparis, Azeem Aqil, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Edward Colbert:
Droid M+: Developer Support for Imbibing Android's New Permission Model. AsiaCCS 2018: 765-776 - [c26]Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick D. McDaniel:
IotSan: fortifying the safety of IoT systems. CoNEXT 2018: 191-203 - [c25]Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin:
Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing. NDSS 2018 - [c24]Md. Lutfor Rahman, Sharmistha Bardhan, Ajaya Neupane, Evangelos E. Papalexakis, Chengyu Song:
Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity. ECML/PKDD (3) 2018: 389-404 - [c23]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. WOOT @ USENIX Security Symposium 2018 - 2017
- [c22]Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Your state is not mine: a closer look at evading stateful internet censorship. Internet Measurement Conference 2017: 114-127 - [c21]Ren Ding, Chenxiong Qian, Chengyu Song, William Harris, Taesoo Kim, Wenke Lee:
Efficient Protection of Path-Sensitive Control Security. USENIX Security Symposium 2017: 131-148 - [c20]Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Detecting Android Root Exploits by Learning from Root Providers. USENIX Security Symposium 2017: 1129-1144 - 2016
- [c19]Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. CCS 2016: 920-932 - [c18]Chengyu Song, Byoungyoung Lee, Kangjie Lu, William Harris, Taesoo Kim, Wenke Lee:
Enforcing Kernel Security Invariants with Data Flow Integrity. NDSS 2016 - [c17]Chao Zhang, Dawn Song, Scott A. Carr, Mathias Payer, Tongxin Li, Yu Ding, Chengyu Song:
VTrust: Regaining Trust on Virtual Calls. NDSS 2016 - [c16]Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, Yunheung Paek:
HDFI: Hardware-Assisted Data-Flow Isolation. IEEE Symposium on Security and Privacy 2016: 1-17 - 2015
- [c15]Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee:
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. CCS 2015: 280-291 - [c14]Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song:
JITScope: Protecting web users from control-flow hijacking attacks. INFOCOM 2015: 567-575 - [c13]Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - [c12]Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski:
Exploiting and Protecting Dynamic Code Generation. NDSS 2015 - [c11]Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song:
VTint: Protecting Virtual Function Tables' Integrity. NDSS 2015 - [c10]Changwoo Min, Sanidhya Kashyap, Byoungyoung Lee, Chengyu Song, Taesoo Kim:
Cross-checking semantic correctness: the case of finding file system bugs. SOSP 2015: 361-377 - [c9]Byoungyoung Lee, Chengyu Song, Taesoo Kim, Wenke Lee:
Type Casting Verification: Stopping an Emerging Attack Vector. USENIX Security Symposium 2015: 81-96 - 2014
- [c8]Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee:
A11y Attacks: Exploiting Accessibility in Operating Systems. CCS 2014: 103-115 - [c7]Tielei Wang, Chengyu Song, Wenke Lee:
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. DIMVA 2014: 255-275 - [c6]Billy Lau, Simon P. Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva:
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud. USENIX Security Symposium 2014: 33-48 - 2012
- [c5]Chengyu Song, Paul Royal, Wenke Lee:
Impeding Automated Malware Analysis with Environment-sensitive Malware. HotSec 2012 - 2011
- [c4]Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde, Brian Mastropietro:
PEASOUP: preventing exploits against software of uncertain provenance (position paper). SESS@ICSE 2011: 43-49 - 2010
- [c3]Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye:
Preventing drive-by download via inter-module communication monitoring. AsiaCCS 2010: 124-134 - 2008
- [c2]Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou:
Studying Malicious Websites and the Underground Economy on the Chinese Web. WEIS 2008 - 2007
- [c1]Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou:
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. ICICS 2007: 438-451
Parts in Books or Collections
- 2009
- [p1]Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou:
Studying Malicious Websites and the Underground Economy on the Chinese Web. Managing Information Risk and the Economics of Security 2009: 225-244
Informal and Other Publications
- 2024
- [i21]Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, Chengyu Song:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. CoRR abs/2402.05212 (2024) - [i20]Trishna Chakraborty, Erfan Shayegani, Zikui Cai, Nael B. Abu-Ghazaleh, M. Salman Asif, Yue Dong, Amit K. Roy-Chowdhury, Chengyu Song:
Cross-Modal Safety Alignment: Is textual unlearning all you need? CoRR abs/2406.02575 (2024) - [i19]Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang:
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection. CoRR abs/2408.08902 (2024) - 2023
- [i18]Siyuan Wang, Jianming Zheng, Xuejun Hu, Fei Cai, Chengyu Song, Xueshan Luo:
MsPrompt: Multi-step Prompt Learning for Debiasing Few-shot Event Detection. CoRR abs/2305.09335 (2023) - 2022
- [i17]Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif:
Zero-Query Transfer Attacks on Context-Aware Object Detectors. CoRR abs/2203.15230 (2022) - [i16]Zikui Cai, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif:
Blackbox Attacks via Surrogate Ensemble Search. CoRR abs/2208.03610 (2022) - [i15]Abhishek Aich, Calvin-Khang Ta, Akash Gupta, Chengyu Song, Srikanth V. Krishnamurthy, M. Salman Asif, Amit K. Roy-Chowdhury:
GAMA: Generative Adversarial Multi-Object Scene Attacks. CoRR abs/2209.09502 (2022) - [i14]Abhishek Aich, Shasha Li, Chengyu Song, M. Salman Asif, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury:
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks. CoRR abs/2209.09883 (2022) - 2021
- [i13]Mingjun Yin, Shasha Li, Zikui Cai, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes. CoRR abs/2108.08421 (2021) - [i12]Shasha Li, Abhishek Aich, Shitong Zhu, M. Salman Asif, Chengyu Song, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations. CoRR abs/2110.01823 (2021) - [i11]Mingjun Yin, Shasha Li, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
ADC: Adversarial attacks against object Detection that evade Context consistency checks. CoRR abs/2110.12321 (2021) - [i10]Zikui Cai, Xinxin Xie, Shasha Li, Mingjun Yin, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif:
Context-Aware Transfer Attacks for Object Detection. CoRR abs/2112.03223 (2021) - 2020
- [i9]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song, Srikanth V. Krishnamurthy, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. CoRR abs/2007.09763 (2020) - [i8]Shasha Li, Karim Khalil, Rameswar Panda, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks. CoRR abs/2008.11772 (2020) - 2019
- [i7]Wookhyun Han, Md. Lutfor Rahman, Yuxuan Chen, Chengyu Song, Byoungyoung Lee, Insik Shin:
SynFuzz: Efficient Concolic Execution via Branch Condition Synthesis. CoRR abs/1905.09532 (2019) - [i6]Esmaeil Mohammadian Koruyeh, Shirin Haji Amin Shirazi, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation. CoRR abs/1906.01345 (2019) - 2018
- [i5]Khaled N. Khasawneh, Esmaeil Mohammadian Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael B. Abu-Ghazaleh:
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation. CoRR abs/1806.05179 (2018) - [i4]Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Adversarial Perturbations Against Real-Time Video Classification Systems. CoRR abs/1807.00458 (2018) - [i3]Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. CoRR abs/1807.07940 (2018) - [i2]Ketan Bhardwaj, Ming-Wei Shih, Ada Gavrilovska, Taesoo Kim, Chengyu Song:
SPX: Preserving End-to-End Security for Edge Computing. CoRR abs/1809.09038 (2018) - [i1]Dang Tu Nguyen, Chengyu Song, Zhiyun Qian, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Patrick D. McDaniel:
IoTSan: Fortifying the Safety of IoT Systems. CoRR abs/1810.09551 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint