Optimizing seed inputs in fuzzing with machine learning L Cheng, Y Zhang, Y Zhang, C Wu, Z Li, Y Fu, H Li 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 28 | 2019 |
Improving accuracy of static integer overflow detection in binary Y Zhang, X Sun, Y Deng, L Cheng, S Zeng, Y Fu, D Feng Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 22 | 2015 |
基于犝犕犔和模型检测的安全模型验证方法 程亮, 张阳 计算机学报 32 (4), 2009 | 14 | 2009 |
Protecting interoperable clinical environment with authentication L Cheng, Z Li, Y Zhang, Y Zhang, I Lee ACM SIGBED Review 14 (2), 34-43, 2017 | 10 | 2017 |
Systematic analysis and detection of misconfiguration vulnerabilities in android smartphones Z Han, L Cheng, Y Zhang, S Zeng, Y Deng, X Sun 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 10 | 2014 |
A covert timing channel via algorithmic complexity attacks: Design and analysis X Sun, L Cheng, Y Zhang 2011 IEEE International Conference on Communications (ICC), 1-5, 2011 | 6 | 2011 |
Model checking security policy model using both UML static and dynamic diagrams L Cheng, Y Zhang Proceedings of the 4th International Conference on Security of Information …, 2011 | 5 | 2011 |
Evaluating and comparing the quality of access control in different operating systems L Cheng, Y Zhang, Z Han, Y Deng, X Sun, D Feng Computers & security 47, 26-40, 2014 | 3 | 2014 |
Quantitatively measure access control mechanisms across different operating systems L Cheng, Y Zhang, Z Han 2013 IEEE 7th International Conference on Software Security and Reliability …, 2013 | 3 | 2013 |
Measuring and comparing the protection quality in different operating systems Z Han, L Cheng, Y Zhang, D Feng Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 3 | 2013 |
一种基于安全状态转移的简并测试集生成方法 程亮, 张阳, 冯登国 软件学报 21 (3), 539-547, 2010 | 3 | 2010 |
A new property verification method for code security based on pointer logic Y Zhang, L Cheng Chinese Journal of Computers 32 (6), 1119-1125, 2009 | 3 | 2009 |
Refining the pointer analysis by exploiting constraints on the cfl-paths X Sun, L Cheng, Y Zhang, Y Deng, J Hou 2013 20th Asia-Pacific Software Engineering Conference (APSEC) 1, 17-24, 2013 | 2 | 2013 |
Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability D Chen, Y Zhang, L Cheng, Y Deng, X Sun 2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013 | 2 | 2013 |
Static integer overflow vulnerability detection in windows binary Y Deng, Y Zhang, L Cheng, X Sun Advances in Information and Computer Security: 8th International Workshop on …, 2013 | 2 | 2013 |
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System Z Li, L Cheng, Y Zhang, D Feng Wireless Algorithms, Systems, and Applications: 16th International …, 2021 | 1 | 2021 |
Improving the effectiveness of grey-box fuzzing by extracting program information Y Fu, S Tong, X Guo, L Cheng, Y Zhang, D Feng 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 1 | 2020 |
Tracking Sensitive Information and Operations in Integrated Clinical Environment Z Li, L Cheng, Y Zhang 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 1 | 2019 |
Operating System Security Policy Hardening via Capability Dependency Graphs Z Han, L Cheng, Y Zhang, D Feng Information Security Practice and Experience: 11th International Conference …, 2015 | 1 | 2015 |
Mitigating network-layer security attacks on authentication-enhanced OpenICE Z Li, L Cheng, Y Zhang ACM SIGBED Review 16 (2), 14-23, 2019 | | 2019 |