BibTeX records: Long Lu

download as .bib file

@article{DBLP:journals/bspc/LuHMBLL24,
  author       = {Peixin Lu and
                  Lianting Hu and
                  Alexis Mitelpunkt and
                  Surbhi Bhatnagar and
                  Long Lu and
                  Huiying Liang},
  title        = {A hierarchical attention-based multimodal fusion framework for predicting
                  the progression of Alzheimer's disease},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {88},
  number       = {Part {B}},
  pages        = {105669},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2023.105669},
  doi          = {10.1016/J.BSPC.2023.105669},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bspc/LuHMBLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuoFLKR24,
  author       = {Meng Luo and
                  Bo Feng and
                  Long Lu and
                  Engin Kirda and
                  Kui Ren},
  title        = {On the Complexity of the Web's {PKI:} Evaluating Certificate Validation
                  of Mobile Browsers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {419--433},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3255869},
  doi          = {10.1109/TDSC.2023.3255869},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuoFLKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TangYXWHWJLZXWHZL23,
  author       = {Jiajie Tang and
                  Pu Yang and
                  Bingbing Xie and
                  Cong Wei and
                  Lianting Hu and
                  Shouyi Wang and
                  Yuxuan Jiang and
                  Ruizhuo Li and
                  Hang Zhou and
                  Haiqing Xu and
                  Qirong Wan and
                  Jin Han and
                  Dongchi Zhao and
                  Long Lu},
  title        = {A Deep Learning-Based Brain Age Prediction Model for Preterm Infants
                  via Neonatal {MRI}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {68994--69004},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3291810},
  doi          = {10.1109/ACCESS.2023.3291810},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TangYXWHWJLZXWHZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/GuoLYJLW23,
  author       = {Junjun Guo and
                  Kai Long and
                  Kunpeng Yang and
                  Kaida Jiang and
                  Long Lu and
                  Changyuan Wang},
  title        = {A novel prediction method for vulnerability outbreak trend},
  journal      = {Comput. Electr. Eng.},
  volume       = {108},
  pages        = {108743},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108743},
  doi          = {10.1016/J.COMPELECENG.2023.108743},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/GuoLYJLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npjdm/TangLJLZHPHLZLZXHZXLW23,
  author       = {Jiajie Tang and
                  Yongen Liang and
                  Yuxuan Jiang and
                  Jinrong Liu and
                  Rui Zhang and
                  Danping Huang and
                  Chengcheng Pang and
                  Chen Huang and
                  Dongni Luo and
                  Xue Zhou and
                  Ruizhuo Li and
                  Kanghui Zhang and
                  Bingbing Xie and
                  Lianting Hu and
                  Fanfan Zhu and
                  Huimin Xia and
                  Long Lu and
                  Hongying Wang},
  title        = {A multicenter study on two-stage transfer learning model for duct-dependent
                  CHDs screening in fetal echocardiography},
  journal      = {npj Digit. Medicine},
  volume       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1038/s41746-023-00883-y},
  doi          = {10.1038/S41746-023-00883-Y},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/npjdm/TangLJLZHPHLZLZXHZXLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SunSLCLJ23,
  author       = {Zhichuang Sun and
                  Ruimin Sun and
                  Changming Liu and
                  Amrita Roy Chowdhury and
                  Long Lu and
                  Somesh Jha},
  title        = {ShadowNet: {A} Secure and Efficient On-device Model Inference System
                  for Convolutional Neural Networks},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1596--1612},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179382},
  doi          = {10.1109/SP46215.2023.10179382},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SunSLCLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GavazziWKLKDL23,
  author       = {Anthony Gavazzi and
                  Ryan Williams and
                  Engin Kirda and
                  Long Lu and
                  Andre King and
                  Andy Davis and
                  Tim Leek},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {A Study of Multi-Factor and Risk-Based Authentication Availability},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2043--2060},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/gavazzi},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/GavazziWKLKDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-01195,
  author       = {Bo Feng and
                  Meng Luo and
                  Changming Liu and
                  Long Lu and
                  Engin Kirda},
  title        = {{AIM:} Automatic Interrupt Modeling for Dynamic Firmware Analysis},
  journal      = {CoRR},
  volume       = {abs/2312.01195},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.01195},
  doi          = {10.48550/ARXIV.2312.01195},
  eprinttype    = {arXiv},
  eprint       = {2312.01195},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-01195.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candie/XieLD22,
  author       = {Bai{-}Chen Xie and
                  Long Lu and
                  Na Duan},
  title        = {Environmental efficiency assessment of China's integrated power system
                  under the assumption of semi-disposability},
  journal      = {Comput. Ind. Eng.},
  volume       = {167},
  pages        = {108023},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cie.2022.108023},
  doi          = {10.1016/J.CIE.2022.108023},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candie/XieLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuLHL22,
  author       = {Peixin Lu and
                  Xin Li and
                  Lianting Hu and
                  Long Lu},
  title        = {Integrating genomic and resting State fMRI for efficient autism spectrum
                  disorder classification},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {14},
  pages        = {19183--19194},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-020-10473-9},
  doi          = {10.1007/S11042-020-10473-9},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LuLHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiLHWL22,
  author       = {Xin Li and
                  Peixin Lu and
                  Lianting Hu and
                  XiaoGuang Wang and
                  Long Lu},
  title        = {A novel self-learning semi-supervised deep learning network to detect
                  fake news on social media},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {14},
  pages        = {19341--19349},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-021-11065-x},
  doi          = {10.1007/S11042-021-11065-X},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiLHWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/WilliamsRCLS22,
  author       = {Ryan Williams and
                  Tongwei Ren and
                  Lorenzo De Carli and
                  Long Lu and
                  Gillian Smith},
  title        = {Guided Feature Identification and Removal for Resource-constrained
                  Firmware},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {31},
  number       = {2},
  pages        = {28:1--28:25},
  year         = {2022},
  url          = {https://doi.org/10.1145/3487568},
  doi          = {10.1145/3487568},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/WilliamsRCLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MeraCSKL22,
  author       = {Alejandro Mera and
                  Yi Hui Chen and
                  Ruimin Sun and
                  Engin Kirda and
                  Long Lu},
  title        = {D-Box: DMA-enabled Compartmentalization for Embedded Applications},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-258/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/MeraCSKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RenWGCL22,
  author       = {Tongwei Ren and
                  Ryan Williams and
                  Sirshendu Ganguly and
                  Lorenzo De Carli and
                  Long Lu},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Breaking Embedded Software Homogeneity with Protocol Mutations},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {770--790},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_40},
  doi          = {10.1007/978-3-031-25538-0\_40},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RenWGCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BuccioliCVNBBLL22,
  author       = {Luca Buccioli and
                  Stefano Cristalli and
                  Edoardo Vignati and
                  Lorenzo Nava and
                  Daniele Badagliacca and
                  Danilo Bruschi and
                  Long Lu and
                  Andrea Lanzi},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {JChainz: Automatic Detection of Deserialization Vulnerabilities for
                  the Java Language},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {136--155},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_8},
  doi          = {10.1007/978-3-031-29504-1\_8},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BuccioliCVNBBLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-05199,
  author       = {Alejandro Mera and
                  Yi Hui Chen and
                  Ruimin Sun and
                  Engin Kirda and
                  Long Lu},
  title        = {D-Box: DMA-enabled Compartmentalization for Embedded Applications},
  journal      = {CoRR},
  volume       = {abs/2201.05199},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.05199},
  eprinttype    = {arXiv},
  eprint       = {2201.05199},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-05199.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-09099,
  author       = {Lianting Hu and
                  Huiying Liang and
                  Jiajie Tang and
                  Xin Li and
                  Li Huang and
                  Long Lu},
  title        = {Cutting-Splicing data augmentation: {A} novel technology for medical
                  image segmentation},
  journal      = {CoRR},
  volume       = {abs/2210.09099},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.09099},
  doi          = {10.48550/ARXIV.2210.09099},
  eprinttype    = {arXiv},
  eprint       = {2210.09099},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-09099.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuLL21,
  author       = {Lianting Hu and
                  Huiying Liang and
                  Long Lu},
  title        = {Splicing learning: {A} novel few-shot learning approach},
  journal      = {Inf. Sci.},
  volume       = {552},
  pages        = {17--28},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.11.028},
  doi          = {10.1016/J.INS.2020.11.028},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HuLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/FasanoBMLBDEFLG21,
  author       = {Andrew Fasano and
                  Tiemoko Ballo and
                  Marius Muench and
                  Tim Leek and
                  Alexander Bulekov and
                  Brendan Dolan{-}Gavitt and
                  Manuel Egele and
                  Aur{\'{e}}lien Francillon and
                  Long Lu and
                  Nick Gregory and
                  Davide Balzarotti and
                  William Robertson},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {SoK: Enabling Security Analyses of Embedded Systems via Rehosting},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {687--701},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453093},
  doi          = {10.1145/3433210.3453093},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MirzaeiVKLK21,
  author       = {Omid Mirzaei and
                  Roman Vasilenko and
                  Engin Kirda and
                  Long Lu and
                  Amin Kharraz},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {{SCRUTINIZER:} Detecting Code Reuse in Malware via Decompilation and
                  Machine Learning},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {130--150},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_7},
  doi          = {10.1007/978-3-030-80825-9\_7},
  timestamp    = {Tue, 13 Jul 2021 16:53:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MirzaeiVKLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SunMLC21,
  author       = {Ruimin Sun and
                  Alejandro Mera and
                  Long Lu and
                  David R. Choffnes},
  title        = {SoK: Attacks on Industrial Control Logic and Formal Verification-Based
                  Defenses},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {385--402},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00034},
  doi          = {10.1109/EUROSP51992.2021.00034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/SunMLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AkhavaniJSKKL21,
  author       = {Seyed Ali Akhavani and
                  Jordan Jueckstock and
                  Junhua Su and
                  Alexandros Kapravelos and
                  Engin Kirda and
                  Long Lu},
  editor       = {Joseph K. Liu and
                  Sokratis K. Katsikas and
                  Weizhi Meng and
                  Willy Susilo and
                  Rolly Intan},
  title        = {Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability
                  and Web Privacy},
  booktitle    = {Information Security - 24th International Conference, {ISC} 2021,
                  Virtual Event, November 10-12, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13118},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91356-4\_9},
  doi          = {10.1007/978-3-030-91356-4\_9},
  timestamp    = {Fri, 03 Dec 2021 17:36:27 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/AkhavaniJSKKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuCL21,
  author       = {Changming Liu and
                  Yaohui Chen and
                  Long Lu},
  title        = {{KUBO:} Precise and Scalable Detection of User-triggerable Undefined
                  Behavior Bugs in {OS} Kernel},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/kubo-precise-and-scalable-detection-of-user-triggerable-undefined-behavior-bugs-in-os-kernel/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MeraFLK21,
  author       = {Alejandro Mera and
                  Bo Feng and
                  Long Lu and
                  Engin Kirda},
  title        = {{DICE:} Automatic Emulation of {DMA} Input Channels for Dynamic Firmware
                  Analysis},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1938--1954},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00018},
  doi          = {10.1109/SP40001.2021.00018},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MeraFLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FarkhaniAL21,
  author       = {Reza Mirzazade Farkhani and
                  Mansour Ahmadi and
                  Long Lu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {PTAuth: Temporal Memory Safety via Robust Points-to Authentication},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1037--1054},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/mirzazade},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FarkhaniAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SunSLM21,
  author       = {Zhichuang Sun and
                  Ruimin Sun and
                  Long Lu and
                  Alan Mislove},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Mind Your Weight(s): {A} Large-scale Study on Insufficient Machine
                  Learning Model Protection in Mobile Apps},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1955--1972},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhichuang},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SunSLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AhmadiFWL21,
  author       = {Mansour Ahmadi and
                  Reza Mirzazade Farkhani and
                  Ryan Williams and
                  Long Lu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Finding Bugs Using Your Own Code: Detecting Functionally-similar yet
                  Inconsistent Code},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2025--2040},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ahmadi},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/AhmadiFWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lht/YuL20,
  author       = {Zunpeng Yu and
                  Long Lu},
  title        = {Comprehensive analysis of potential prognostic biomarker in gliomas},
  journal      = {Libr. Hi Tech},
  volume       = {38},
  number       = {4},
  pages        = {783--797},
  year         = {2020},
  url          = {https://doi.org/10.1108/LHT-08-2019-0173},
  doi          = {10.1108/LHT-08-2019-0173},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lht/YuL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lht/ZhaoL20,
  author       = {Wang Zhao and
                  Long Lu},
  title        = {Research and development of autism diagnosis information system based
                  on deep convolution neural network and facial expression data},
  journal      = {Libr. Hi Tech},
  volume       = {38},
  number       = {4},
  pages        = {799--817},
  year         = {2020},
  url          = {https://doi.org/10.1108/LHT-08-2019-0176},
  doi          = {10.1108/LHT-08-2019-0176},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lht/ZhaoL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lht/ChenFLL20,
  author       = {Tao Chen and
                  Tanya Froehlich and
                  Tingyu Li and
                  Long Lu},
  title        = {Big data approaches to develop a comprehensive and accurate tool aimed
                  at improving autism spectrum disorder diagnosis and subtype stratification},
  journal      = {Libr. Hi Tech},
  volume       = {38},
  number       = {4},
  pages        = {819--833},
  year         = {2020},
  url          = {https://doi.org/10.1108/LHT-08-2019-0175},
  doi          = {10.1108/LHT-08-2019-0175},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lht/ChenFLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/midm/ZhaoLYL20a,
  author       = {Wang Zhao and
                  Peixin Lu and
                  Siwei Yu and
                  Long Lu},
  title        = {Consumer health information needs in China - a case study of depression
                  based on a Social Q{\&}A community},
  journal      = {{BMC} Medical Informatics Decis. Mak.},
  volume       = {20-S},
  number       = {3},
  pages        = {130},
  year         = {2020},
  url          = {https://doi.org/10.1186/s12911-020-1124-1},
  doi          = {10.1186/S12911-020-1124-1},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/midm/ZhaoLYL20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HamlenL20,
  author       = {Kevin W. Hamlen and
                  Long Lu},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2149--2150},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3416251},
  doi          = {10.1145/3372297.3416251},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HamlenL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChenLL20,
  author       = {Tao Chen and
                  Peixin Lu and
                  Long Lu},
  title        = {Design Of {ASD} Subtyping Approach based on Multi-Omics Data to Promote
                  Personalized Healthcare},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--6},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64150},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ChenLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MaWL20,
  author       = {Feicheng Ma and
                  Jiang Wu and
                  Long Lu},
  title        = {Introduction to the Minitrack on Data-Driven Smart Health in Asia
                  Pacific},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--2},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64143},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MaWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenAFWL20,
  author       = {Yaohui Chen and
                  Mansour Ahmadi and
                  Reza Mirzazade Farkhani and
                  Boyu Wang and
                  Long Lu},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {{MEUZZ:} Smart Seed Scheduling for Hybrid Fuzzing},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {77--92},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/chen},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChenAFWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SunFLJ20,
  author       = {Zhichuang Sun and
                  Bo Feng and
                  Long Lu and
                  Somesh Jha},
  title        = {{OAT:} Attesting Operation Integrity of Embedded Devices},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1433--1449},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00042},
  doi          = {10.1109/SP40000.2020.00042},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SunFLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenLXGZZWL20,
  author       = {Yaohui Chen and
                  Peng Li and
                  Jun Xu and
                  Shengjian Guo and
                  Rundong Zhou and
                  Yulong Zhang and
                  Tao Wei and
                  Long Lu},
  title        = {{SAVIOR:} Towards Bug-Driven Hybrid Testing},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1580--1596},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00002},
  doi          = {10.1109/SP40000.2020.00002},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChenLXGZZWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FengML20,
  author       = {Bo Feng and
                  Alejandro Mera and
                  Long Lu},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{P2IM:} Scalable and Hardware-independent Firmware Testing via Automatic
                  Peripheral Interface Modeling},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1237--1254},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/feng},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FengML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-07687,
  author       = {Zhichuang Sun and
                  Ruimin Sun and
                  Long Lu},
  title        = {Mind Your Weight(s): {A} Large-scale Study on Insufficient Machine
                  Learning Model Protection in Mobile Apps},
  journal      = {CoRR},
  volume       = {abs/2002.07687},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.07687},
  eprinttype    = {arXiv},
  eprint       = {2002.07687},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-07687.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-07936,
  author       = {Reza Mirzazade Farkhani and
                  Mansour Ahmadi and
                  Long Lu},
  title        = {PTAuth: Temporal Memory Safety via Robust Points-to Authentication},
  journal      = {CoRR},
  volume       = {abs/2002.07936},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.07936},
  eprinttype    = {arXiv},
  eprint       = {2002.07936},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-07936.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-08568,
  author       = {Yaohui Chen and
                  Mansour Ahmadi and
                  Reza Mirzazade Farkhani and
                  Boyu Wang and
                  Long Lu},
  title        = {{MEUZZ:} Smart Seed Scheduling for Hybrid Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2002.08568},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.08568},
  eprinttype    = {arXiv},
  eprint       = {2002.08568},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-08568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-04806,
  author       = {Ruimin Sun and
                  Alejandro Mera and
                  Long Lu and
                  David R. Choffnes},
  title        = {SoK: Attacks on Industrial Control Logic and Formal Verification-Based
                  Defenses},
  journal      = {CoRR},
  volume       = {abs/2006.04806},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.04806},
  eprinttype    = {arXiv},
  eprint       = {2006.04806},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-04806.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-01502,
  author       = {Alejandro Mera and
                  Bo Feng and
                  Long Lu and
                  Engin Kirda and
                  William K. Robertson},
  title        = {{DICE:} Automatic Emulation of {DMA} Input Channels for Dynamic Firmware
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/2007.01502},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.01502},
  eprinttype    = {arXiv},
  eprint       = {2007.01502},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-01502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-05905,
  author       = {Zhichuang Sun and
                  Ruimin Sun and
                  Long Lu and
                  Somesh Jha},
  title        = {ShadowNet: {A} Secure and Efficient System for On-device Model Inference},
  journal      = {CoRR},
  volume       = {abs/2011.05905},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.05905},
  eprinttype    = {arXiv},
  eprint       = {2011.05905},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-05905.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CristalliLBL19,
  author       = {Stefano Cristalli and
                  Long Lu and
                  Danilo Bruschi and
                  Andrea Lanzi},
  editor       = {David Balenson},
  title        = {Detecting (absent) app-to-app authentication on cross-device short-distance
                  channels},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {328--338},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359814},
  doi          = {10.1145/3359789.3359814},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CristalliLBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenMXSSXLM19,
  author       = {Yaohui Chen and
                  Dongliang Mu and
                  Jun Xu and
                  Zhichuang Sun and
                  Wenbo Shen and
                  Xinyu Xing and
                  Long Lu and
                  Bing Mao},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {PTrix: Efficient Hardware-Assisted Fuzzing for {COTS} Binary},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {633--645},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329828},
  doi          = {10.1145/3321705.3329828},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenMXSSXLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsh/LuZ19,
  author       = {Long Lu and
                  Wang Zhao},
  editor       = {Hsinchun Chen and
                  Daniel Zeng and
                  Xiangbin Yan and
                  Chunxiao Xing},
  title        = {Research on Three-Dimensional Reconstruction of Brain Image Features
                  Based on Augmented Reality Technology},
  booktitle    = {Smart Health - International Conference, {ICSH} 2019, Shenzhen, China,
                  July 1-2, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11924},
  pages        = {39--47},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34482-5\_4},
  doi          = {10.1007/978-3-030-34482-5\_4},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icsh/LuZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AcarLUK19,
  author       = {Abbas Acar and
                  Long Lu and
                  A. Selcuk Uluagac and
                  Engin Kirda},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {An Analysis of Malware Trends in Enterprise Networks},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {360--380},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_18},
  doi          = {10.1007/978-3-030-30215-3\_18},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AcarLUK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/ParkZLL19,
  author       = {Heejin Park and
                  Shuang Zhai and
                  Long Lu and
                  Felix Xiaozhu Lin},
  editor       = {Dahlia Malkhi and
                  Dan Tsafrir},
  title        = {StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone},
  booktitle    = {2019 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2019, Renton,
                  WA, USA, July 10-12, 2019},
  pages        = {537--554},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/atc19/presentation/park-heejin},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/ParkZLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vee/LiXLCZ19,
  author       = {Wenhao Li and
                  Yubin Xia and
                  Long Lu and
                  Haibo Chen and
                  Binyu Zang},
  editor       = {Jennifer B. Sartor and
                  Mayur Naik and
                  Christopher J. Rossbach},
  title        = {TEEv: virtualizing trusted execution environments on mobile platforms},
  booktitle    = {Proceedings of the 15th {ACM} {SIGPLAN/SIGOPS} International Conference
                  on Virtual Execution Environments, {VEE} 2019, Providence, RI, USA,
                  April 14, 2019},
  pages        = {2--16},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313808.3313810},
  doi          = {10.1145/3313808.3313810},
  timestamp    = {Fri, 08 Jul 2022 08:37:56 +0200},
  biburl       = {https://dblp.org/rec/conf/vee/LiXLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-10499,
  author       = {Yaohui Chen and
                  Dongliang Mu and
                  Jun Xu and
                  Zhichuang Sun and
                  Wenbo Shen and
                  Xinyu Xing and
                  Long Lu and
                  Bing Mao},
  title        = {PTrix: Efficient Hardware-Assisted Fuzzing for {COTS} Binary},
  journal      = {CoRR},
  volume       = {abs/1905.10499},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.10499},
  eprinttype    = {arXiv},
  eprint       = {1905.10499},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-10499.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-07327,
  author       = {Yaohui Chen and
                  Peng Li and
                  Jun Xu and
                  Shengjian Guo and
                  Rundong Zhou and
                  Yulong Zhang and
                  Tao Wei and
                  Long Lu},
  title        = {{SAVIOR:} Towards Bug-Driven Hybrid Testing},
  journal      = {CoRR},
  volume       = {abs/1906.07327},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.07327},
  eprinttype    = {arXiv},
  eprint       = {1906.07327},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07327.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-06472,
  author       = {Bo Feng and
                  Alejandro Mera and
                  Long Lu},
  title        = {P\({}^{\mbox{2}}\)IM: Scalable and Hardware-independent Firmware Testing
                  via Automatic Peripheral Interface Modeling (extended version)},
  journal      = {CoRR},
  volume       = {abs/1909.06472},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.06472},
  eprinttype    = {arXiv},
  eprint       = {1909.06472},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-06472.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00508,
  author       = {Abbas Acar and
                  Long Lu and
                  A. Selcuk Uluagac and
                  Engin Kirda},
  title        = {An Analysis of Malware Trends in Enterprise Networks},
  journal      = {CoRR},
  volume       = {abs/1910.00508},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00508},
  eprinttype    = {arXiv},
  eprint       = {1910.00508},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00508.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dim/HongLWLLL18,
  author       = {Liang Hong and
                  Mengqi Luo and
                  Ruixue Wang and
                  Peixin Lu and
                  Wei Lu and
                  Long Lu},
  title        = {Big Data in Health Care: Applications and Challenges},
  journal      = {Data Inf. Manag.},
  volume       = {2},
  number       = {3},
  pages        = {175--197},
  year         = {2018},
  url          = {https://doi.org/10.2478/dim-2018-0014},
  doi          = {10.2478/DIM-2018-0014},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dim/HongLWLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsh/LuZ18,
  author       = {Long Lu and
                  Wang Zhao},
  editor       = {Hsinchun Chen and
                  Qing Fang and
                  Daniel Zeng and
                  Jiang Wu},
  title        = {Augmented Reality: New Technologies for Building Visualized Hospital
                  Knowledge Management Systems},
  booktitle    = {Smart Health - International Conference, {ICSH} 2018, Wuhan, China,
                  July 1-3, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10983},
  pages        = {15--25},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03649-2\_2},
  doi          = {10.1007/978-3-030-03649-2\_2},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icsh/LuZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/LiLSXLCZG18,
  author       = {Wenhao Li and
                  Shiyu Luo and
                  Zhichuang Sun and
                  Yubin Xia and
                  Long Lu and
                  Haibo Chen and
                  Binyu Zang and
                  Haibing Guan},
  editor       = {J{\"{o}}rg Ott and
                  Falko Dressler and
                  Stefan Saroiu and
                  Prabal Dutta},
  title        = {VButton: Practical Attestation of User-driven Operations in Mobile
                  Apps},
  booktitle    = {Proceedings of the 16th Annual International Conference on Mobile
                  Systems, Applications, and Services, MobiSys 2018, Munich, Germany,
                  June 10-15, 2018},
  pages        = {28--40},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3210240.3210330},
  doi          = {10.1145/3210240.3210330},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/LiLSXLCZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenLLLVWO18,
  author       = {Yaohui Chen and
                  Yuping Li and
                  Long Lu and
                  Yueh{-}Hsun Lin and
                  Hayawardh Vijayakumar and
                  Zhi Wang and
                  Xinming Ou},
  title        = {InstaGuard: Instantly Deployable Hot-patches for Vulnerable System
                  Programs on Android},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/03/ndss2018\_08-2\_Chen\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenLLLVWO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KooCLKP18,
  author       = {Hyungjoon Koo and
                  Yaohui Chen and
                  Long Lu and
                  Vasileios P. Kemerlis and
                  Michalis Polychronakis},
  title        = {Compiler-Assisted Code Randomization},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {461--477},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00029},
  doi          = {10.1109/SP.2018.00029},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KooCLKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangZMXY00LD18,
  author       = {Xiaohan Zhang and
                  Yuan Zhang and
                  Qianqian Mo and
                  Hao Xia and
                  Zhemin Yang and
                  Min Yang and
                  Xiaofeng Wang and
                  Long Lu and
                  Hai{-}Xin Duan},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {An Empirical Study of Web Resource Manipulation in Real-world Mobile
                  Applications},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1183--1198},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/zhang-xiaohan},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangZMXY00LD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-03462,
  author       = {Zhichuang Sun and
                  Bo Feng and
                  Long Lu and
                  Somesh Jha},
  title        = {{OEI:} Operation Execution Integrity for Embedded Devices},
  journal      = {CoRR},
  volume       = {abs/1802.03462},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.03462},
  eprinttype    = {arXiv},
  eprint       = {1802.03462},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-03462.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-05078,
  author       = {Heejin Park and
                  Shuang Zhai and
                  Long Lu and
                  Felix Xiaozhu Lin},
  title        = {StreamBox-TZ: {A} Secure IoT Analytics Engine at the Edge},
  journal      = {CoRR},
  volume       = {abs/1808.05078},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.05078},
  eprinttype    = {arXiv},
  eprint       = {1808.05078},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-05078.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DavidsonCGLJ17,
  author       = {Drew Davidson and
                  Yaohui Chen and
                  Franklin George and
                  Long Lu and
                  Somesh Jha},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Secure Integration of Web Content and Applications on Commodity Mobile
                  Operating Systems},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {652--665},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052998},
  doi          = {10.1145/3052973.3052998},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DavidsonCGLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/AlaviQZMHQLG17,
  author       = {Arash Alavi and
                  Alan Quach and
                  Hang Zhang and
                  Bryan Marsh and
                  Farhan Ul Haq and
                  Zhiyun Qian and
                  Long Lu and
                  Rajiv Gupta},
  editor       = {Mohamed Ali K{\^{a}}afar and
                  Steve Uhlig and
                  Johanna Amann},
  title        = {Where Is the Weakest Link? {A} Study on Security Discrepancies Between
                  Android Apps and Their Website Counterparts},
  booktitle    = {Passive and Active Measurement - 18th International Conference, {PAM}
                  2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10176},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54328-4\_8},
  doi          = {10.1007/978-3-319-54328-4\_8},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pam/AlaviQZMHQLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenZWQALVS17,
  author       = {Yaohui Chen and
                  Dongli Zhang and
                  Ruowen Wang and
                  Rui Qiao and
                  Ahmed M. Azab and
                  Long Lu and
                  Hayawardh Vijayakumar and
                  Wenbo Shen},
  title        = {{NORAX:} Enabling Execute-Only Memory for {COTS} Binaries on AArch64},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {304--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.30},
  doi          = {10.1109/SP.2017.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenZWQALVS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuM16,
  author       = {Long Lu and
                  Mohammad Mannan},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Sixth Annual {ACM} {CCS} Workshop on Security and Privacy in Smartphones
                  and Mobile Devices {(SPSM} 2016)},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1873--1874},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990487},
  doi          = {10.1145/2976749.2990487},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenWWL16,
  author       = {Yue Chen and
                  Zhi Wang and
                  David B. Whalley and
                  Long Lu},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Remix: On-demand Live Randomization},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {50--61},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857726},
  doi          = {10.1145/2857705.2857726},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenWWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/ZhuLS16,
  author       = {Suwen Zhu and
                  Long Lu and
                  Kapil Singh},
  editor       = {Rajesh Krishna Balan and
                  Archan Misra and
                  Sharad Agarwal and
                  Cecilia Mascolo},
  title        = {{CASE:} Comprehensive Application Security Enforcement on {COTS} Mobile
                  Devices},
  booktitle    = {Proceedings of the 14th Annual International Conference on Mobile
                  Systems, Applications, and Services, MobiSys 2016, Singapore, June
                  26-30, 2016},
  pages        = {375--386},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2906388.2906413},
  doi          = {10.1145/2906388.2906413},
  timestamp    = {Tue, 06 Nov 2018 16:59:04 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/ZhuLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenRSL16,
  author       = {Yaohui Chen and
                  Sebassujeen Reymondjohnson and
                  Zhichuang Sun and
                  Long Lu},
  title        = {Shreds: Fine-Grained Execution Units with Private Memory},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {56--71},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.12},
  doi          = {10.1109/SP.2016.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenRSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/YuanHZLL16,
  author       = {Dazeng Yuan and
                  Mingxing He and
                  Shengke Zeng and
                  Xiao Li and
                  Long Lu},
  editor       = {Changjun Jiang and
                  Omer F. Rana and
                  Nick Antonopoulos},
  title        = {(t, p)-Threshold point function secret sharing scheme based on polynomial
                  interpolation and its application},
  booktitle    = {Proceedings of the 9th International Conference on Utility and Cloud
                  Computing, {UCC} 2016, Shanghai, China, December 6-9, 2016},
  pages        = {269--275},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996890.3007871},
  doi          = {10.1145/2996890.3007871},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ucc/YuanHZLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016spsm,
  editor       = {Long Lu and
                  Mohammad Mannan},
  title        = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994459},
  doi          = {10.1145/2994459},
  isbn         = {978-1-4503-4564-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016spsm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NeasbittLPLSL15,
  author       = {Christopher Neasbitt and
                  Bo Li and
                  Roberto Perdisci and
                  Long Lu and
                  Kapil Singh and
                  Kang Li},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {133--145},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813656},
  doi          = {10.1145/2810103.2813656},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NeasbittLPLSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LeeSJWKLL15,
  author       = {Byoungyoung Lee and
                  Chengyu Song and
                  Yeongjin Jang and
                  Tielei Wang and
                  Taesoo Kim and
                  Long Lu and
                  Wenke Lee},
  title        = {Preventing Use-after-free with Dangling Pointers Nullification},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/preventing-use-after-free-dangling-pointers-nullification},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LeeSJWKLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15,
  author       = {Kangjie Lu and
                  Zhichun Li and
                  Vasileios P. Kemerlis and
                  Zhenyu Wu and
                  Long Lu and
                  Cong Zheng and
                  Zhiyun Qian and
                  Wenke Lee and
                  Guofei Jiang},
  title        = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced
                  Data-flow Analysis and Peer Voting},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LeeLWKL14,
  author       = {Byoungyoung Lee and
                  Long Lu and
                  Tielei Wang and
                  Taesoo Kim and
                  Wenke Lee},
  title        = {From Zygote to Morula: Fortifying Weakened {ASLR} on Android},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {424--439},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.34},
  doi          = {10.1109/SP.2014.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LeeLWKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/SeifertSCPL13,
  author       = {Christian Seifert and
                  Jack W. Stokes and
                  Christina Colcernian and
                  John C. Platt and
                  Long Lu},
  title        = {Robust scareware image detection},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013},
  pages        = {2920--2924},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICASSP.2013.6638192},
  doi          = {10.1109/ICASSP.2013.6638192},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/SeifertSCPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangLLCL13,
  author       = {Tielei Wang and
                  Kangjie Lu and
                  Long Lu and
                  Simon P. Chung and
                  Wenke Lee},
  editor       = {Samuel T. King},
  title        = {Jekyll on iOS: When Benign Apps Become Evil},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {559--572},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang\_tielei},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangLLCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuLWLJ12,
  author       = {Long Lu and
                  Zhichun Li and
                  Zhenyu Wu and
                  Wenke Lee and
                  Guofei Jiang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{CHEX:} statically vetting Android apps for component hijacking vulnerabilities},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {229--240},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382223},
  doi          = {10.1145/2382196.2382223},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LuLWLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuPL11,
  author       = {Long Lu and
                  Roberto Perdisci and
                  Wenke Lee},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {{SURF:} detecting and measuring search poisoning},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {467--476},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046762},
  doi          = {10.1145/2046707.2046762},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuPL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/SunZLN10,
  author       = {Li Sun and
                  Taiyi Zhang and
                  Long Lu and
                  Hao Niu},
  title        = {On the Combination of Cooperative Diversity and Multiuser Diversity
                  in Multi-Source Multi-Relay Wireless Networks},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {17},
  number       = {6},
  pages        = {535--538},
  year         = {2010},
  url          = {https://doi.org/10.1109/LSP.2010.2046350},
  doi          = {10.1109/LSP.2010.2046350},
  timestamp    = {Mon, 25 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/SunZLN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuYPL10,
  author       = {Long Lu and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Wenke Lee},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {{BLADE:} an attack-agnostic approach for preventing drive-by malware
                  infections},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {440--450},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866356},
  doi          = {10.1145/1866307.1866356},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuYPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/SunZLN09,
  author       = {Li Sun and
                  Taiyi Zhang and
                  Long Lu and
                  Hao Niu},
  title        = {Cooperative communications with relay selection in wireless sensor
                  networks},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {55},
  number       = {2},
  pages        = {513--517},
  year         = {2009},
  url          = {https://doi.org/10.1109/TCE.2009.5174415},
  doi          = {10.1109/TCE.2009.5174415},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/SunZLN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CarboneCLLPJ09,
  author       = {Martim Carbone and
                  Weidong Cui and
                  Long Lu and
                  Wenke Lee and
                  Marcus Peinado and
                  Xuxian Jiang},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Mapping kernel objects to enable systematic integrity checking},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {555--565},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653729},
  doi          = {10.1145/1653662.1653729},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CarboneCLLPJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuYPL09,
  author       = {Long Lu and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Wenke Lee},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {{BLADE:} Slashing the Invisible Channel of Drive-by Download Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {350--352},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_20},
  doi          = {10.1007/978-3-642-04342-0\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LuYPL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics