Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Long Lu
@article{DBLP:journals/bspc/LuHMBLL24, author = {Peixin Lu and Lianting Hu and Alexis Mitelpunkt and Surbhi Bhatnagar and Long Lu and Huiying Liang}, title = {A hierarchical attention-based multimodal fusion framework for predicting the progression of Alzheimer's disease}, journal = {Biomed. Signal Process. Control.}, volume = {88}, number = {Part {B}}, pages = {105669}, year = {2024}, url = {https://doi.org/10.1016/j.bspc.2023.105669}, doi = {10.1016/J.BSPC.2023.105669}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bspc/LuHMBLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuoFLKR24, author = {Meng Luo and Bo Feng and Long Lu and Engin Kirda and Kui Ren}, title = {On the Complexity of the Web's {PKI:} Evaluating Certificate Validation of Mobile Browsers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {419--433}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3255869}, doi = {10.1109/TDSC.2023.3255869}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LuoFLKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TangYXWHWJLZXWHZL23, author = {Jiajie Tang and Pu Yang and Bingbing Xie and Cong Wei and Lianting Hu and Shouyi Wang and Yuxuan Jiang and Ruizhuo Li and Hang Zhou and Haiqing Xu and Qirong Wan and Jin Han and Dongchi Zhao and Long Lu}, title = {A Deep Learning-Based Brain Age Prediction Model for Preterm Infants via Neonatal {MRI}}, journal = {{IEEE} Access}, volume = {11}, pages = {68994--69004}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3291810}, doi = {10.1109/ACCESS.2023.3291810}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TangYXWHWJLZXWHZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/GuoLYJLW23, author = {Junjun Guo and Kai Long and Kunpeng Yang and Kaida Jiang and Long Lu and Changyuan Wang}, title = {A novel prediction method for vulnerability outbreak trend}, journal = {Comput. Electr. Eng.}, volume = {108}, pages = {108743}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108743}, doi = {10.1016/J.COMPELECENG.2023.108743}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/GuoLYJLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npjdm/TangLJLZHPHLZLZXHZXLW23, author = {Jiajie Tang and Yongen Liang and Yuxuan Jiang and Jinrong Liu and Rui Zhang and Danping Huang and Chengcheng Pang and Chen Huang and Dongni Luo and Xue Zhou and Ruizhuo Li and Kanghui Zhang and Bingbing Xie and Lianting Hu and Fanfan Zhu and Huimin Xia and Long Lu and Hongying Wang}, title = {A multicenter study on two-stage transfer learning model for duct-dependent CHDs screening in fetal echocardiography}, journal = {npj Digit. Medicine}, volume = {6}, year = {2023}, url = {https://doi.org/10.1038/s41746-023-00883-y}, doi = {10.1038/S41746-023-00883-Y}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/npjdm/TangLJLZHPHLZLZXHZXLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SunSLCLJ23, author = {Zhichuang Sun and Ruimin Sun and Changming Liu and Amrita Roy Chowdhury and Long Lu and Somesh Jha}, title = {ShadowNet: {A} Secure and Efficient On-device Model Inference System for Convolutional Neural Networks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1596--1612}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179382}, doi = {10.1109/SP46215.2023.10179382}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/SunSLCLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GavazziWKLKDL23, author = {Anthony Gavazzi and Ryan Williams and Engin Kirda and Long Lu and Andre King and Andy Davis and Tim Leek}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {A Study of Multi-Factor and Risk-Based Authentication Availability}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2043--2060}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/gavazzi}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/GavazziWKLKDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-01195, author = {Bo Feng and Meng Luo and Changming Liu and Long Lu and Engin Kirda}, title = {{AIM:} Automatic Interrupt Modeling for Dynamic Firmware Analysis}, journal = {CoRR}, volume = {abs/2312.01195}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.01195}, doi = {10.48550/ARXIV.2312.01195}, eprinttype = {arXiv}, eprint = {2312.01195}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-01195.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/XieLD22, author = {Bai{-}Chen Xie and Long Lu and Na Duan}, title = {Environmental efficiency assessment of China's integrated power system under the assumption of semi-disposability}, journal = {Comput. Ind. Eng.}, volume = {167}, pages = {108023}, year = {2022}, url = {https://doi.org/10.1016/j.cie.2022.108023}, doi = {10.1016/J.CIE.2022.108023}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/XieLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LuLHL22, author = {Peixin Lu and Xin Li and Lianting Hu and Long Lu}, title = {Integrating genomic and resting State fMRI for efficient autism spectrum disorder classification}, journal = {Multim. Tools Appl.}, volume = {81}, number = {14}, pages = {19183--19194}, year = {2022}, url = {https://doi.org/10.1007/s11042-020-10473-9}, doi = {10.1007/S11042-020-10473-9}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LuLHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiLHWL22, author = {Xin Li and Peixin Lu and Lianting Hu and XiaoGuang Wang and Long Lu}, title = {A novel self-learning semi-supervised deep learning network to detect fake news on social media}, journal = {Multim. Tools Appl.}, volume = {81}, number = {14}, pages = {19341--19349}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-11065-x}, doi = {10.1007/S11042-021-11065-X}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiLHWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/WilliamsRCLS22, author = {Ryan Williams and Tongwei Ren and Lorenzo De Carli and Long Lu and Gillian Smith}, title = {Guided Feature Identification and Removal for Resource-constrained Firmware}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {31}, number = {2}, pages = {28:1--28:25}, year = {2022}, url = {https://doi.org/10.1145/3487568}, doi = {10.1145/3487568}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/WilliamsRCLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MeraCSKL22, author = {Alejandro Mera and Yi Hui Chen and Ruimin Sun and Engin Kirda and Long Lu}, title = {D-Box: DMA-enabled Compartmentalization for Embedded Applications}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-258/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/MeraCSKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RenWGCL22, author = {Tongwei Ren and Ryan Williams and Sirshendu Ganguly and Lorenzo De Carli and Long Lu}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Breaking Embedded Software Homogeneity with Protocol Mutations}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {770--790}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_40}, doi = {10.1007/978-3-031-25538-0\_40}, timestamp = {Thu, 06 Jul 2023 17:45:42 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/RenWGCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BuccioliCVNBBLL22, author = {Luca Buccioli and Stefano Cristalli and Edoardo Vignati and Lorenzo Nava and Daniele Badagliacca and Danilo Bruschi and Long Lu and Andrea Lanzi}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {136--155}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_8}, doi = {10.1007/978-3-031-29504-1\_8}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BuccioliCVNBBLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-05199, author = {Alejandro Mera and Yi Hui Chen and Ruimin Sun and Engin Kirda and Long Lu}, title = {D-Box: DMA-enabled Compartmentalization for Embedded Applications}, journal = {CoRR}, volume = {abs/2201.05199}, year = {2022}, url = {https://arxiv.org/abs/2201.05199}, eprinttype = {arXiv}, eprint = {2201.05199}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-05199.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-09099, author = {Lianting Hu and Huiying Liang and Jiajie Tang and Xin Li and Li Huang and Long Lu}, title = {Cutting-Splicing data augmentation: {A} novel technology for medical image segmentation}, journal = {CoRR}, volume = {abs/2210.09099}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.09099}, doi = {10.48550/ARXIV.2210.09099}, eprinttype = {arXiv}, eprint = {2210.09099}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-09099.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuLL21, author = {Lianting Hu and Huiying Liang and Long Lu}, title = {Splicing learning: {A} novel few-shot learning approach}, journal = {Inf. Sci.}, volume = {552}, pages = {17--28}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.11.028}, doi = {10.1016/J.INS.2020.11.028}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HuLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/FasanoBMLBDEFLG21, author = {Andrew Fasano and Tiemoko Ballo and Marius Muench and Tim Leek and Alexander Bulekov and Brendan Dolan{-}Gavitt and Manuel Egele and Aur{\'{e}}lien Francillon and Long Lu and Nick Gregory and Davide Balzarotti and William Robertson}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {SoK: Enabling Security Analyses of Embedded Systems via Rehosting}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {687--701}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453093}, doi = {10.1145/3433210.3453093}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/FasanoBMLBDEFLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MirzaeiVKLK21, author = {Omid Mirzaei and Roman Vasilenko and Engin Kirda and Long Lu and Amin Kharraz}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {{SCRUTINIZER:} Detecting Code Reuse in Malware via Decompilation and Machine Learning}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {130--150}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_7}, doi = {10.1007/978-3-030-80825-9\_7}, timestamp = {Tue, 13 Jul 2021 16:53:38 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MirzaeiVKLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SunMLC21, author = {Ruimin Sun and Alejandro Mera and Long Lu and David R. Choffnes}, title = {SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {385--402}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00034}, doi = {10.1109/EUROSP51992.2021.00034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SunMLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AkhavaniJSKKL21, author = {Seyed Ali Akhavani and Jordan Jueckstock and Junhua Su and Alexandros Kapravelos and Engin Kirda and Long Lu}, editor = {Joseph K. Liu and Sokratis K. Katsikas and Weizhi Meng and Willy Susilo and Rolly Intan}, title = {Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy}, booktitle = {Information Security - 24th International Conference, {ISC} 2021, Virtual Event, November 10-12, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13118}, pages = {161--176}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91356-4\_9}, doi = {10.1007/978-3-030-91356-4\_9}, timestamp = {Fri, 03 Dec 2021 17:36:27 +0100}, biburl = {https://dblp.org/rec/conf/isw/AkhavaniJSKKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuCL21, author = {Changming Liu and Yaohui Chen and Long Lu}, title = {{KUBO:} Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in {OS} Kernel}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/kubo-precise-and-scalable-detection-of-user-triggerable-undefined-behavior-bugs-in-os-kernel/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiuCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MeraFLK21, author = {Alejandro Mera and Bo Feng and Long Lu and Engin Kirda}, title = {{DICE:} Automatic Emulation of {DMA} Input Channels for Dynamic Firmware Analysis}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1938--1954}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00018}, doi = {10.1109/SP40001.2021.00018}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MeraFLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FarkhaniAL21, author = {Reza Mirzazade Farkhani and Mansour Ahmadi and Long Lu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {PTAuth: Temporal Memory Safety via Robust Points-to Authentication}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1037--1054}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/mirzazade}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/FarkhaniAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunSLM21, author = {Zhichuang Sun and Ruimin Sun and Long Lu and Alan Mislove}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Mind Your Weight(s): {A} Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1955--1972}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhichuang}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SunSLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AhmadiFWL21, author = {Mansour Ahmadi and Reza Mirzazade Farkhani and Ryan Williams and Long Lu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2025--2040}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ahmadi}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/AhmadiFWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lht/YuL20, author = {Zunpeng Yu and Long Lu}, title = {Comprehensive analysis of potential prognostic biomarker in gliomas}, journal = {Libr. Hi Tech}, volume = {38}, number = {4}, pages = {783--797}, year = {2020}, url = {https://doi.org/10.1108/LHT-08-2019-0173}, doi = {10.1108/LHT-08-2019-0173}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lht/YuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lht/ZhaoL20, author = {Wang Zhao and Long Lu}, title = {Research and development of autism diagnosis information system based on deep convolution neural network and facial expression data}, journal = {Libr. Hi Tech}, volume = {38}, number = {4}, pages = {799--817}, year = {2020}, url = {https://doi.org/10.1108/LHT-08-2019-0176}, doi = {10.1108/LHT-08-2019-0176}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lht/ZhaoL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lht/ChenFLL20, author = {Tao Chen and Tanya Froehlich and Tingyu Li and Long Lu}, title = {Big data approaches to develop a comprehensive and accurate tool aimed at improving autism spectrum disorder diagnosis and subtype stratification}, journal = {Libr. Hi Tech}, volume = {38}, number = {4}, pages = {819--833}, year = {2020}, url = {https://doi.org/10.1108/LHT-08-2019-0175}, doi = {10.1108/LHT-08-2019-0175}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lht/ChenFLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/midm/ZhaoLYL20a, author = {Wang Zhao and Peixin Lu and Siwei Yu and Long Lu}, title = {Consumer health information needs in China - a case study of depression based on a Social Q{\&}A community}, journal = {{BMC} Medical Informatics Decis. Mak.}, volume = {20-S}, number = {3}, pages = {130}, year = {2020}, url = {https://doi.org/10.1186/s12911-020-1124-1}, doi = {10.1186/S12911-020-1124-1}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/midm/ZhaoLYL20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HamlenL20, author = {Kevin W. Hamlen and Long Lu}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2149--2150}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3416251}, doi = {10.1145/3372297.3416251}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HamlenL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ChenLL20, author = {Tao Chen and Peixin Lu and Long Lu}, title = {Design Of {ASD} Subtyping Approach based on Multi-Omics Data to Promote Personalized Healthcare}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--6}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64150}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ChenLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/MaWL20, author = {Feicheng Ma and Jiang Wu and Long Lu}, title = {Introduction to the Minitrack on Data-Driven Smart Health in Asia Pacific}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--2}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64143}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/MaWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenAFWL20, author = {Yaohui Chen and Mansour Ahmadi and Reza Mirzazade Farkhani and Boyu Wang and Long Lu}, editor = {Manuel Egele and Leyla Bilge}, title = {{MEUZZ:} Smart Seed Scheduling for Hybrid Fuzzing}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {77--92}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/chen}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChenAFWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SunFLJ20, author = {Zhichuang Sun and Bo Feng and Long Lu and Somesh Jha}, title = {{OAT:} Attesting Operation Integrity of Embedded Devices}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1433--1449}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00042}, doi = {10.1109/SP40000.2020.00042}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SunFLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenLXGZZWL20, author = {Yaohui Chen and Peng Li and Jun Xu and Shengjian Guo and Rundong Zhou and Yulong Zhang and Tao Wei and Long Lu}, title = {{SAVIOR:} Towards Bug-Driven Hybrid Testing}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1580--1596}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00002}, doi = {10.1109/SP40000.2020.00002}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChenLXGZZWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FengML20, author = {Bo Feng and Alejandro Mera and Long Lu}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{P2IM:} Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1237--1254}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/feng}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/FengML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-07687, author = {Zhichuang Sun and Ruimin Sun and Long Lu}, title = {Mind Your Weight(s): {A} Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps}, journal = {CoRR}, volume = {abs/2002.07687}, year = {2020}, url = {https://arxiv.org/abs/2002.07687}, eprinttype = {arXiv}, eprint = {2002.07687}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-07687.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-07936, author = {Reza Mirzazade Farkhani and Mansour Ahmadi and Long Lu}, title = {PTAuth: Temporal Memory Safety via Robust Points-to Authentication}, journal = {CoRR}, volume = {abs/2002.07936}, year = {2020}, url = {https://arxiv.org/abs/2002.07936}, eprinttype = {arXiv}, eprint = {2002.07936}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-07936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-08568, author = {Yaohui Chen and Mansour Ahmadi and Reza Mirzazade Farkhani and Boyu Wang and Long Lu}, title = {{MEUZZ:} Smart Seed Scheduling for Hybrid Fuzzing}, journal = {CoRR}, volume = {abs/2002.08568}, year = {2020}, url = {https://arxiv.org/abs/2002.08568}, eprinttype = {arXiv}, eprint = {2002.08568}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-08568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-04806, author = {Ruimin Sun and Alejandro Mera and Long Lu and David R. Choffnes}, title = {SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses}, journal = {CoRR}, volume = {abs/2006.04806}, year = {2020}, url = {https://arxiv.org/abs/2006.04806}, eprinttype = {arXiv}, eprint = {2006.04806}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-04806.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-01502, author = {Alejandro Mera and Bo Feng and Long Lu and Engin Kirda and William K. Robertson}, title = {{DICE:} Automatic Emulation of {DMA} Input Channels for Dynamic Firmware Analysis}, journal = {CoRR}, volume = {abs/2007.01502}, year = {2020}, url = {https://arxiv.org/abs/2007.01502}, eprinttype = {arXiv}, eprint = {2007.01502}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-01502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-05905, author = {Zhichuang Sun and Ruimin Sun and Long Lu and Somesh Jha}, title = {ShadowNet: {A} Secure and Efficient System for On-device Model Inference}, journal = {CoRR}, volume = {abs/2011.05905}, year = {2020}, url = {https://arxiv.org/abs/2011.05905}, eprinttype = {arXiv}, eprint = {2011.05905}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-05905.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CristalliLBL19, author = {Stefano Cristalli and Long Lu and Danilo Bruschi and Andrea Lanzi}, editor = {David Balenson}, title = {Detecting (absent) app-to-app authentication on cross-device short-distance channels}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {328--338}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359814}, doi = {10.1145/3359789.3359814}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CristalliLBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenMXSSXLM19, author = {Yaohui Chen and Dongliang Mu and Jun Xu and Zhichuang Sun and Wenbo Shen and Xinyu Xing and Long Lu and Bing Mao}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {PTrix: Efficient Hardware-Assisted Fuzzing for {COTS} Binary}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {633--645}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329828}, doi = {10.1145/3321705.3329828}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenMXSSXLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsh/LuZ19, author = {Long Lu and Wang Zhao}, editor = {Hsinchun Chen and Daniel Zeng and Xiangbin Yan and Chunxiao Xing}, title = {Research on Three-Dimensional Reconstruction of Brain Image Features Based on Augmented Reality Technology}, booktitle = {Smart Health - International Conference, {ICSH} 2019, Shenzhen, China, July 1-2, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11924}, pages = {39--47}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34482-5\_4}, doi = {10.1007/978-3-030-34482-5\_4}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/icsh/LuZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AcarLUK19, author = {Abbas Acar and Long Lu and A. Selcuk Uluagac and Engin Kirda}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {An Analysis of Malware Trends in Enterprise Networks}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {360--380}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_18}, doi = {10.1007/978-3-030-30215-3\_18}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/AcarLUK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/ParkZLL19, author = {Heejin Park and Shuang Zhai and Long Lu and Felix Xiaozhu Lin}, editor = {Dahlia Malkhi and Dan Tsafrir}, title = {StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone}, booktitle = {2019 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2019, Renton, WA, USA, July 10-12, 2019}, pages = {537--554}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/atc19/presentation/park-heejin}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/usenix/ParkZLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vee/LiXLCZ19, author = {Wenhao Li and Yubin Xia and Long Lu and Haibo Chen and Binyu Zang}, editor = {Jennifer B. Sartor and Mayur Naik and Christopher J. Rossbach}, title = {TEEv: virtualizing trusted execution environments on mobile platforms}, booktitle = {Proceedings of the 15th {ACM} {SIGPLAN/SIGOPS} International Conference on Virtual Execution Environments, {VEE} 2019, Providence, RI, USA, April 14, 2019}, pages = {2--16}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3313808.3313810}, doi = {10.1145/3313808.3313810}, timestamp = {Fri, 08 Jul 2022 08:37:56 +0200}, biburl = {https://dblp.org/rec/conf/vee/LiXLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-10499, author = {Yaohui Chen and Dongliang Mu and Jun Xu and Zhichuang Sun and Wenbo Shen and Xinyu Xing and Long Lu and Bing Mao}, title = {PTrix: Efficient Hardware-Assisted Fuzzing for {COTS} Binary}, journal = {CoRR}, volume = {abs/1905.10499}, year = {2019}, url = {http://arxiv.org/abs/1905.10499}, eprinttype = {arXiv}, eprint = {1905.10499}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-10499.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-07327, author = {Yaohui Chen and Peng Li and Jun Xu and Shengjian Guo and Rundong Zhou and Yulong Zhang and Tao Wei and Long Lu}, title = {{SAVIOR:} Towards Bug-Driven Hybrid Testing}, journal = {CoRR}, volume = {abs/1906.07327}, year = {2019}, url = {http://arxiv.org/abs/1906.07327}, eprinttype = {arXiv}, eprint = {1906.07327}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-07327.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-06472, author = {Bo Feng and Alejandro Mera and Long Lu}, title = {P\({}^{\mbox{2}}\)IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version)}, journal = {CoRR}, volume = {abs/1909.06472}, year = {2019}, url = {http://arxiv.org/abs/1909.06472}, eprinttype = {arXiv}, eprint = {1909.06472}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-06472.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00508, author = {Abbas Acar and Long Lu and A. Selcuk Uluagac and Engin Kirda}, title = {An Analysis of Malware Trends in Enterprise Networks}, journal = {CoRR}, volume = {abs/1910.00508}, year = {2019}, url = {http://arxiv.org/abs/1910.00508}, eprinttype = {arXiv}, eprint = {1910.00508}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00508.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dim/HongLWLLL18, author = {Liang Hong and Mengqi Luo and Ruixue Wang and Peixin Lu and Wei Lu and Long Lu}, title = {Big Data in Health Care: Applications and Challenges}, journal = {Data Inf. Manag.}, volume = {2}, number = {3}, pages = {175--197}, year = {2018}, url = {https://doi.org/10.2478/dim-2018-0014}, doi = {10.2478/DIM-2018-0014}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dim/HongLWLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsh/LuZ18, author = {Long Lu and Wang Zhao}, editor = {Hsinchun Chen and Qing Fang and Daniel Zeng and Jiang Wu}, title = {Augmented Reality: New Technologies for Building Visualized Hospital Knowledge Management Systems}, booktitle = {Smart Health - International Conference, {ICSH} 2018, Wuhan, China, July 1-3, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10983}, pages = {15--25}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03649-2\_2}, doi = {10.1007/978-3-030-03649-2\_2}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/icsh/LuZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/LiLSXLCZG18, author = {Wenhao Li and Shiyu Luo and Zhichuang Sun and Yubin Xia and Long Lu and Haibo Chen and Binyu Zang and Haibing Guan}, editor = {J{\"{o}}rg Ott and Falko Dressler and Stefan Saroiu and Prabal Dutta}, title = {VButton: Practical Attestation of User-driven Operations in Mobile Apps}, booktitle = {Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2018, Munich, Germany, June 10-15, 2018}, pages = {28--40}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3210240.3210330}, doi = {10.1145/3210240.3210330}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/LiLSXLCZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenLLLVWO18, author = {Yaohui Chen and Yuping Li and Long Lu and Yueh{-}Hsun Lin and Hayawardh Vijayakumar and Zhi Wang and Xinming Ou}, title = {InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/03/ndss2018\_08-2\_Chen\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ChenLLLVWO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KooCLKP18, author = {Hyungjoon Koo and Yaohui Chen and Long Lu and Vasileios P. Kemerlis and Michalis Polychronakis}, title = {Compiler-Assisted Code Randomization}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {461--477}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00029}, doi = {10.1109/SP.2018.00029}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KooCLKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangZMXY00LD18, author = {Xiaohan Zhang and Yuan Zhang and Qianqian Mo and Hao Xia and Zhemin Yang and Min Yang and Xiaofeng Wang and Long Lu and Hai{-}Xin Duan}, editor = {William Enck and Adrienne Porter Felt}, title = {An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1183--1198}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/zhang-xiaohan}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangZMXY00LD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-03462, author = {Zhichuang Sun and Bo Feng and Long Lu and Somesh Jha}, title = {{OEI:} Operation Execution Integrity for Embedded Devices}, journal = {CoRR}, volume = {abs/1802.03462}, year = {2018}, url = {http://arxiv.org/abs/1802.03462}, eprinttype = {arXiv}, eprint = {1802.03462}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-03462.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-05078, author = {Heejin Park and Shuang Zhai and Long Lu and Felix Xiaozhu Lin}, title = {StreamBox-TZ: {A} Secure IoT Analytics Engine at the Edge}, journal = {CoRR}, volume = {abs/1808.05078}, year = {2018}, url = {http://arxiv.org/abs/1808.05078}, eprinttype = {arXiv}, eprint = {1808.05078}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-05078.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DavidsonCGLJ17, author = {Drew Davidson and Yaohui Chen and Franklin George and Long Lu and Somesh Jha}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {652--665}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052998}, doi = {10.1145/3052973.3052998}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DavidsonCGLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/AlaviQZMHQLG17, author = {Arash Alavi and Alan Quach and Hang Zhang and Bryan Marsh and Farhan Ul Haq and Zhiyun Qian and Long Lu and Rajiv Gupta}, editor = {Mohamed Ali K{\^{a}}afar and Steve Uhlig and Johanna Amann}, title = {Where Is the Weakest Link? {A} Study on Security Discrepancies Between Android Apps and Their Website Counterparts}, booktitle = {Passive and Active Measurement - 18th International Conference, {PAM} 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10176}, pages = {100--112}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54328-4\_8}, doi = {10.1007/978-3-319-54328-4\_8}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pam/AlaviQZMHQLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenZWQALVS17, author = {Yaohui Chen and Dongli Zhang and Ruowen Wang and Rui Qiao and Ahmed M. Azab and Long Lu and Hayawardh Vijayakumar and Wenbo Shen}, title = {{NORAX:} Enabling Execute-Only Memory for {COTS} Binaries on AArch64}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {304--319}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.30}, doi = {10.1109/SP.2017.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenZWQALVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuM16, author = {Long Lu and Mohammad Mannan}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Sixth Annual {ACM} {CCS} Workshop on Security and Privacy in Smartphones and Mobile Devices {(SPSM} 2016)}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1873--1874}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2990487}, doi = {10.1145/2976749.2990487}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChenWWL16, author = {Yue Chen and Zhi Wang and David B. Whalley and Long Lu}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Remix: On-demand Live Randomization}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {50--61}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857726}, doi = {10.1145/2857705.2857726}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ChenWWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/ZhuLS16, author = {Suwen Zhu and Long Lu and Kapil Singh}, editor = {Rajesh Krishna Balan and Archan Misra and Sharad Agarwal and Cecilia Mascolo}, title = {{CASE:} Comprehensive Application Security Enforcement on {COTS} Mobile Devices}, booktitle = {Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016}, pages = {375--386}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2906388.2906413}, doi = {10.1145/2906388.2906413}, timestamp = {Tue, 06 Nov 2018 16:59:04 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/ZhuLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenRSL16, author = {Yaohui Chen and Sebassujeen Reymondjohnson and Zhichuang Sun and Long Lu}, title = {Shreds: Fine-Grained Execution Units with Private Memory}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {56--71}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.12}, doi = {10.1109/SP.2016.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenRSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/YuanHZLL16, author = {Dazeng Yuan and Mingxing He and Shengke Zeng and Xiao Li and Long Lu}, editor = {Changjun Jiang and Omer F. Rana and Nick Antonopoulos}, title = {(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application}, booktitle = {Proceedings of the 9th International Conference on Utility and Cloud Computing, {UCC} 2016, Shanghai, China, December 6-9, 2016}, pages = {269--275}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996890.3007871}, doi = {10.1145/2996890.3007871}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ucc/YuanHZLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016spsm, editor = {Long Lu and Mohammad Mannan}, title = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994459}, doi = {10.1145/2994459}, isbn = {978-1-4503-4564-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016spsm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeasbittLPLSL15, author = {Christopher Neasbitt and Bo Li and Roberto Perdisci and Long Lu and Kapil Singh and Kang Li}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {133--145}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813656}, doi = {10.1145/2810103.2813656}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NeasbittLPLSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LeeSJWKLL15, author = {Byoungyoung Lee and Chengyu Song and Yeongjin Jang and Tielei Wang and Taesoo Kim and Long Lu and Wenke Lee}, title = {Preventing Use-after-free with Dangling Pointers Nullification}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/preventing-use-after-free-dangling-pointers-nullification}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LeeSJWKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15, author = {Kangjie Lu and Zhichun Li and Vasileios P. Kemerlis and Zhenyu Wu and Long Lu and Cong Zheng and Zhiyun Qian and Wenke Lee and Guofei Jiang}, title = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LeeLWKL14, author = {Byoungyoung Lee and Long Lu and Tielei Wang and Taesoo Kim and Wenke Lee}, title = {From Zygote to Morula: Fortifying Weakened {ASLR} on Android}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {424--439}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.34}, doi = {10.1109/SP.2014.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LeeLWKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/SeifertSCPL13, author = {Christian Seifert and Jack W. Stokes and Christina Colcernian and John C. Platt and Long Lu}, title = {Robust scareware image detection}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013}, pages = {2920--2924}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICASSP.2013.6638192}, doi = {10.1109/ICASSP.2013.6638192}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/SeifertSCPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangLLCL13, author = {Tielei Wang and Kangjie Lu and Long Lu and Simon P. Chung and Wenke Lee}, editor = {Samuel T. King}, title = {Jekyll on iOS: When Benign Apps Become Evil}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {559--572}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang\_tielei}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangLLCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuLWLJ12, author = {Long Lu and Zhichun Li and Zhenyu Wu and Wenke Lee and Guofei Jiang}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {{CHEX:} statically vetting Android apps for component hijacking vulnerabilities}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {229--240}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382223}, doi = {10.1145/2382196.2382223}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LuLWLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuPL11, author = {Long Lu and Roberto Perdisci and Wenke Lee}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {{SURF:} detecting and measuring search poisoning}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {467--476}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046762}, doi = {10.1145/2046707.2046762}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuPL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/SunZLN10, author = {Li Sun and Taiyi Zhang and Long Lu and Hao Niu}, title = {On the Combination of Cooperative Diversity and Multiuser Diversity in Multi-Source Multi-Relay Wireless Networks}, journal = {{IEEE} Signal Process. Lett.}, volume = {17}, number = {6}, pages = {535--538}, year = {2010}, url = {https://doi.org/10.1109/LSP.2010.2046350}, doi = {10.1109/LSP.2010.2046350}, timestamp = {Mon, 25 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/SunZLN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuYPL10, author = {Long Lu and Vinod Yegneswaran and Phillip A. Porras and Wenke Lee}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {{BLADE:} an attack-agnostic approach for preventing drive-by malware infections}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {440--450}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866356}, doi = {10.1145/1866307.1866356}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuYPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/SunZLN09, author = {Li Sun and Taiyi Zhang and Long Lu and Hao Niu}, title = {Cooperative communications with relay selection in wireless sensor networks}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {55}, number = {2}, pages = {513--517}, year = {2009}, url = {https://doi.org/10.1109/TCE.2009.5174415}, doi = {10.1109/TCE.2009.5174415}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/SunZLN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CarboneCLLPJ09, author = {Martim Carbone and Weidong Cui and Long Lu and Wenke Lee and Marcus Peinado and Xuxian Jiang}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Mapping kernel objects to enable systematic integrity checking}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {555--565}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653729}, doi = {10.1145/1653662.1653729}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CarboneCLLPJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuYPL09, author = {Long Lu and Vinod Yegneswaran and Phillip A. Porras and Wenke Lee}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {{BLADE:} Slashing the Invisible Channel of Drive-by Download Malware}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {350--352}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_20}, doi = {10.1007/978-3-642-04342-0\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/LuYPL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.