default search action
Dinghao Wu
Person information
- affiliation: Penn State University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Fangtian Zhong, Qin Hu, Yili Jiang, Jiaqi Huang, Cheng Zhang, Dinghao Wu:
Enhancing Malware Classification via Self-Similarity Techniques. IEEE Trans. Inf. Forensics Secur. 19: 7232-7244 (2024) - [j20]Xiaoting Li, Lingwei Chen, Dinghao Wu:
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy. ACM Trans. Knowl. Discov. Data 18(2): 46:1-46:24 (2024) - [c94]Hangfan Zhang, Zhimeng Guo, Huaisheng Zhu, Bochuan Cao, Lu Lin, Jinyuan Jia, Jinghui Chen, Dinghao Wu:
Jailbreak Open-Sourced Large Language Models via Enforced Decoding. ACL (1) 2024: 5475-5493 - [c93]Shixiong Jing, Lingwei Chen, Quan Li, Dinghao Wu:
H2GNN: Graph Neural Networks with Homophilic and Heterophilic Feature Aggregations. DASFAA (6) 2024: 342-352 - [c92]Songtao Liu, Jinghui Chen, Tianfan Fu, Lu Lin, Marinka Zitnik, Dinghao Wu:
Graph Adversarial Diffusion Convolution. ICML 2024 - [c91]Shixiong Jing, Lingwei Chen, Quan Li, Dinghao Wu:
DOS-GNN: Dual-Feature Aggregations with Over-Sampling for Class-Imbalanced Fraud Detection On Graphs. IJCNN 2024: 1-8 - [c90]Tianrou Xia, Hong Hu, Dinghao Wu:
DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis. USENIX Security Symposium 2024 - [i11]Songtao Liu, Jinghui Chen, Tianfan Fu, Lu Lin, Marinka Zitnik, Dinghao Wu:
Graph Adversarial Diffusion Convolution. CoRR abs/2406.02059 (2024) - 2023
- [j19]Cong Ma, Dinghao Wu, Gang Tan, Mahmut Taylan Kandemir, Danfeng Zhang:
Quantifying and Mitigating Cache Side Channel Leakage with Differential Set. Proc. ACM Program. Lang. 7(OOPSLA2): 1470-1498 (2023) - [c89]Jinquan Zhang, Pei Wang, Dinghao Wu:
LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library. ENASE 2023: 283-292 - [c88]Quan Li, Lingwei Chen, Shixiong Jing, Dinghao Wu:
Pseudo-Labeling with Graph Active Learning for Few-shot Node Classification. ICDM 2023: 1115-1120 - [c87]Songtao Liu, Zhengkai Tu, Minkai Xu, Zuobai Zhang, Lu Lin, Rex Ying, Jian Tang, Peilin Zhao, Dinghao Wu:
FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning. ICML 2023: 22028-22041 - [c86]Hangfan Zhang, Jinghui Chen, Lu Lin, Jinyuan Jia, Dinghao Wu:
Graph Contrastive Backdoor Attacks. ICML 2023: 40888-40910 - [c85]Zihao Wang, Pei Wang, Qinkun Bao, Dinghao Wu:
Source Code Implied Language Structure Abstraction through Backward Taint Analysis. ICSOFT 2023: 564-571 - [c84]Yuanqing Miao, Mahmut Taylan Kandemir, Danfeng Zhang, Yingtian Zhang, Gang Tan, Dinghao Wu:
Hardware Support for Constant-Time Programming. MICRO 2023: 856-870 - [c83]Hangfan Zhang, Jinyuan Jia, Jinghui Chen, Lu Lin, Dinghao Wu:
A3FL: Adversarially Adaptive Backdoor Attacks to Federated Learning. NeurIPS 2023 - [c82]Quan Li, Lingwei Chen, Yong Cai, Dinghao Wu:
Hierarchical Graph Neural Network for Patient Treatment Preference Prediction with External Knowledge. PAKDD (3) 2023: 204-215 - [c81]Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee:
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. USENIX Security Symposium 2023: 1325-1342 - [c80]Quan Li, Lingwei Chen, Shixiong Jing, Dinghao Wu:
Knowledge Distillation on Cross-Modal Adversarial Reprogramming for Data-Limited Attribute Inference. WWW (Companion Volume) 2023: 65-68 - [i10]Xiaoting Li, Lingwei Chen, Dinghao Wu:
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy. CoRR abs/2306.02488 (2023) - [i9]Hangfan Zhang, Zhimeng Guo, Huaisheng Zhu, Bochuan Cao, Lu Lin, Jinyuan Jia, Jinghui Chen, Dinghao Wu:
On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused? CoRR abs/2310.01581 (2023) - 2022
- [j18]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - [j17]Michael G. Kallitsis, Rupesh Prajapati, Vasant G. Honavar, Dinghao Wu, John Yen:
Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes. IEEE Trans. Inf. Forensics Secur. 17: 3611-3625 (2022) - [j16]Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, Xiaobo Ma:
PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Trans. Software Eng. 48(2): 551-570 (2022) - [c79]Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu:
ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing. AAAI 2022: 12559-12565 - [c78]Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu:
FuzzBoost: Reinforcement Compiler Fuzzing. ICICS 2022: 359-375 - [c77]Songtao Liu, Rex Ying, Hanze Dong, Lanqing Li, Tingyang Xu, Yu Rong, Peilin Zhao, Junzhou Huang, Dinghao Wu:
Local Augmentation for Graph Neural Networks. ICML 2022: 14054-14072 - [c76]Lingwei Chen, Xiaoting Li, Dinghao Wu:
Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection. SDM 2022: 693-701 - [c75]Xiaoting Li, Lingwei Chen, Dinghao Wu:
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks. SecureComm 2022: 710-728 - [c74]Quan Li, Xiaoting Li, Lingwei Chen, Dinghao Wu:
Distilling Knowledge on Text Graph for Social Media Attribute Inference. SIGIR 2022: 2024-2028 - [i8]Songtao Liu, Rex Ying, Hanze Dong, Lu Lin, Jinghui Chen, Dinghao Wu:
How Powerful is Implicit Denoising in Graph Neural Networks. CoRR abs/2209.14514 (2022) - [i7]Songtao Liu, Rex Ying, Zuobai Zhang, Peilin Zhao, Jian Tang, Lu Lin, Dinghao Wu:
Metro: Memory-Enhanced Transformer for Retrosynthetic Planning via Reaction Tree. CoRR abs/2209.15315 (2022) - 2021
- [j15]Zhenzhou Tian, Yaqian Huang, Borun Xie, Yanping Chen, Lingwei Chen, Dinghao Wu:
Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling. IEEE Access 9: 49160-49175 (2021) - [c73]Rupesh Prajapati, Vasant G. Honavar, Dinghao Wu, John Yen, Michalis Kallitsis:
Shedding light into the darknet: scanning characterization and detection of temporal changes. CoNEXT 2021: 469-470 - [c72]Qinkun Bao, Zihao Wang, James R. Larus, Dinghao Wu:
Abacus: A Tool for Precise Side-Channel Analysis. ICSE (Companion Volume) 2021: 238-239 - [c71]Qinkun Bao, Zihao Wang, Xiaoting Li, James R. Larus, Dinghao Wu:
Abacus: Precise Side-Channel Analysis. ICSE 2021: 797-809 - [c70]Xiaoting Li, Lingwei Chen, Jinquan Zhang, James R. Larus, Dinghao Wu:
Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks. IJCNN 2021: 1-8 - [c69]Lei Xue, Yuxiao Yan, Luyi Yan, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou:
Parema: an unpacking framework for demystifying VM-based Android packers. ISSTA 2021: 152-164 - [c68]Shixiong Jing, Qinkun Bao, Pei Wang, Xulong Tang, Dinghao Wu:
Characterizing AI Model Inference Applications Running in the SGX Environment. NAS 2021: 1-4 - [c67]Xiaoting Li, Lingwei Chen, Dinghao Wu:
Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks. SDM 2021: 208-216 - [c66]Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee:
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. SP 2021: 642-658 - [i6]Michalis Kallitsis, Vasant G. Honavar, Rupesh Prajapati, Dinghao Wu, John Yen:
Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes. CoRR abs/2108.00079 (2021) - [i5]Songtao Liu, Hanze Dong, Lanqing Li, Tingyang Xu, Yu Rong, Peilin Zhao, Junzhou Huang, Dinghao Wu:
Local Augmentation for Graph Neural Networks. CoRR abs/2109.03856 (2021) - 2020
- [j14]Zhenzhou Tian, Qing Wang, Cong Gao, Lingwei Chen, Dinghao Wu:
Plagiarism Detection of Multi-Threaded Programs via Siamese Neural Networks. IEEE Access 8: 160802-160814 (2020) - [j13]Zhenzhou Tian, Qing Wang, Cong Gao, Lingwei Chen, Dinghao Wu:
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining. Int. J. Softw. Eng. Knowl. Eng. 30(11&12): 1667-1688 (2020) - [j12]Menghao Li, Pei Wang, Wei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo, Wei Zou:
Large-Scale Third-Party Library Detection in Android Markets. IEEE Trans. Software Eng. 46(9): 981-1003 (2020) - [c65]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CCS 2020: 955-970 - [c64]Pei Wang, Jinquan Zhang, Shuai Wang, Dinghao Wu:
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries. EuroS&P 2020: 1-16 - [c63]Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su:
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. NDSS 2020 - [c62]Lingwei Chen, Xiaoting Li, Dinghao Wu:
Enhancing Robustness of Graph Convolutional Networks via Dropping Graph Connections. ECML/PKDD (3) 2020: 412-428 - [c61]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. SP 2020: 1512-1526 - [i4]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CoRR abs/2006.02398 (2020)
2010 – 2019
- 2019
- [j11]Li Wang, Dinghao Wu:
Bridging the Gap Between Security Tools and SDN Controllers. EAI Endorsed Trans. Security Safety 5(17): e1 (2019) - [j10]Pei Wang, Dinghao Wu, Zhaofeng Chen, Tao Wei:
Field experience with obfuscating million-user iOS apps in large enterprise mobile development. Softw. Pract. Exp. 49(2): 252-273 (2019) - [j9]Haoyu Ma, Chunfu Jia, Shijia Li, Wantong Zheng, Dinghao Wu:
Xmark: Dynamic Software Watermarking Using Collatz Conjecture. IEEE Trans. Inf. Forensics Secur. 14(11): 2859-2874 (2019) - [c60]Xiao Liu, Xiaoting Li, Rupesh Prajapati, Dinghao Wu:
DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing. AAAI 2019: 1044-1051 - [c59]Li Wang, Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu:
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus. SPRO@CCS 2019: 15-26 - [c58]Xiao Liu, Yufei Jiang, Dinghao Wu:
A Lightweight Framework for Regular Expression Verification. HASE 2019: 1-8 - [c57]Xiao Liu, Shuai Wang, Pei Wang, Dinghao Wu:
Automatic grading of programming assignments: an approach based on formal semantics. ICSE (SEET) 2019: 126-137 - [c56]Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. USENIX Security Symposium 2019: 657-674 - [i3]Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. CoRR abs/1905.13332 (2019) - [i2]Songtao Liu, Lingwei Chen, Hanze Dong, Zihao Wang, Dinghao Wu, Zengfeng Huang:
Higher-order Weighted Graph Convolutional Networks. CoRR abs/1911.04129 (2019) - 2018
- [c55]Dongpeng Xu, Jiang Ming, Yu Fu, Dinghao Wu:
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. CCS 2018: 442-458 - [c54]Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, Dinghao Wu:
Software protection on the go: a large-scale empirical study on mobile app obfuscation. ICSE 2018: 26-36 - [c53]Pei Wang, Dinghao Wu, Zhaofeng Chen, Tao Wei:
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience. ICSE (SEIP) 2018: 235-244 - [c52]Yufei Jiang, Qinkun Bao, Shuai Wang, Xiao Liu, Dinghao Wu:
RedDroid: Android Application Redundancy Customization Based on Static Analysis. ISSRE 2018: 189-199 - 2017
- [j8]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Trans. Software Eng. 43(12): 1157-1177 (2017) - [j7]Jiang Ming, Dongpeng Xu, Dinghao Wu:
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. J. Comput. Virol. Hacking Tech. 13(3): 167-178 (2017) - [j6]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Impeding behavior-based malware analysis via replacement attacks to malware specifications. J. Comput. Virol. Hacking Tech. 13(3): 193-207 (2017) - [c51]Shuai Wang, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, Dinghao Wu:
Binary Code Retrofitting and Hardening Using SGX. FEAST@CCS 2017: 43-49 - [c50]Taesoo Kim, Dinghao Wu:
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation. CCS 2017: 2633-2634 - [c49]Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo:
LibD: scalable and precise third-party library detection in android markets. ICSE 2017: 335-346 - [c48]Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, Dinghao Wu:
Adaptive unpacking of Android apps. ICSE 2017: 358-369 - [c47]Shuai Wang, Pei Wang, Dinghao Wu:
Composite Software Diversification. ICSME 2017: 284-294 - [c46]Shuai Wang, Pei Wang, Dinghao Wu:
Semantics-Aware Machine Learning for Function Recognition in Binary Code. ICSME 2017: 388-398 - [c45]Xiao Liu, Brett Holden, Dinghao Wu:
Automated Synthesis of Access Control Lists. ICSSA 2017: 104-109 - [c44]Shuai Wang, Dinghao Wu:
In-memory fuzzing for binary code similarity analysis. ASE 2017: 319-330 - [c43]Li Wang, Dinghao Wu:
SecControl: Bridging the Gap Between Security Tools and SDN Controllers. ATCS/SePrIoT@SecureComm 2017: 11-31 - [c42]Pengwei Lan, Pei Wang, Shuai Wang, Dinghao Wu:
Lambda Obfuscation. SecureComm 2017: 206-224 - [c41]Yan Wang, Shuai Wang, Pei Wang, Dinghao Wu:
Turing Obfuscation. SecureComm 2017: 225-244 - [c40]Dongpeng Xu, Jiang Ming, Dinghao Wu:
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. IEEE Symposium on Security and Privacy 2017: 921-937 - [c39]Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu:
CacheD: Identifying Cache-Based Timing Channels in Production Software. USENIX Security Symposium 2017: 235-252 - [c38]Jiang Ming, Dongpeng Xu, Yufei Jiang, Dinghao Wu:
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. USENIX Security Symposium 2017: 253-270 - [e1]Taesoo Kim, Cliff Wang, Dinghao Wu:
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5395-3 [contents] - 2016
- [j5]Xiao Liu, Yufei Jiang, Lawrence Wu, Dinghao Wu:
Natural Shell: An Assistant for End-User Scripting. Int. J. People Oriented Program. 5(1): 1-18 (2016) - [j4]Jiang Ming, Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection. IEEE Trans. Reliab. 65(4): 1647-1664 (2016) - [c37]Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu:
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. CODASPY 2016: 277-284 - [c36]Yufei Jiang, Dinghao Wu, Peng Liu:
JRed: Program Customization and Bloatware Mitigation Based on Static Analysis. COMPSAC 2016: 12-21 - [c35]Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu:
Repackage-Proofing Android Apps. DSN 2016: 550-561 - [c34]Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. EuroS&P 2016: 128-144 - [c33]Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. HASE 2016: 122-131 - [c32]Li Wang, Dinghao Wu:
Moving Target Defense Against Network Reconnaissance with Software Defined Networking. ISC 2016: 203-217 - [c31]Dongpeng Xu, Jiang Ming, Dinghao Wu:
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method. ISC 2016: 323-342 - [c30]Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, Peng Liu:
StraightTaint: decoupled offline symbolic taint analysis. ASE 2016: 308-319 - [c29]Wang Li, Dinghao Wu, Peng Liu:
iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary. QRS Companion 2016: 31-38 - [c28]Jiang Ming, Dinghao Wu:
BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling. SCAM 2016: 61-66 - [c27]Shuai Wang, Pei Wang, Dinghao Wu:
UROBOROS: Instrumenting Stripped Binaries with Static Reassembling. SANER 2016: 236-247 - [i1]Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. CoRR abs/1601.00763 (2016) - 2015
- [j3]Yufei Jiang, Nan Yu, Jiang Ming, Sanghoon Lee, Jason DeGraw, John Yen, John I. Messner, Dinghao Wu:
Automatic building information model query generation. J. Inf. Technol. Constr. 20: 518-535 (2015) - [j2]Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, Dinghao Wu:
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Trans. Software Eng. 41(9): 925-943 (2015) - [c26]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. ACNS 2015: 497-517 - [c25]Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu:
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. AsiaCCS 2015: 7-18 - [c24]Jiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu:
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. CCS 2015: 757-768 - [c23]Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu:
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities. DSN 2015: 555-562 - [c22]Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract). QRS Companion 2015: 184-185 - [c21]Jiang Ming, Dongpeng Xu, Dinghao Wu:
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. SEC 2015: 416-430 - [c20]Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu:
TaintPipe: Pipelined Symbolic Taint Analysis. USENIX Security Symposium 2015: 65-80 - [c19]Shuai Wang, Pei Wang, Dinghao Wu:
Reassembleable Disassembling. USENIX Security Symposium 2015: 627-642 - 2014
- [c18]Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Program Logic Based Software Plagiarism Detection. ISSRE 2014: 66-77 - [c17]Xiao Liu, Dinghao Wu:
PiE: programming in eliza. ASE 2014: 695-700 - [c16]Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. SecureComm (2) 2014: 359-366 - [c15]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. SIGSOFT FSE 2014: 389-400 - [c14]Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu:
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. WISEC 2014: 25-36 - [p2]Dinghao Wu, John Fulmer, Shannon Johnson:
Teaching Information Security with Virtual Laboratories. Innovative Practices in Teaching Information Sciences and Technology 2014: 179-192 - [p1]Dinghao Wu, Peng Liu, Qiang Zeng, Donghai Tian:
Software Cruising: A New Technology for Building Concurrent Software Monitor. Secure Cloud Computing 2014: 303-324 - 2013
- [j1]Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu:
Semantic aware attribution analysis of remote exploits. Secur. Commun. Networks 6(7): 818-832 (2013) - [c13]Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu:
A Framework for Evaluating Mobile App Repackaging Detection Algorithms. TRUST 2013: 169-186 - 2012
- [c12]Chu Huang, Sencun Zhu, Dinghao Wu:
Towards Trusted Services: Result Verification Schemes for MapReduce. CCGRID 2012: 41-48 - [c11]Fangfang Zhang, Yoon-chan Jhi, Dinghao Wu, Peng Liu, Sencun Zhu:
A first step towards algorithm plagiarism detection. ISSTA 2012: 111-121 - [c10]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. NDSS 2012 - 2011
- [c9]Yoon-chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu:
Value-based program characterization and its application to software plagiarism detection. ICSE 2011: 756-765 - [c8]Cornelia Caragea, Nathan J. McNeese, Anuj R. Jaiswal, Greg Traylor, Hyun-Woo Kim, Prasenjit Mitra, Dinghao Wu, Andrea H. Tapia, C. Lee Giles, Bernard J. Jansen, John Yen:
Classifying text messages for the haiti earthquake. ISCRAM 2011 - [c7]Qiang Zeng, Dinghao Wu, Peng Liu:
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures. PLDI 2011: 367-377 - [c6]Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. SecureComm 2011: 190-208 - [c5]Baojun Qiu, Kang Zhao, Prasenjit Mitra, Dinghao Wu, Cornelia Caragea, John Yen, Greta E. Greer, Kenneth Portier:
Get Online Support, Feel Better - Sentiment Analysis and Dynamics in an Online Cancer Survivor Community. SocialCom/PASSAT 2011: 274-281
2000 – 2009
- 2004
- [c4]Shaz Qadeer, Dinghao Wu:
KISS: keep it simple and sequential. PLDI 2004: 14-24 - [c3]Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao Wu:
Construction of a Semantic Model for a Typed Assembly Language. VMCAI 2004: 30-43 - 2003
- [c2]Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang:
A provably sound TAL for back-end optimization. PLDI 2003: 208-219 - [c1]Dinghao Wu, Andrew W. Appel, Aaron Stump:
Foundational proof checkers with small witnesses. PPDP 2003: 264-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint