Xiangyu Zhang
Xiangyu Zhang
Professor of Computer Science, Purdue University
Geverifieerd e-mailadres voor cs.purdue.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Trojaning attack on neural networks
Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang
4202017
Locating faults through automated predicate switching
X Zhang, N Gupta, R Gupta
Proceedings of the 28th international conference on Software engineering …, 2006
3442006
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Z Lin, X Jiang, D Xu, X Zhang
NDSS 8, 1-15, 2008
2952008
Precise dynamic slicing algorithms
X Zhang, R Gupta, Y Zhang
Software Engineering, 2003. Proceedings. 25th International Conference on …, 2003
2782003
Automatic reverse engineering of data structures from binary execution
Z Lin, X Zhang, D Xu
Proceedings of the 11th Annual Information Security Symposium, 5, 2010
2592010
AsDroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
J Huang, X Zhang, L Tan, P Wang, B Liang
Proceedings of the 36th International Conference on Software Engineering …, 2014
2492014
Locating faulty code using failure-inducing chops
N Gupta, H He, X Zhang, R Gupta
Proceedings of the 20th IEEE/ACM international Conference on Automated …, 2005
2392005
Z3-str: A z3-based string solver for web application analysis
Y Zheng, X Zhang, V Ganesh
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
2272013
Pruning dynamic slices with confidence
X Zhang, N Gupta, R Gupta
ACM SIGPLAN Notices 41 (6), 169-180, 2006
1972006
Experimental evaluation of using dynamic slices for fault location
X Zhang, H He, N Gupta, R Gupta
Proceedings of the sixth international symposium on Automated analysis …, 2005
1802005
Cost effective dynamic program slicing
X Zhang, R Gupta
ACM SIGPLAN Notices 39 (6), 94-106, 2004
1572004
High Accuracy Attack Provenance via Binary-based Execution Partition.
KH Lee, X Zhang, D Xu
NDSS, 2013
1512013
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting
S Ma, X Zhang, D Xu
1322016
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Z Lin, J Rhee, X Zhang, D Xu, X Jiang
NDSS, 2011
1312011
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking
S Ma, Y Liu, G Tao, WC Lee, X Zhang
26th Annual Network and Distributed System Security Symposium, NDSS, 24-27, 2019
1202019
Plagiarizing smartphone applications: attack strategies and defense techniques
R Potharaju, A Newell, C Nita-Rotaru, X Zhang
Engineering Secure Software and Systems, 106-120, 2012
1192012
Spider: Stealthy binary program instrumentation and debugging via hardware virtualization
Z Deng, X Zhang, D Xu
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
1162013
SUPOR: precise and scalable sensitive user input detection for android apps
J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang
24th USENIX Security Symposium (USENIX Security 15), 977-992, 2015
1152015
Efficient program execution indexing
B Xin, WN Sumner, X Zhang
ACM SIGPLAN Notices 43 (6), 238-248, 2008
1072008
Towards locating execution omission errors
X Zhang, S Tallam, N Gupta, R Gupta
ACM Sigplan Notices 42 (6), 415-424, 2007
1062007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20