Follow
Qiang Zeng
Title
Cited by
Cited by
Year
Neural machine translation inspired binary code similarity comparison beyond function pairs
F Zuo, X Li, Z Zhang, P Young, L Luo, Q Zeng
arXiv preprint arXiv:1808.04706; NDSS 2019, 2018
2392018
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling
H Chi, Q Zeng, X Du, J Yu
arXiv preprint arXiv:1808.02125, 2018
972018
HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes
C Fu, Q Zeng, X Du
USENIX Security, 2021
882021
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis
K Redmond, L Luo, Q Zeng
arXiv preprint arXiv:1812.09652, 2018
642018
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures
Q Zeng, D Wu, P Liu
PLDI 2011, 367-377, 2011
642011
Touch well before use: Intuitive and secure authentication for iot devices
X Li, F Yan, F Zuo, Q Zeng, L Luo
The 25th annual international conference on mobile computing and networking …, 2019
552019
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples
Q Zeng, J Su, C Fu, G Kayas, L Luo, X Du, CC Tan, J Wu
The 49th IEEE/IFIP International Conference on Dependable Systems and …, 2019
53*2019
Privacy leakage in smart homes and its mitigation: IFTTT as a case study
R Xu, Q Zeng, L Zhu, H Chi, X Du, M Guizani
IEEE Access 7, 63457-63471, 2019
522019
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection
H Chi, Q Zeng, X Du, L Luo
NDSS, 2021
51*2021
T2pair: Secure and usable pairing for heterogeneous iot devices
X Li, Q Zeng, L Luo, T Luo
Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020
492020
Resilient decentralized android application repackaging detection using logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li
Proceedings of the 2018 international symposium on code generation and …, 2018
402018
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
382017
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP …, 2015
372015
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
D Tian, Q Zeng, D Wu, P Liu, C Hu
NDSS 2012, 2012
302012
Heaptherapy: An efficient end-to-end solution against heap buffer overflows
Q Zeng, M Zhao, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
292015
Deltapath: Precise and scalable calling context encoding
Q Zeng, J Rhee, H Zhang, N Arora, G Jiang, P Liu
IEEE/ACM International Symposium on Code Generation and Optimization, 109, 2014
232014
Solminer: mining distinct solutions in programs
L Luo, Q Zeng
Proceedings of the 38th International Conference on Software Engineering …, 2016
222016
Delay wreaks havoc on your smart home: Delay-based automation interference attacks
H Chi, C Fu, Q Zeng, X Du
2022 IEEE Symposium on Security and Privacy (SP), 285-302, 2022
182022
Exploiting the sensitivity of L2 adversarial examples to erase-and-restore
F Zuo, Q Zeng
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
182021
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas
IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20