Follow
Purui Su
Purui Su
Verified email at iscas.ac.cn
Title
Cited by
Cited by
Year
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
2322018
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
NDSS, 2020
682020
A typical noisy covert channel in the IP protocol
H Qu, P Su, D Feng
38th Annual 2004 International Carnahan Conference on Security Technology …, 2004
482004
Notes on packet marking for IP traceback
DQ Li, PR Su, DG Feng
Journal of Software 15 (2), 250-258, 2004
442004
Binary code continent: Finer-grained control flow integrity for stripped binaries
M Wang, H Yin, AV Bhaskar, P Su, D Feng
Proceedings of the 31st annual computer security applications conference …, 2015
412015
基于语义的恶意代码行为特征提取及检测方法
王蕊, 冯登国, 杨轶, 苏璞睿
软件学报 23 (2), 378-393, 2012
412012
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
332019
Towards Efficient Heap Overflow Discovery.
X Jia, C Zhang, P Su, Y Yang, H Huang, D Feng
USENIX Security Symposium, 989-1006, 2017
332017
Capability-based security enforcement in named data networking
Q Li, PPC Lee, P Zhang, P Su, L He, K Ren
IEEE/ACM Transactions on Networking 25 (5), 2719-2730, 2017
332017
Automatic polymorphic exploit generation for software vulnerabilities
M Wang, P Su, Q Li, L Ying, Y Yang, D Feng
Security and Privacy in Communication Networks: 9th International ICST …, 2013
332013
IP 追踪中的自适应包标记
李德全, 徐一丁, 苏璞睿, 冯登国
电子学报 32 (8), 1334, 2004
332004
Bind your phone number with caution: automated user profiling through address book matching on smartphone
Y Cheng, L Ying, S Jiao, P Su, D Feng
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
272013
CloudSEC: A cloud architecture for composing collaborative security services
J Xu, J Yan, L He, P Su, D Feng
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
272010
P2P 信任模型中基于行为相似度的共谋团体识别模型
苗光胜, 冯登国, 苏璞睿
通信学报, 9-20, 2009
272009
Software and cyber security-A survey
刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民
Journal of Software 29 (1), 42-68, 2017
262017
移动社交应用的用户隐私泄漏问题研究
程瑶, 应凌云, 焦四辈, 苏璞睿, 冯登国
计算机学报 37 (001), 87-100, 2014
252014
基于攻击能力增长的网络安全分析模型
张海霞, 苏璞睿, 冯登国
计算机研究与发展 44 (12), 2012-2019, 2007
242007
Detecting concurrency memory corruption vulnerabilities
Y Cai, B Zhu, R Meng, H Yun, L He, P Su, B Liang
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
232019
Semantics-based malware behavior signature extraction and detection method
王蕊, 冯登国, 杨轶, 苏璞睿
Journal of Software 23 (2), 378-393, 2012
232012
基于代码覆盖的恶意代码多路径分析方法
王祥根, 司端锋, 冯登国, 苏璞睿
电子学报 37 (4), 701, 2009
232009
The system can't perform the operation now. Try again later.
Articles 1–20