一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks).
计算机科学, 2016
A Lattice-Based Access Control Model for Social Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016
Timing-Based Clone Detection on Android Markets.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Vulnerability-Based Backdoors: Threats from Two-step Trojans.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
VulLocator: Automatically Locating Vulnerable Code in Binary Programs.
Proceedings of the Information Security Practice and Experience, 2013
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
A novel vector edge sampling scheme for IP traceback against DDoS attacks.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Game-Theoretical Effectiveness Evaluation of DDoS Defense.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008