Chaojing Tang
Orcid: 0000-0002-9025-2791
According to our database1,
Chaojing Tang
authored at least 73 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023
2022
Symmetry, 2022
Pusher: an augmented fuzzer based on the connection between input and comparison operand.
Frontiers Comput. Sci., 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE Access, 2019
Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game.
IEEE Access, 2019
2018
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression.
Secur. Commun. Networks, 2018
Discover deeper bugs with dynamic symbolic execution and coverage-based fuzz testing.
IET Softw., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Inf. Syst., 2018
Sci. China Inf. Sci., 2018
Design and Optimization of Joint Iterative Detection and Decoding Receiver for Uplink Polar Coded SCMA System.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018
Improved wolf pack algorithm with differential evolution for global numerical optimization.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018
2017
Secur. Commun. Networks, 2017
CoRR, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017
Proceedings of the 4th International Conference on Systems and Informatics, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
Detecting integer overflow in Windows binary executables based on symbolic execution.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016
Proceedings of the 3rd International Conference on Systems and Informatics, 2016
Nose Tip Detection and Face Localization from Face Range Image Based on Multi-angle Energy.
Proceedings of the E-Learning and Games - 10th International Conference, 2016
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
Proceedings of the 9th International Congress on Image and Signal Processing, 2016
2015
Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party.
Quantum Inf. Process., 2015
Diversity gain of lattice constellation-based joint orthogonal space-time block coding.
IET Commun., 2015
Robust nose tip detection for face range images based on local features in scale-space.
Proceedings of the 2015 International Conference on 3D Imaging, 2015
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
2014
TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer.
Secur. Commun. Networks, 2014
J. Netw. Comput. Appl., 2014
Proceedings of the 17th International Conference on Information Fusion, 2014
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014
2013
Proceedings of the Trustworthy Computing and Services, 2013
Proceedings of the IEEE International Conference on Information and Automation, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
KSII Trans. Internet Inf. Syst., 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
IEEE Signal Process. Lett., 2010
IEEE Commun. Lett., 2010
Achieving space and time diversity by using lattice constellation based joint Alamouti coding.
IEEE Commun. Lett., 2010
2009
Application and performance analysis of various AEAD techniques for space telecommand authentication.
IEEE Trans. Wirel. Commun., 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
Improved design of two and four-group decodable STBCs with larger diversity product for eight transmit antennas.
Proceedings of the IEEE International Conference on Acoustics, 2009
2008
A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation.
Proceedings of the International Symposium on Information Processing, 2008
2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005