Chengyu Song
Orcid: 0000-0001-6617-3068
According to our database1,
Chengyu Song
authored at least 85 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Des. Test, 2024
CoRR, 2024
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Proceedings of the 33rd USENIX Security Symposium, 2024
K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
2023
Establishment and validation of an AI-aid method in the diagnosis of myocardial perfusion imaging.
BMC Medical Imaging, December, 2023
DCNAS-Net: deformation convolution and neural architecture search detection network for bone marrow oedema.
BMC Medical Imaging, December, 2023
Inf. Process. Manag., November, 2023
TaxonPrompt: Taxonomy-aware curriculum prompt learning for few-shot event classification.
Knowl. Based Syst., March, 2023
Self-supervised graph learning with target-adaptive masking for session-based recommendation.
Frontiers Inf. Technol. Electron. Eng., January, 2023
Inf. Process. Manag., 2023
Exploring Internal and External Interactions for Semi-Structured Multivariate Attributes in Job-Resume Matching.
Int. J. Intell. Syst., 2023
CoRR, 2023
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the IEEE/ACM International Workshop on Search-Based and Fuzz Testing, 2023
2022
Exploring latent connections in graph neural networks for session-based recommendation.
Inf. Retr. J., 2022
Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks.
CoRR, 2022
ADC: Adversarial attacks against object Detection that evade Context consistency checks.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022
LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
2019
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
2016
ACM Comput. Surv., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 25th Symposium on Operating Systems Principles, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
2011
PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007