Lei Zhao
Orcid: 0000-0003-2412-7279Affiliations:
- Wuhan University, School of Cyber Science and Engineering, China (PhD 2012)
According to our database1,
Lei Zhao
authored at least 32 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
APICAD: Augmenting API Misuse Detection through Specifications from Code and Documents.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
2022
<i>Ex</i><sup>2</sup>: Monte Carlo Tree Search-based test inputs prioritization for fuzzing deep neural networks.
Int. J. Intell. Syst., December, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Neurocomputing, 2021
CoRR, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
IEEE Trans. Mob. Comput., 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions.
IEEE Netw., 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018
2017
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017
2016
面向软件错误定位与理解的测试执行离散特征筛选 (Discrete Characteristic-based Test Execution Selection for Software Fault Localization and Understanding).
计算机科学, 2016
2015
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Int. J. Softw. Eng. Knowl. Eng., 2013
2012
Proceedings of the Information Security - 15th International Conference, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
PAFL: Fault Localization via Noise Reduction on Coverage Vector.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
2010
Proceedings of the Information Computing and Applications - First International Conference, 2010
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008