Lei Zhao

Orcid: 0000-0003-2412-7279

Affiliations:
  • Wuhan University, School of Cyber Science and Engineering, China (PhD 2012)


According to our database1, Lei Zhao authored at least 32 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Tightly-Coupled Hybrid Fuzzing via Excavating Input Specifications.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Capturing Invalid Input Manipulations for Memory Corruption Diagnosis.
IEEE Trans. Dependable Secur. Comput., 2023

Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

APICAD: Augmenting API Misuse Detection through Specifications from Code and Documents.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
<i>Ex</i><sup>2</sup>: Monte Carlo Tree Search-based test inputs prioritization for fuzzing deep neural networks.
Int. J. Intell. Syst., December, 2022

Probabilistic Path Prioritization for Hybrid Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2022

DANCe: Dynamic Adaptive Neuron Coverage for Fuzzing Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

Efficient DNN Backdoor Detection Guided by Static Weight Analysis.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
RapidFuzz: Accelerating fuzzing via Generative Adversarial Networks.
Neurocomputing, 2021

AlphaFuzz: Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search.
CoRR, 2021

Exposing DeepFakes via Localizing the Manipulated Artifacts.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
SmartPI: Understanding Permission Implications of Android Apps from User Reviews.
IEEE Trans. Mob. Comput., 2020

PatchScope: Memory Object Centric Patch Diffing.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Attack Provenance Tracing in Cyberspace: Solutions, Challenges and Future Directions.
IEEE Netw., 2019

Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Capturing the Persistence of Facial Expression Features for Deepfake Video Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Defending against ROP Attacks with Nearly Zero Overhead.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018

2017
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017

2016
面向软件错误定位与理解的测试执行离散特征筛选 (Discrete Characteristic-based Test Execution Selection for Software Fault Localization and Understanding).
计算机科学, 2016

2015
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Regression Identification of Coincidental Correctness via Weighted Clustering.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
A Fault Localization Framework to Alleviate the Impact of Execution Similarity.
Int. J. Softw. Eng. Knowl. Eng., 2013

2012
Learning Fine-Grained Structured Input for Memory Corruption Detection.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Context-Aware Fault Localization via Control Flow Analysis.
J. Softw., 2011

Statistical Fault Localization via Semi-dynamic Program Slicing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

PAFL: Fault Localization via Noise Reduction on Coverage Vector.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

2010
Execution-Aware Fault Localization Based on the Control Flow Analysis.
Proceedings of the Information Computing and Applications - First International Conference, 2010

2008
A Secure Network Admission and Routing Model Based on Trust Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Study on the Internet Behavior's Activity Oriented to Network Survivability.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...