Long Lu

Orcid: 0000-0003-4120-2381

According to our database1, Long Lu authored at least 78 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A hierarchical attention-based multimodal fusion framework for predicting the progression of Alzheimer's disease.
Biomed. Signal Process. Control., February, 2024

On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers.
IEEE Trans. Dependable Secur. Comput., 2024

AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis.
IEEE Trans. Dependable Secur. Comput., 2024

SHiFT: Semi-hosted Fuzz Testing for Embedded Applications.
Proceedings of the 33rd USENIX Security Symposium, 2024

CO3: Concolic Co-execution for Firmware.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
A novel prediction method for vulnerability outbreak trend.
Comput. Electr. Eng., May, 2023

A multicenter study on two-stage transfer learning model for duct-dependent CHDs screening in fetal echocardiography.
npj Digit. Medicine, 2023

A Deep Learning-Based Brain Age Prediction Model for Preterm Infants via Neonatal MRI.
IEEE Access, 2023

A Study of Multi-Factor and Risk-Based Authentication Availability.
Proceedings of the 32nd USENIX Security Symposium, 2023

ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Guided Feature Identification and Removal for Resource-constrained Firmware.
ACM Trans. Softw. Eng. Methodol., 2022

Integrating genomic and resting State fMRI for efficient autism spectrum disorder classification.
Multim. Tools Appl., 2022

A novel self-learning semi-supervised deep learning network to detect fake news on social media.
Multim. Tools Appl., 2022

Cutting-Splicing data augmentation: A novel technology for medical image segmentation.
CoRR, 2022

Environmental efficiency assessment of China's integrated power system under the assumption of semi-disposability.
Comput. Ind. Eng., 2022

JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

Breaking Embedded Software Homogeneity with Protocol Mutations.
Proceedings of the Security and Privacy in Communication Networks, 2022

D-Box: DMA-enabled Compartmentalization for Embedded Applications.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Splicing learning: A novel few-shot learning approach.
Inf. Sci., 2021

Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
Proceedings of the 30th USENIX Security Symposium, 2021

PTAuth: Temporal Memory Safety via Robust Points-to Authentication.
Proceedings of the 30th USENIX Security Symposium, 2021

Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code.
Proceedings of the 30th USENIX Security Symposium, 2021

DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Browserprint: an Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy.
Proceedings of the Information Security - 24th International Conference, 2021

SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Consumer health information needs in China - a case study of depression based on a Social Q&A community.
BMC Medical Informatics Decis. Mak., 2020

Research and development of autism diagnosis information system based on deep convolution neural network and facial expression data.
Libr. Hi Tech, 2020

Comprehensive analysis of potential prognostic biomarker in gliomas.
Libr. Hi Tech, 2020

Big data approaches to develop a comprehensive and accurate tool aimed at improving autism spectrum disorder diagnosis and subtype stratification.
Libr. Hi Tech, 2020

ShadowNet: A Secure and Efficient System for On-device Model Inference.
CoRR, 2020

DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.
CoRR, 2020

Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
CoRR, 2020

P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling.
Proceedings of the 29th USENIX Security Symposium, 2020

OAT: Attesting Operation Integrity of Embedded Devices.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

SAVIOR: Towards Bug-Driven Hybrid Testing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Introduction to the Minitrack on Data-Driven Smart Health in Asia Pacific.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Design Of ASD Subtyping Approach based on Multi-Omics Data to Promote Personalized Healthcare.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

FEAST'20: Fifth Workshop on Forming an Ecosystem Around Software Transformation.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
P<sup>2</sup>IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version).
CoRR, 2019

TEEv: virtualizing trusted execution environments on mobile platforms.
Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2019

StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

An Analysis of Malware Trends in Enterprise Networks.
Proceedings of the Information Security - 22nd International Conference, 2019

Research on Three-Dimensional Reconstruction of Brain Image Features Based on Augmented Reality Technology.
Proceedings of the Smart Health - International Conference, 2019

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Big Data in Health Care: Applications and Challenges.
Data Inf. Manag., 2018

StreamBox-TZ: A Secure IoT Analytics Engine at the Edge.
CoRR, 2018

OEI: Operation Execution Integrity for Embedded Devices.
CoRR, 2018

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Proceedings of the 27th USENIX Security Symposium, 2018

Compiler-Assisted Code Randomization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

VButton: Practical Attestation of User-driven Operations in Mobile Apps.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

Augmented Reality: New Technologies for Building Visualized Hospital Knowledge Management Systems.
Proceedings of the Smart Health - International Conference, 2018

2017
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Shreds: Fine-Grained Execution Units with Private Memory.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Remix: On-demand Live Randomization.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Preventing Use-after-free with Dangling Pointers Nullification.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
From Zygote to Morula: Fortifying Weakened ASLR on Android.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Jekyll on iOS: When Benign Apps Become Evil.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Robust scareware image detection.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
CHEX: statically vetting Android apps for component hijacking vulnerabilities.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
SURF: detecting and measuring search poisoning.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
On the Combination of Cooperative Diversity and Multiuser Diversity in Multi-Source Multi-Relay Wireless Networks.
IEEE Signal Process. Lett., 2010

BLADE: an attack-agnostic approach for preventing drive-by malware infections.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Cooperative communications with relay selection in wireless sensor networks.
IEEE Trans. Consumer Electron., 2009

BLADE: Slashing the Invisible Channel of Drive-by Download Malware.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Mapping kernel objects to enable systematic integrity checking.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009


  Loading...