Ping Chen
Orcid: 0000-0002-8517-0580Affiliations:
- Fudan University, Institute for Big Data, Shanghai, China
- Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA (former)
- Purdue University, Department of Computer Science, West Lafayette, USA (former)
- Nanjing University Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, China (PhD 2012)
According to our database1,
Ping Chen
authored at least 31 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023
2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
2021
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks.
IEEE Trans. Inf. Forensics Secur., 2021
2020
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.
J. Comput. Secur., 2020
2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Autom., 2019
2018
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks.
Cybersecur., 2018
2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
2015
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack.
CoRR, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
2012
Proceedings of the Information Security and Privacy Research, 2012
CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009