Songtao Yang

Orcid: 0000-0003-3771-9839

According to our database1, Songtao Yang authored at least 20 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective.
IEEE Trans. Dependable Secur. Comput., 2023

1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Exploit-oriented Automated Information Leakage.
Int. J. Softw. Informatics, 2022

PACSan: Enforcing Memory Safety Based on ARM PA.
CoRR, 2022

PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Region Queries with Strong Location Privacy in Mobile Network.
Mob. Inf. Syst., 2021

ROLoad: Securing Sensitive Operations with Pointee Integrity.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2020
A Methodology for Calculating Greenhouse Effect of Aircraft Cruise Using Genetic Algorithm-Optimized Wavelet Neural Network.
Complex., 2020

Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Markov Prediction-Based Privacy Protection Scheme for Continuous Query.
J. Circuits Syst. Comput., 2019

High-Accuracy DOA Estimation based on Vectorized Fourth-Order Cumulant with Coprime Array.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
A novel attributes anonymity scheme in continuous query.
Wirel. Pers. Commun., 2018

A Particle Swarm Optimization Clustering-Based Attribute Generalization Privacy Protection Scheme.
J. Circuits Syst. Comput., 2018

2017
Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme.
Wirel. Pers. Commun., 2017

Privacy Preserving in Cloud Environment for Obstructed Shortest Path Query.
Wirel. Pers. Commun., 2017

Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services.
J. Circuits Syst. Comput., 2017

An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection.
Proceedings of the 20th ACM International Conference on Modelling, 2017

2015
A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS.
Int. J. Distributed Sens. Networks, 2015

An Improved Fine-Grained Encryption Method for Unstructured Big Data.
Proceedings of the Intelligent Computation in Big Data Era, 2015

2014
A Location Privacy Preserving Method Based on Sensitive Diversity for LBS.
Proceedings of the Network and Parallel Computing, 2014


  Loading...