Yong Tang

Affiliations:
  • National University of Defense Technology, School of Computer, Changsha, China


According to our database1, Yong Tang authored at least 21 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Applying Binary Code Similarity Detection on Acceleration Processor.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

2022
NAFuzzer: Augmenting Network Protocol Fuzzers via Automatic Template and Seed Generation.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
HashMTI: Scalable Mutation-based Taint Inference with Hash Records.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

XHunter: Understanding XXE Vulnerability via Automatic Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2021

2020
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains.
Symmetry, 2019

Toward efficient and accurate function-call graph matching of binary codes.
Concurr. Comput. Pract. Exp., 2019

LearnAFL: Greybox Fuzzing With Knowledge Enhancement.
IEEE Access, 2019

Poster: Fuzzing IoT Firmware via Multi-stage Message Generation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A survey of malware behavior description and analysis.
Frontiers Inf. Technol. Electron. Eng., 2018

VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Automated Vulnerability Detection in Embedded Devices.
Proceedings of the Advances in Digital Forensics XIV, 2018

Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

2017
Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Vulnerability Detection in IoT Firmware: A Survey.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A New Malware Classification Approach Based on Malware Dynamic Analysis.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Security of Web of Things: A Survey.
Proceedings of the Advances in Information and Computer Security, 2016

Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Malware Clustering Based on SNN Density Using System Calls.
Proceedings of the Cloud Computing and Security - First International Conference, 2015


  Loading...