Zhechao Lin

According to our database1, Zhechao Lin authored at least 12 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Group-based corpus scheduling for parallel fuzzing.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

2021
Intelligent Device Identification Method Based on Network Packet Fingerprint.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Multi-dimensional Intelligent Network Asset Identification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Machine Learning for Software Vulnerability Analysis: A Survey.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Automatic Smart Device Identification Based on Web Fingerprint and Neural Network.
Proceedings of the BDSIC 2021: 3rd International Conference on Big-data Service and Intelligent Computation, Xiamen, China, November 19, 2021

2020
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Hybrid Interface Recovery Method for Android Kernels Fuzzing.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

2019
Kernel Vulnerability Analysis: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

An Approach of Code Pointer Hiding Based on a Resilient Area.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2017
Machine Learning in Vulnerability Databases.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A Mining Approach to Obtain the Software Vulnerability Characteristics.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017


  Loading...