关注
Peng Jiang
Peng Jiang
在 seu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Are we there yet? an industrial viewpoint on provenance-based endpoint detection and response tools
F Dong, S Li, P Jiang, D Li, H Wang, L Huang, X Xiao, J Chen, X Luo, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
122023
Auditing frameworks need resource isolation: A systematic study on the super producer threat to system auditing and its mitigation
P Jiang, R Huang, D Li, Y Guo, X Chen, J Luan, Y Ren, X Hu
32nd USENIX Security Symposium (USENIX Security 23), 355-372, 2023
52023
Put your memory in order: Efficient domain-based memory isolation for wasm applications
H Lei, Z Zhang, S Zhang, P Jiang, Z Zhong, N He, D Li, Y Guo, X Chen
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
Dual-polarized spatial division multiple access transmission for 3D multiuser massive MIMO
F Cheng, P Jiang, S Jin, Q Huang
2015 International Conference on Wireless Communications & Signal Processing …, 2015
32015
Detecting malicious websites from the perspective of system provenance analysis
P Jiang, J Xiao, D Li, H Yu, Y Bai, Y Guo, X Chen
IEEE Transactions on Dependable and Secure Computing 21 (3), 1406-1423, 2023
22023
基于多模态表征的移动应用 GUI 模糊测试框架
张少坤, 李元春, 雷瀚文, 蒋鹏, 李锭, 郭耀, 陈向群
软件学报 35 (7), 0-0, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–6