Are we there yet? an industrial viewpoint on provenance-based endpoint detection and response tools F Dong, S Li, P Jiang, D Li, H Wang, L Huang, X Xiao, J Chen, X Luo, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 12 | 2023 |
Auditing frameworks need resource isolation: A systematic study on the super producer threat to system auditing and its mitigation P Jiang, R Huang, D Li, Y Guo, X Chen, J Luan, Y Ren, X Hu 32nd USENIX Security Symposium (USENIX Security 23), 355-372, 2023 | 5 | 2023 |
Put your memory in order: Efficient domain-based memory isolation for wasm applications H Lei, Z Zhang, S Zhang, P Jiang, Z Zhong, N He, D Li, Y Guo, X Chen Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |
Dual-polarized spatial division multiple access transmission for 3D multiuser massive MIMO F Cheng, P Jiang, S Jin, Q Huang 2015 International Conference on Wireless Communications & Signal Processing …, 2015 | 3 | 2015 |
Detecting malicious websites from the perspective of system provenance analysis P Jiang, J Xiao, D Li, H Yu, Y Bai, Y Guo, X Chen IEEE Transactions on Dependable and Secure Computing 21 (3), 1406-1423, 2023 | 2 | 2023 |
基于多模态表征的移动应用 GUI 模糊测试框架 张少坤, 李元春, 雷瀚文, 蒋鹏, 李锭, 郭耀, 陈向群 软件学报 35 (7), 0-0, 2024 | | 2024 |