Order matters: Semantic-aware neural networks for binary code similarity detection Z Yu, R Cao, Q Tang, S Nie, J Huang, S Wu Proceedings of the AAAI conference on artificial intelligence 34 (01), 1145-1152, 2020 | 202 | 2020 |
Codecmr: Cross-modal retrieval for function-level binary source code matching Z Yu, W Zheng, J Wang, Q Tang, S Nie, S Wu Advances in Neural Information Processing Systems 33, 3872-3883, 2020 | 72 | 2020 |
Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models S Mehnaz, SV Dibbo, R De Viti, E Kabir, BB Brandenburg, S Mangard, ... 31st USENIX Security Symposium (USENIX Security 22), 4579-4596, 2022 | 47 | 2022 |
Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations P Jing, Q Tang, Y Du, L Xue, X Luo, T Wang, S Nie, S Wu 30th USENIX Security Symposium (USENIX Security 21), 3237-3254, 2021 | 45 | 2021 |
Rolling colors: Adversarial laser exploits against traffic light recognition C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ... 31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022 | 31 | 2022 |
Unleashing the power of compiler intermediate representation to enhance neural program embeddings Z Li, P Ma, H Wang, S Wang, Q Tang, S Nie, S Wu Proceedings of the 44th International Conference on Software Engineering …, 2022 | 24 | 2022 |
Evaluating and improving neural program-smoothing-based fuzzing M Wu, L Jiang, J Xiang, Y Zhang, G Yang, H Ma, S Nie, S Wu, H Cui, ... Proceedings of the 44th International Conference on Software Engineering …, 2022 | 23 | 2022 |
Towards automatically reverse engineering vehicle diagnostic protocols L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ... 31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022 | 13 | 2022 |
Enhancing dnn-based binary code function search with low-cost equivalence checking H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu IEEE Transactions on Software Engineering 49 (1), 226-250, 2022 | 12 | 2022 |
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang, S Nie, S Wu, T Liu ACM Transactions on Software Engineering and Methodology 32 (4), 1-26, 2023 | 8 | 2023 |
Refining decompiled c code with large language models WK Wong, H Wang, Z Li, Z Liu, S Wang, Q Tang, S Nie, S Wu arXiv preprint arXiv:2310.06530, 2023 | 7 | 2023 |
Third-party library dependency for large-scale SCA in the C/C++ ecosystem: How far are we? L Jiang, H Yuan, Q Tang, S Nie, S Wu, Y Zhang Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 6 | 2023 |
sem2vec: Semantics-aware Assembly Tracelet Embedding H Wang, P Ma, S Wang, Q Tang, S Nie, S Wu ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023 | 4 | 2023 |
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective P Jing, Z Cai, Y Cao, L Yu, Y Du, W Zhang, C Qian, X Luo, S Nie, S Wu 2024 IEEE Symposium on Security and Privacy (SP), 80-80, 2023 | 3 | 2023 |
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching L Jiang, J An, H Huang, Q Tang, S Nie, S Wu, Y Zhang Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 2 | 2024 |
Comparing One with Many--Solving Binary2source Function Matching Under Function Inlining A Jia, M Fan, X Xu, W Jin, H Wang, Q Tang, S Nie, S Wu, T Liu arXiv preprint arXiv:2210.15159, 2022 | 2 | 2022 |
Tbdetector: Transformer-based detector for advanced persistent threats with provenance graph N Wang, X Wen, D Zhang, X Zhao, J Ma, M Luo, S Nie, S Wu, J Liu arXiv preprint arXiv:2304.02838, 2023 | 1 | 2023 |
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs WK Wong, H Wang, P Ma, S Wang, M Jiang, TY Chen, Q Tang, S Nie, ... 2022 IEEE International Conference on Software Maintenance and Evolution …, 2022 | 1 | 2022 |