关注
shi wu
shi wu
engineer of tencent
在 tencent.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Order matters: Semantic-aware neural networks for binary code similarity detection
Z Yu, R Cao, Q Tang, S Nie, J Huang, S Wu
Proceedings of the AAAI conference on artificial intelligence 34 (01), 1145-1152, 2020
2022020
Codecmr: Cross-modal retrieval for function-level binary source code matching
Z Yu, W Zheng, J Wang, Q Tang, S Nie, S Wu
Advances in Neural Information Processing Systems 33, 3872-3883, 2020
722020
Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models
S Mehnaz, SV Dibbo, R De Viti, E Kabir, BB Brandenburg, S Mangard, ...
31st USENIX Security Symposium (USENIX Security 22), 4579-4596, 2022
472022
Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations
P Jing, Q Tang, Y Du, L Xue, X Luo, T Wang, S Nie, S Wu
30th USENIX Security Symposium (USENIX Security 21), 3237-3254, 2021
452021
Rolling colors: Adversarial laser exploits against traffic light recognition
C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ...
31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022
312022
Unleashing the power of compiler intermediate representation to enhance neural program embeddings
Z Li, P Ma, H Wang, S Wang, Q Tang, S Nie, S Wu
Proceedings of the 44th International Conference on Software Engineering …, 2022
242022
Evaluating and improving neural program-smoothing-based fuzzing
M Wu, L Jiang, J Xiang, Y Zhang, G Yang, H Ma, S Nie, S Wu, H Cui, ...
Proceedings of the 44th International Conference on Software Engineering …, 2022
232022
Towards automatically reverse engineering vehicle diagnostic protocols
L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ...
31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022
132022
Enhancing dnn-based binary code function search with low-cost equivalence checking
H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu
IEEE Transactions on Software Engineering 49 (1), 226-250, 2022
122022
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis
A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang, S Nie, S Wu, T Liu
ACM Transactions on Software Engineering and Methodology 32 (4), 1-26, 2023
82023
Refining decompiled c code with large language models
WK Wong, H Wang, Z Li, Z Liu, S Wang, Q Tang, S Nie, S Wu
arXiv preprint arXiv:2310.06530, 2023
72023
Third-party library dependency for large-scale SCA in the C/C++ ecosystem: How far are we?
L Jiang, H Yuan, Q Tang, S Nie, S Wu, Y Zhang
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
62023
sem2vec: Semantics-aware Assembly Tracelet Embedding
H Wang, P Ma, S Wang, Q Tang, S Nie, S Wu
ACM Transactions on Software Engineering and Methodology 32 (4), 1-34, 2023
42023
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective
P Jing, Z Cai, Y Cao, L Yu, Y Du, W Zhang, C Qian, X Luo, S Nie, S Wu
2024 IEEE Symposium on Security and Privacy (SP), 80-80, 2023
32023
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching
L Jiang, J An, H Huang, Q Tang, S Nie, S Wu, Y Zhang
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
22024
Comparing One with Many--Solving Binary2source Function Matching Under Function Inlining
A Jia, M Fan, X Xu, W Jin, H Wang, Q Tang, S Nie, S Wu, T Liu
arXiv preprint arXiv:2210.15159, 2022
22022
Tbdetector: Transformer-based detector for advanced persistent threats with provenance graph
N Wang, X Wen, D Zhang, X Zhao, J Ma, M Luo, S Nie, S Wu, J Liu
arXiv preprint arXiv:2304.02838, 2023
12023
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs
WK Wong, H Wang, P Ma, S Wang, M Jiang, TY Chen, Q Tang, S Nie, ...
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–18