Search

Your search keyword '"Chaojing Tang"' showing total 258 results

Search Constraints

Start Over You searched for: Author "Chaojing Tang" Remove constraint Author: "Chaojing Tang"
258 results on '"Chaojing Tang"'

Search Results

1. Identifying exploitable memory objects for out‐of‐bound write vulnerabilities

2. Low‐complexity sphere decoding for MIMO‐SCMA systems

3. DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective

4. Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game

5. Program State Sensitive Parallel Fuzzing for Real World Software

6. NeuralTaint: A Key Segment Marking Tool Based on Neural Network

7. Grant-Free Rateless SCMA for Cellular Internet of Things Networks

8. A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks

9. Marking Key Segment of Program Input via Attention Mechanism

10. Locating Vulnerability in Binaries Using Deep Neural Networks

11. Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin

12. Design and Optimization of Joint Iterative Detection and Decoding Receiver for Uplink Polar Coded SCMA System

13. Ffuzz: Towards full system high coverage fuzz testing on binary executables.

14. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

15. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

Catalog

Books, media, physical & digital resources