Follow
Dinghao Wu
Title
Cited by
Cited by
Year
KISS: keep it simple and sequential
S Qadeer, D Wu
ACM SIGPLAN Notices 39 (6), 14-24, 2004
2902004
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
2852014
Classifying text messages for the haiti earthquake.
C Caragea, NJ McNeese, AR Jaiswal, G Traylor, HW Kim, P Mitra, D Wu, ...
ISCRAM, 2011
2532011
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 7th ACM Conference on Security and Privacy in Wireless …, 2014
2512014
LibD: scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
2032017
Reassembleable Disassembling.
S Wang, P Wang, D Wu
USENIX Security Symposium, 627-642, 2015
1792015
Cached: Identifying cache-based timing channels in production software
S Wang, P Wang, X Liu, D Zhang, D Wu
Proceedings of the 26th USENIX Security Symposium, 2017
1532017
Get online support, feel better--sentiment analysis and dynamics in an online cancer survivor community
B Qiu, K Zhao, P Mitra, D Wu, C Caragea, J Yen, GE Greer, K Portier
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
1472011
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
J Ming, D Xu, Y Jiang, D Wu
26th USENIX Security Symposium (USENIX Security 17), 253-270, 2017
1442017
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
1412017
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su
NDSS, 2020
1382020
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
1242011
Local augmentation for graph neural networks
S Liu, R Ying, H Dong, L Li, T Xu, Y Rong, P Zhao, J Huang, D Wu
International Conference on Machine Learning, 14054-14072, 2022
1222022
Deepfuzz: Automatic generation of syntax valid c programs for fuzz testing
X Liu, X Li, R Prajapati, D Wu
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 1044-1051, 2019
1192019
A framework for evaluating mobile app repackaging detection algorithms
H Huang, S Zhu, P Liu, D Wu
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
1192013
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
J Ming, D Xu, L Wang, D Wu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1112015
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
D Xu, J Ming, D Wu
2017 IEEE Symposium on Security and Privacy (SP), 921-937, 2017
1052017
TaintPipe: Pipelined Symbolic Taint Analysis.
J Ming, D Wu, G Xiao, J Wang, P Liu
USENIX Security Symposium, 65-80, 2015
1052015
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
R Zhong, Y Chen, H Hu, H Zhang, W Lee, D Wu
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1042020
Adaptive unpacking of Android apps
L Xue, X Luo, L Yu, S Wang, D Wu
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
972017
The system can't perform the operation now. Try again later.
Articles 1–20