Dongliang Mu

Orcid: 0000-0001-8042-8928

According to our database1, Dongliang Mu authored at least 20 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Online active learning method for multi-class imbalanced data stream.
Knowl. Inf. Syst., April, 2024

Characterizing and Detecting WebAssembly Runtime Bugs.
ACM Trans. Softw. Eng. Methodol., February, 2024

Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs.
IEEE Trans. Dependable Secur. Comput., 2024

2023
A survey of multi-class imbalanced data classification methods.
J. Intell. Fuzzy Syst., 2023

Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
An overview of high utility itemsets mining methods based on intelligent optimization algorithms.
Knowl. Inf. Syst., 2022

GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis.
IEEE Trans. Software Eng., 2021

RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2019
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Building Adversarial Defense with Non-invertible Data Transformations.
Proceedings of the PRICAI 2019: Trends in Artificial Intelligence, 2019

RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

LEMNA: Explaining Deep Learning based Security Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

DiffGuard: Obscuring Sensitive Information in Canary Based Protections.
Proceedings of the Security and Privacy in Communication Networks, 2017

ROPOB: Obfuscating Binary Code via Return Oriented Programming.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...