Jianshan Peng

According to our database1, Jianshan Peng authored at least 5 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
WindArms: More Efficient DGF Coverage-Guided Tracing.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

2021
Data flow sensitive driver vulnerability mining method.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2019
A Format Protection Method of Greybox Fuzzing.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Deity: Finding Deep Rooted Bugs in JavaScript Engines.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2016
Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering.
KSII Trans. Internet Inf. Syst., 2016


  Loading...