Jianwei Zhuge

According to our database1, Jianwei Zhuge authored at least 28 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
Code classification with graph neural networks: Have you ever struggled to make it work?
Expert Syst. Appl., December, 2023

Not The End of Story: An Evaluation of ChatGPT-Driven Vulnerability Description Mappings.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
jTrans: Jump-Aware Transformer for Binary Code Similarity.
CoRR, 2022

jTrans: jump-aware transformer for binary code similarity detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet.
Proceedings of the Information Systems Security and Privacy, 2022

Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs.
Proceedings of the ESEM '22: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, Helsinki, Finland, September 19, 2022

2021
From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
A Market in Dream: the Rapid Development of Anonymous Cybercrime.
Mob. Networks Appl., 2020

A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices.
Future Internet, 2020

FANS: Fuzzing Android Native System Services via Automated Interface Analysis.
Proceedings of the 29th USENIX Security Symposium, 2020

Adapting to Local Conditions: Similarities and Differences in Anonymous Online Market Between Chinese and English Speaking Communities.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

2019
ARG: Automatic ROP Chains Generation.
IEEE Access, 2019

Fuzzing IPC with Knowledge Inference.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

2018
ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software.
Proceedings of the Information Security - 21st International Conference, 2018

A Survey of Industrial Control System Devices on the Internet.
Proceedings of the International Conference on Internet of Things, 2018

2016
A Tool for Volatile Memory Acquisition from Android Devices.
Proceedings of the Advances in Digital Forensics XII, 2016

2014
SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine.
Proceedings of the Information Security Practice and Experience, 2014

IntentFuzzer: detecting capability leaks of android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
De-obfuscation and Detection of Malicious PDF Files with High Accuracy.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2011
WebPatrol: automated collection and replay of web-based malware scenarios.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Preventing drive-by download via inter-module communication monitoring.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

2007
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2003
Security mechanisms for wireless home network.
Proceedings of the Global Telecommunications Conference, 2003


  Loading...