Mingyi Zhao

According to our database1, Mingyi Zhao authored at least 16 papers between 2012 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Analysis of <i>CFTR</i> gene expression as an immunological and prognostic biomarker in pan-cancers.
Comput. Biol. Medicine, 2022

Deep learning in retrosynthesis planning: datasets, models and tools.
Briefings Bioinform., 2022

2019
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

2018
The Rules of Engagement for Bug Bounty Programs.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs.
J. Cybersecur., 2017

2016
Empirical Analysis and Modeling of Black-Box Mutational Fuzzing.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation.
IEEE Trans. Knowl. Data Eng., 2015

HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

Towards Collaborative Query Planning in Multi-party Database Networks.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

An Empirical Study of Web Vulnerability Discovery Ecosystems.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

Comparing Different Moving Target Defense Techniques.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2012
Modeling and Checking the Security of DIFC System Configurations.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Federating geovisual analytic tools for cyber security analysis.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012


  Loading...