Peidai Xie

According to our database1, Peidai Xie authored at least 20 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
End-to-End Multi-Tab Website Fingerprinting Attack: A Detection Perspective.
CoRR, 2022

2020
AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

DSmith: Compiler Fuzzing through Generative Deep Learning Model with Attention.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Tree2tree Structural Language Modeling for Compiler Fuzzing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering.
Sensors, 2019

2018
Having an Insight into Malware Phylogeny: Building Persistent Phylogeny Tree of Families.
IEICE Trans. Inf. Syst., 2018

A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks.
Proceedings of the 29th IEEE International Conference on Application-specific Systems, 2018

2017
Inferring Phylogenetic Network of Malware Families Based on Splits Graph.
IEICE Trans. Inf. Syst., 2017

2016
Absent extreme learning machine algorithm with application to packed executable identification.
Neural Comput. Appl., 2016

A Survey of Game Theoretic Methods for Cyber Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
Malware Similarity Analysis Based on Graph Similarity Flooding Algorithm.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing.
Wirel. Pers. Commun., 2014

Message Format Extraction of Cryptographic Protocol Based on Dynamic Binary Analysis.
J. Res. Pract. Inf. Technol., 2014

2013
Reverse extraction of protocol model from network applications.
Int. J. Internet Protoc. Technol., 2013

iPanda: A comprehensive malware analysis tool.
Proceedings of the International Conference on Information Networking 2013, 2013

A binary analysis method for protocol deviation discovery from implementations.
Proceedings of the International Conference on Information Networking 2013, 2013

Mining Network Behavior Specifications of Malware Based on Binary Analysis.
Proceedings of the Frontiers in Internet Technologies, 2013

2012
An Automatic Approach to Detect Anti-debugging in Malware Analysis.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012


  Loading...