Qingkai Zeng

According to our database1, Qingkai Zeng authored at least 53 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
The count-min sketch is vulnerable to offline password-guessing attacks.
Int. J. Inf. Comput. Secur., 2022

Automatic Controllable Product Copywriting for E-Commerce.
CoRR, 2022

CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2021
Modeling Complementarity in Behavior Data with Multi-Type Itemset Embedding.
ACM Trans. Intell. Syst. Technol., 2021

Biomedical Knowledge Graphs Construction From Conditional Statements.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures.
Secur. Commun. Networks, 2021

Validating Label Consistency in NER Data Annotation.
CoRR, 2021

SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Enhancing Factual Consistency of Abstractive Summarization.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Technical Question Answering across Tasks and Domains.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies: Industry Papers, 2021

Enhancing Taxonomy Completion with Concept Generation via Fusing Relational Representations.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT Models.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Boosting Factual Correctness of Abstractive Summarization with Knowledge Graph.
CoRR, 2020

Experimental Evidence Extraction System in Data Science with Hybrid Table Features and Ensemble Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Towards Semantically Guided Traceability.
Proceedings of the 28th IEEE International Requirements Engineering Conference, 2020

Tri-Train: Automatic Pre-Fine Tuning between Pre-Training and Fine-Tuning for SciNER.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

A Technical Question Answering System with Transfer Learning.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, 2020

Crossing Variational Autoencoders for Answer Retrieval.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
CSPS: catchy short passwords making offline and online attacks impossible.
Int. J. Inf. Comput. Secur., 2019

Tablepedia: Automating PDF Table Reading in an Experimental Evidence Exploration and Analytic System.
Proceedings of the World Wide Web Conference, 2019

Faceted Hierarchy: A New Graph Type to Organize Scientific Concepts and a Construction Method.
Proceedings of the Thirteenth Workshop on Graph-Based Methods for Natural Language Processing, 2019

Through the eyes of a poet: classical poetry recommendation with visual input on social media.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Improved Construction for Inner Product Functional Encryption.
Secur. Commun. Networks, 2018

Eye feature point detection based on single convolutional neural network.
IET Comput. Vis., 2018

Simulation-based security of function-hiding inner product encryption.
Sci. China Inf. Sci., 2018

Multi-Type Itemset Embedding for Learning Behavior Success.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

2017
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

NodeLeaper: Lower Overhead Oblivious AVL Tree.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Efficient Inner Product Encryption with Simulation-Based Security.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware.
IET Inf. Secur., 2016

SeededFuzz: Selecting and Generating Seeds for Directed Fuzzing.
Proceedings of the 10th International Symposium on Theoretical Aspects of Software Engineering, 2016

IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2015

Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Evaluating Initial Inputs for Concolic Testing.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Hardware-Assisted Fine-Grained Code-Reuse Attack Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Crashmaker: an improved binary concolic testing tool for vulnerability detection.
Proceedings of the Symposium on Applied Computing, 2014

Using Machine Language Model for Mimimorphic Malware Detection.
Proceedings of the Information Security - 17th International Conference, 2014

Theory and Substantiation of z0g1 Controller Conquering Singularity Problem of Output Tracking for a Class of Nonlinear System.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2012
A Security Assurance Framework Combining Formal Verification and Security Functional Testing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

2010
Some Improvements for More Precise Model Checking.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Towards a Structured Model for Software Vulnerabilities.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

2009
A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols.
Proceedings of the Third International Conference on Network and System Security, 2009

2006
Efficient and Practical Control Flow Monitoring for Program Security.
Proceedings of the Advances in Computer Science, 2006

2004
An Adaptive Routing Strategy Based on Dynamic Cache in Mobile Ad Hoc Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2004


  Loading...