Tao Wei

Orcid: 0009-0000-4027-0310

Affiliations:
  • Ant Group, Hangzhou, China
  • Baidu Inc., Beijing, China
  • Peking University, Beijing, China
  • University of California, Berkeley, CA, USA


According to our database1, Tao Wei authored at least 78 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software.
CoRR, July, 2025

Losing is for Cherishing: Data Valuation Based on Machine Unlearning and Shapley Value.
CoRR, May, 2025

PRIV-QA: Privacy-Preserving Question Answering for Cloud Large Language Models.
CoRR, February, 2025

On the Interoperability of Encrypted Databases.
IEEE Trans. Dependable Secur. Comput., 2025

SoK: FHE-Friendly Symmetric Ciphers and Transciphering.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations.
IACR Cryptol. ePrint Arch., 2025

XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering.
IACR Cryptol. ePrint Arch., 2025

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting.
IACR Cryptol. ePrint Arch., 2024

Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits.
IACR Cryptol. ePrint Arch., 2024

SoK: A Comparison Study of Arm TrustZone and CCA.
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024

UnsafeCop: Towards Memory Safety for Real-World Unsafe Rust Code with Practical Bounded Model Checking.
Proceedings of the Formal Methods - 26th International Symposium, 2024

ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

<i>Coral: </i> Maliciously Secure Computation Framework for Packed and Mixed Circuits.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Black-Box Dataset Ownership Verification via Backdoor Watermarking.
IEEE Trans. Inf. Forensics Secur., 2023

CVTEE: A Compatible Verified TEE Architecture With Enhanced Security.
IEEE Trans. Dependable Secur. Comput., 2023

BumbleBee: Secure Two-party Inference Framework for Large Transformers.
IACR Cryptol. ePrint Arch., 2023

Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger.
CoRR, 2023

PUMA: Secure Inference of LLaMA-7B in Five Minutes.
CoRR, 2023

Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Privacy Leakage of Real-World Vertical Federated Learning.
CoRR, 2020

SAVIOR: Towards Bug-Driven Hybrid Testing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking.
Proceedings of the 8th International Conference on Learning Representations, 2020

COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw. Pract. Exp., 2019

Phishing page detection via learning classifiers from page layout feature.
EURASIP J. Wirel. Commun. Netw., 2019

Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield.
CoRR, 2019

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.
CoRR, 2019

Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction.
CoRR, 2019

Towards Memory Safe Enclave Programming with Rust-SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018

FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2017
Downgrade Attack on TrustZone.
CoRR, 2017

Accurate and efficient exploit capture and classification.
Sci. China Inf. Sci., 2017

Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017

Phishing Website Detection Based on Effective CSS Features of Web Pages.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Adaptive Android Kernel Live Patching.
Proceedings of the 26th USENIX Security Symposium, 2017

Detecting Phishing Websites via Aggregation Analysis of Page Layouts.
Proceedings of the 2017 International Conference on Identification, 2017

POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Improving lookup reliability in Kad.
Peer-to-Peer Netw. Appl., 2015

SF-DRDoS: The store-and-flood distributed reflective denial of service attack.
Comput. Commun., 2015

Towards Discovering and Understanding Task Hijacking in Android.
Proceedings of the 24th USENIX Security Symposium, 2015

Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Eternal War in Memory.
IEEE Secur. Priv., 2014

Drawbridge: software-defined DDoS-resistant traffic engineering.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

A Website Credibility Assessment Scheme Based on Page Association.
Proceedings of the Information Security Practice and Experience, 2014

The store-and-flood distributed reflective denial of service attack.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Splider: A split-based crawler of the BT-DHT network and its applications.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SoK: Eternal War in Memory.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Rating Web Pages Using Page-Transition Evidence.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Protecting function pointers in binary.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
How many eyes are spying on your shared folders?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

A Framework to Eliminate Backdoors from Response-Computable Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Revisiting why Kad lookup fails.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
J. Comput. Secur., 2011

2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010

Secure dynamic code generation against spraying.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009

2007
A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Linkability of a Blind Signature Scheme and Its Improved Scheme.
Proceedings of the Computational Science and Its Applications, 2006


  Loading...