Tao Wei

According to our database1, Tao Wei authored at least 66 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw., Pract. Exper., 2019

A Complexity Reduction Scheme for Depth Coding in 3D-HEVC.
Information, 2019

Logistic regression for imbalanced learning based on clustering.
IJCSE, 2019

Phishing page detection via learning classifiers from page layout feature.
EURASIP J. Wireless Comm. and Networking, 2019

2018
Modeling Relationship between Truck Fuel Consumption and Driving Behavior Using Data from Internet of Vehicles.
Comp.-Aided Civil and Infrastruct. Engineering, 2018

Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018

FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2017
Incorporating Intelligence in Fog Computing for Big Data Analysis in Smart Cities.
IEEE Trans. Industrial Informatics, 2017

A Cost-Effective Geodetic Strainmeter Based on Dual Coaxial Cable Bragg Gratings.
Sensors, 2017

Fast depth map mode decision based on depth-texture correlation and edge classification for 3D-HEVC.
J. Visual Communication and Image Representation, 2017

Accurate and efficient exploit capture and classification.
SCIENCE CHINA Information Sciences, 2017

Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017

Phishing Website Detection Based on Effective CSS Features of Web Pages.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Adaptive Android Kernel Live Patching.
Proceedings of the 26th USENIX Security Symposium, 2017

Detecting Phishing Websites via Aggregation Analysis of Page Layouts.
Proceedings of the 2017 International Conference on Identification, 2017

POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
An integral equation approach to the unsteady convection-diffusion equations.
Applied Mathematics and Computation, 2016

Network Morphism.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Barycentric coordinates based soft assignment for object classification.
Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops, 2016

TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Improving lookup reliability in Kad.
Peer-to-Peer Networking and Applications, 2015

A framework for stochastic simulations and visualization of biological electron-transfer dynamics.
Computer Physics Communications, 2015

SF-DRDoS: The store-and-flood distributed reflective denial of service attack.
Computer Communications, 2015

Towards Discovering and Understanding Task Hijacking in Android.
Proceedings of the 24th USENIX Security Symposium, 2015

Reflex-Tree: A Biologically Inspired Parallel Architecture for Future Smart Cities.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Proceedings of the 10th ACM Symposium on Information, 2015

Experimental study of skeleton tracking abilities from microsoft kinect non-frontal views.
Proceedings of the 2015 3DTV-Conference: The True Vision, 2015

2014
Eternal War in Memory.
IEEE Security & Privacy, 2014

Drawbridge: software-defined DDoS-resistant traffic engineering.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

A Website Credibility Assessment Scheme Based on Page Association.
Proceedings of the Information Security Practice and Experience, 2014

The store-and-flood distributed reflective denial of service attack.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Splider: A split-based crawler of the BT-DHT network and its applications.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

SoK: Eternal War in Memory.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Rating Web Pages Using Page-Transition Evidence.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Protecting function pointers in binary.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Network Expansion and Pathway Enrichment Analysis towards Biologically Significant Findings from Microarrays.
J. Integrative Bioinformatics, 2012

How many eyes are spying on your shared folders?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

A Framework to Eliminate Backdoors from Response-Computable Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Revisiting why Kad lookup fails.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
Journal of Computer Security, 2011

Computational study of energetic nitrogen-rich derivatives of 1, 1′- and 5, 5′-bridged ditetrazoles.
Journal of Computational Chemistry, 2011

2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010

Extensity of C3S EBSD Database and Its Structure Calculation.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Secure dynamic code generation against spraying.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Adaptive Sensor Fault Detection and Identification Using Particle Filter Algorithms.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2009

A hybrid multi-loop genetic-algorithm/simplex/spatial-grid method for locating the optimum orientation of an adsorbed protein on a solid surface.
Computer Physics Communications, 2009

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009

2008
Forecast the Biological Activity of Nitrobenzene Compound Based on BP Neural Network.
Proceedings of the PACIIA 2008, 2008

Moving Targets Detection and Analysis on Multi-Look Polarimetric SAR Images using PWF Method.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

2007
A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Particle Filtering for Adaptive Sensor Fault Detection and Identification.
Proceedings of the 2006 IEEE International Conference on Robotics and Automation, 2006

Linkability of a Blind Signature Scheme and Its Improved Scheme.
Proceedings of the Computational Science and Its Applications, 2006

2005
Symbol detection with time-varying unknown phase by expectation propagation.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Sensor validation for flight control by particle filtering.
Proceedings of the 13th European Signal Processing Conference, 2005

Audio Navigation Patterns.
Proceedings of the EuroPLoP' 2005, 2005

2002
Development of an airborne multi-angle TIR/VNIR imaging system.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002

2001
Development of a Sheet-Based Material Handling System for Layered Manufacturing.
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001

1996
Efficient Multifrequency Analysis of Fault Diagnosis in Analog Circuits Based on Large Change Sensitivity Computation.
Proceedings of the 5th Asian Test Symposium (ATS '96), 1996


  Loading...