According to our database1, Tao Wei authored at least 66 papers between 1996 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw., Pract. Exper., 2019
A Complexity Reduction Scheme for Depth Coding in 3D-HEVC.
Logistic regression for imbalanced learning based on clustering.
Phishing page detection via learning classifiers from page layout feature.
EURASIP J. Wireless Comm. and Networking, 2019
Modeling Relationship between Truck Fuel Consumption and Driving Behavior Using Data from Internet of Vehicles.
Comp.-Aided Civil and Infrastruct. Engineering, 2018
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018
Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018
FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Incorporating Intelligence in Fog Computing for Big Data Analysis in Smart Cities.
IEEE Trans. Industrial Informatics, 2017
A Cost-Effective Geodetic Strainmeter Based on Dual Coaxial Cable Bragg Gratings.
Fast depth map mode decision based on depth-texture correlation and edge classification for 3D-HEVC.
J. Visual Communication and Image Representation, 2017
Accurate and efficient exploit capture and classification.
SCIENCE CHINA Information Sciences, 2017
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017
Phishing Website Detection Based on Effective CSS Features of Web Pages.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Adaptive Android Kernel Live Patching.
Proceedings of the 26th USENIX Security Symposium, 2017
Detecting Phishing Websites via Aggregation Analysis of Page Layouts.
Proceedings of the 2017 International Conference on Identification, 2017
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017
An integral equation approach to the unsteady convection-diffusion equations.
Applied Mathematics and Computation, 2016
Proceedings of the 33nd International Conference on Machine Learning, 2016
Barycentric coordinates based soft assignment for object classification.
Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops, 2016
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Improving lookup reliability in Kad.
Peer-to-Peer Networking and Applications, 2015
A framework for stochastic simulations and visualization of biological electron-transfer dynamics.
Computer Physics Communications, 2015
SF-DRDoS: The store-and-flood distributed reflective denial of service attack.
Computer Communications, 2015
Towards Discovering and Understanding Task Hijacking in Android.
Proceedings of the 24th USENIX Security Symposium, 2015
Reflex-Tree: A Biologically Inspired Parallel Architecture for Future Smart Cities.
Proceedings of the 44th International Conference on Parallel Processing, 2015
Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Proceedings of the 10th ACM Symposium on Information, 2015
Experimental study of skeleton tracking abilities from microsoft kinect non-frontal views.
Proceedings of the 2015 3DTV-Conference: The True Vision, 2015
Eternal War in Memory.
IEEE Security & Privacy, 2014
Drawbridge: software-defined DDoS-resistant traffic engineering.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
A Website Credibility Assessment Scheme Based on Page Association.
Proceedings of the Information Security Practice and Experience, 2014
The store-and-flood distributed reflective denial of service attack.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Splider: A split-based crawler of the BT-DHT network and its applications.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
SoK: Eternal War in Memory.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Rating Web Pages Using Page-Transition Evidence.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Protecting function pointers in binary.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Network Expansion and Pathway Enrichment Analysis towards Biologically Significant Findings from Microarrays.
J. Integrative Bioinformatics, 2012
How many eyes are spying on your shared folders?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
A Framework to Eliminate Backdoors from Response-Computable Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Revisiting why Kad lookup fails.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
Journal of Computer Security, 2011
Computational study of energetic nitrogen-rich derivatives of 1, 1′- and 5, 5′-bridged ditetrazoles.
Journal of Computational Chemistry, 2011
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010
Extensity of C3S EBSD Database and Its Structure Calculation.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010
Secure dynamic code generation against spraying.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Adaptive Sensor Fault Detection and Identification Using Particle Filter Algorithms.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2009
A hybrid multi-loop genetic-algorithm/simplex/spatial-grid method for locating the optimum orientation of an adsorbed protein on a solid surface.
Computer Physics Communications, 2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009
Forecast the Biological Activity of Nitrobenzene Compound Based on BP Neural Network.
Proceedings of the PACIIA 2008, 2008
Moving Targets Detection and Analysis on Multi-Look Polarimetric SAR Images using PWF Method.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008
A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007
Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Particle Filtering for Adaptive Sensor Fault Detection and Identification.
Proceedings of the 2006 IEEE International Conference on Robotics and Automation, 2006
Linkability of a Blind Signature Scheme and Its Improved Scheme.
Proceedings of the Computational Science and Its Applications, 2006
Symbol detection with time-varying unknown phase by expectation propagation.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
Sensor validation for flight control by particle filtering.
Proceedings of the 13th European Signal Processing Conference, 2005
Audio Navigation Patterns.
Proceedings of the EuroPLoP' 2005, 2005
Development of an airborne multi-angle TIR/VNIR imaging system.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002
Development of a Sheet-Based Material Handling System for Layered Manufacturing.
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001
Efficient Multifrequency Analysis of Fault Diagnosis in Analog Circuits Based on Large Change Sensitivity Computation.
Proceedings of the 5th Asian Test Symposium (ATS '96), 1996