Wei Xie

Affiliations:
  • National University of Defense Technology, Changsha, China


According to our database1, Wei Xie authored at least 15 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Foot In The Door: Understanding Large Language Model Jailbreaking via Cognitive Psychology.
CoRR, 2024

2023
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations.
Sensors, September, 2023

From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel.
IEEE Trans. Inf. Forensics Secur., 2023

HyperGo: Probability-based Directed Hybrid Fuzzing.
CoRR, 2023

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Applying Binary Code Similarity Detection on Acceleration Processor.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

2022
Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

2021
XHunter: Understanding XXE Vulnerability via Automatic Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2021

ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2019
EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains.
Symmetry, 2019

2018
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Automated Vulnerability Detection in Embedded Devices.
Proceedings of the Advances in Digital Forensics XIV, 2018

Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

2017
Vulnerability Detection in IoT Firmware: A Survey.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2016
Security of Web of Things: A Survey.
Proceedings of the Advances in Information and Computer Security, 2016


  Loading...