Zehui Wu

Orcid: 0000-0002-5176-4620

According to our database1, Zehui Wu authored at least 23 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices.
Comput. Secur., March, 2024

2023
Multi-Modality Multi-Loss Fusion Network.
CoRR, 2023

DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A comprehensive survey of vulnerability detection method towards Linux-based IoT devices.
Proceedings of the 2nd International Conference on Networks, 2023

2022
Secure analysis on entire software-defined network using coloring distribution model.
Concurr. Comput. Pract. Exp., 2022

A Third-Order CIFF Noise-Shaping SAR ADC with Nonbinary Split-Capacitor DAC.
Proceedings of the IEEE Asia Pacific Conference on Circuit and Systems, 2022

2021
Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation.
Wirel. Pers. Commun., 2021

A Systematic Treat Model for Software-Defined Networking.
KSII Trans. Internet Inf. Syst., 2021

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture.
EURASIP J. Wirel. Commun. Netw., 2021

Deepbug: Bug Injection in Depth.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2020
EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization.
KSII Trans. Internet Inf. Syst., 2020

2019
ER-Fuzz:Conditional Code Removed Fuzzing.
KSII Trans. Internet Inf. Syst., 2019

NeuFuzz: Efficient Fuzzing With Deep Neural Network.
IEEE Access, 2019

UISFuzz: An Efficient Fuzzing Method for CPU Undocumented Instruction Searching.
IEEE Access, 2019

2018
Directer: A Parallel and Directed Fuzzing based on Concolic Execution.
Proceedings of the 7th International Conference on Software and Information Engineering, 2018

An Improved Offline Symbolic Execution Approach.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

2017
基于OpenFlow的SDN网络攻防方法综述 (Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network).
计算机科学, 2017

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks.
KSII Trans. Internet Inf. Syst., 2017

2016
基于静态污点分析的Android应用Intent注入漏洞检测方法 (Approach of Android Applications Intent Injection Vulnerability Detection Based on Static Taint Analysis).
计算机科学, 2016

An OpenFlow User-Switch Remapping Approach for DDoS Defense.
KSII Trans. Internet Inf. Syst., 2016

SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System.
Proceedings of the Security and Privacy in Communication Networks, 2016

2014
Decrypted data detection algorithm based on dynamic dataflow analysis.
Proceedings of the International Conference on Computer, 2014

Program Crash Analysis Based on Taint Analysis.
Proceedings of the 2014 Ninth International Conference on P2P, 2014


  Loading...