Peiyuan Zong
Cited by
Cited by
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning
P Zong, T Lv, D Wang, Z Deng, R Liang, K Chen
29th {USENIX} Security Symposium ({USENIX} Security 20), 2255-2269, 2020
Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level
K Chen, T Li, B Ma, P Wang, XF Wang, P Zong
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
The system can't perform the operation now. Try again later.
Articles 1–4