What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiapu Luo
Google Scholar
102
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Detecting Reentrancy Vulnerabilities for Solidity Smart Contracts With Contract Standards-Based Rules.
Jie Cai
Jiachi Chen
Tao Zhang
Xiapu Luo
Xiaobing Sun
Bin Li
2025
journals/tifs
Driving State-Aware Anomaly Detection for Autonomous Vehicles.
Zhihao Wang
Lei Xue
Xiapu Luo
Xiaobo Ma
Guofei Gu
2025
conf/ndss
Be Careful of What You Embed: Demystifying OLE Vulnerabilities.
Yunpeng Tian
Feng Dong
Haoyi Liu
Meng Xu
Zhiniang Peng
Zesen Ye
Shenghui Li
Xiapu Luo
Haoyu Wang
2025
conf/ndss
Automated Mass Malware Factory: The Convergence of Piggybacking and Adversarial Example in Android Malicious Software Generation.
Heng Li
Zhiyuan Yao
Bang Wu
Cuiying Gao
Teng Xu
Wei Yuan
Xiapu Luo
2025
conf/ndss
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone.
Yiming Zhang
Fengwei Zhang
Xiapu Luo
Rui Hou
Xuhua Ding
Zhenkai Liang
Shoumeng Yan
Tao Wei
Zhengyu He
2025
journals/tifs
An Efficient Adversarial Attack on FCG-Based Android Malware Detection Systems.
Heng Li
Bang Wu
Wei Zhou
Wei Yuan
Cuiying Gao
Xinge You
Xiapu Luo
2025
conf/esorics
AcouListener: An Inaudible Acoustic Side-Channel Attack on AR/VR Systems.
Fengliang He
Hong-Ning Dai
Hanyang Guo
Xiapu Luo
Jiadi Yu
2025
conf/provsec
GenDetect: Generative Large Language Model Usage in Smart Contract Vulnerability Detection.
Peter Ince
Jiangshan Yu
Joseph K. Liu
Xiaoning Du
Xiapu Luo
2025
conf/uss
Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain.
Zheyuan He
Zihao Li
Jiahao Luo
Feng Luo
Junhan Duan
Jingwei Li
Shuwei Song
Xiapu Luo
Ting Chen
Xiaosong Zhang
2025
conf/uss
Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer.
Zuchao Ma
Muhui Jiang
Feng Luo
Xiapu Luo
Yajin Zhou
2025
conf/uss
Automated Soundness and Completeness Vetting of Polygon zkEVM.
Xinghao Peng
Zhiyuan Sun
Kunsong Zhao
Zuchao Ma
Zihao Li
Jinan Jiang
Xiapu Luo
Yinqian Zhang
2025
conf/uss
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing.
Youkun Shi
Yuan Zhang
Tianhao Bai
Feng Xue
Jiarun Dai
Fengyu Liu
Lei Zhang
Xiapu Luo
Min Yang
2025
journals/tifs
Facilitating Access Control Vulnerability Detection in Modern Java Web Applications With Accurate Permission Check Identification.
Youkun Shi
Fengyu Liu
Guangliang Yang
Yuan Zhang
Yinzhi Cao
Enhao Li
Xin Tan
Xiapu Luo
Min Yang
Siyi Chen
2024
journals/compsec
A comprehensive analysis of website fingerprinting defenses on Tor.
Xi Xiao
Xiang Zhou
Zhenyu Yang
Le Yu
Bin Zhang
Qixu Liu
Xiapu Luo
2024
journals/tifs
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks.
Yulin Zhu
Tomasz P. Michalak
Xiapu Luo
Xiaoge Zhang
Kai Zhou
2024
journals/tifs
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint.
Xiangming Wang
Yang Liu
Kexin Jiao
Pengfei Liu
Xiapu Luo
Ting Liu
2024
conf/ccs
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem.
Song Liao
Long Cheng
Xiapu Luo
Zheng Song
Haipeng Cai
Danfeng (Daphne) Yao
Hongxin Hu
2024
conf/ccs
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back.
Zhiyuan Sun
Zihao Li
Xinghao Peng
Xiapu Luo
Muhui Jiang
Hao Zhou
Yinqian Zhang
2024
conf/ccs
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models.
Feng Luo
Huangkun Lin
Zihao Li
Xiapu Luo
Ruijie Luo
Zheyuan He
Shuwei Song
Ting Chen
Wenxuan Luo
2024
conf/ccs
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup.
Zihao Li
Xinghao Peng
Zheyuan He
Xiapu Luo
Ting Chen
2024
conf/uss
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts.
Tianle Sun
Ningyu He
Jiang Xiao
Yinliang Yue
Xiapu Luo
Haoyu Wang
2024
conf/acisp
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models.
Peter Ince
Xiapu Luo
Jiangshan Yu
Joseph K. Liu
Xiaoning Du
2024
conf/sp
LLMIF: Augmented Large Language Model for Fuzzing IoT Devices.
Jincheng Wang
Le Yu
Xiapu Luo
2024
conf/sp
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective.
Pengfei Jing
Zhiqiang Cai
Yingjie Cao
Le Yu
Yuefeng Du
Wenkai Zhang
Chenxiong Qian
Xiapu Luo
Sen Nie
Shi Wu
2024
conf/sp
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Zheyuan He
Zihao Li
Ao Qiao
Xiapu Luo
Xiaosong Zhang
Ting Chen
Shuwei Song
Dijun Liu
Weina Niu
2024
conf/sp
Towards Smart Contract Fuzzing on GPUs.
Weimin Chen
Xiapu Luo
Haipeng Cai
Haoyu Wang
2024
conf/asiaccs
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification.
Xiang Zhou
Xi Xiao
Qing Li
Bin Zhang
Guangwu Hu
Xiapu Luo
Tianwei Zhang
2024
conf/ndss
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
Hao Zhou
Shuohan Wu
Chenxiong Qian
Xiapu Luo
Haipeng Cai
Chao Zhang
2024
conf/ndss
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit.
Pengxiang Ma
Ningyu He
Yuhua Huang
Haoyu Wang
Xiapu Luo
2023
journals/compsec
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning.
Zhutian Lin
Xi Xiao
Guangwu Hu
Qing Li
Bin Zhang
Xiapu Luo
2023
journals/tifs
Obfuscation-Resilient Android Malware Analysis Based on Complementary Features.
Cuiying Gao
Minghui Cai
Shuijun Yin
Gaozhun Huang
Heng Li
Wei Yuan
Xiapu Luo
2023
journals/tifs
Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training.
Litao Qiao
Bang Wu
Shuijun Yin
Heng Li
Wei Yuan
Xiapu Luo
2023
conf/ccs
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Feng Dong
Shaofei Li
Peng Jiang
Ding Li
Haoyu Wang
Liangyi Huang
Xusheng Xiao
Jiedong Chen
Xiapu Luo
Yao Guo
Xiangqun Chen
2023
conf/ccs
Demystifying DeFi MEV Activities in Flashbots Bundle.
Zihao Li
Jianfeng Li
Zheyuan He
Xiapu Luo
Ting Wang
Xiaoze Ni
Wenwu Yang
Xi Chen
Ting Chen
2023
conf/ccs
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing.
Wen Li
Haoran Yang
Xiapu Luo
Long Cheng
Haipeng Cai
2023
conf/uss
PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems.
Wen Li
Jinyang Ruan
Guangbei Yi
Long Cheng
Xiapu Luo
Haipeng Cai
2023
conf/uss
Panda: Security Analysis of Algorand Smart Contracts.
Zhiyuan Sun
Xiapu Luo
Yinqian Zhang
2023
conf/uss
SHELTER: Extending Arm CCA with Isolation in User Space.
Yiming Zhang
Yuxin Hu
Zhenyu Ning
Fengwei Zhang
Xiapu Luo
Haoyang Huang
Shoumeng Yan
Zhengyu He
2023
conf/uss
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Cen Zhang
Yuekang Li
Hao Zhou
Xiaohan Zhang
Yaowen Zheng
Xian Zhan
Xiaofei Xie
Xiapu Luo
Xinghua Li
Yang Liu
Sheikh Mahbub Habib
2023
conf/uss
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting.
Jian Qu
Xiaobo Ma
Jianfeng Li
Xiapu Luo
Lei Xue
Junjie Zhang
Zhenhua Li
Li Feng
Xiaohong Guan
2023
conf/uss
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Ming Yuan
Bodong Zhao
Penghui Li
Jiashuo Liang
Xinhui Han
Xiapu Luo
Chao Zhang
2023
conf/uss
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information.
Heng Li
Zhang Cheng
Bang Wu
Liheng Yuan
Cuiying Gao
Wei Yuan
Xiapu Luo
2023
conf/uss
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System.
Feng Dong
Liu Wang
Xu Nie
Fei Shao
Haoyu Wang
Ding Li
Xiapu Luo
Xusheng Xiao
2023
conf/uss
On the Security Risks of Knowledge Graph Reasoning.
Zhaohan Xi
Tianyu Du
Changjiang Li
Ren Pang
Shouling Ji
Xiapu Luo
Xusheng Xiao
Fenglong Ma
Ting Wang
2023
conf/sp
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Tao Ni
Xiaokuan Zhang
Chaoshun Zuo
Jianfeng Li
Zhenyu Yan
Wubing Wang
Weitao Xu
Xiapu Luo
Qingchuan Zhao
2023
conf/sp
Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.
Huancheng Zhou
Sungmin Hong
Yangyang Liu
Xiapu Luo
Weichao Li
Guofei Gu
2022
journals/tifs
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications.
Xiao Yang
Mengling Liu
Man Ho Au
Xiapu Luo
Qingqing Ye
2022
conf/ccs
Uncovering Intent based Leak of Sensitive Data in Android Framework.
Hao Zhou
Xiapu Luo
Haoyu Wang
Haipeng Cai
2022
conf/uss
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Le Yu
Yangyang Liu
Pengfei Jing
Xiapu Luo
Lei Xue
Kaifa Zhao
Yajin Zhou
Ting Wang
Guofei Gu
Sen Nie
Shi Wu
2022
conf/uss
On the Security Risks of AutoML.
Ren Pang
Zhaohan Xi
Shouling Ji
Xiapu Luo
Ting Wang
2022
conf/uss
FOAP: Fine-Grained Open-World Android App Fingerprinting.
Jianfeng Li
Hao Zhou
Shuohan Wu
Xiapu Luo
Ting Wang
Xian Zhan
Xiaobo Ma
2022
conf/uss
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
Lei Xue
Yangyang Liu
Tianqi Li
Kaifa Zhao
Jianfeng Li
Le Yu
Xiapu Luo
Yajin Zhou
Guofei Gu
2022
conf/uss
PolyCruise: A Cross-Language Dynamic Information Flow Analysis.
Wen Li
Jiang Ming
Xiapu Luo
Haipeng Cai
2022
conf/eurosp
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors.
Ren Pang
Zheng Zhang
Xiangshan Gao
Zhaohan Xi
Shouling Ji
Peng Cheng
Xiapu Luo
Ting Wang
2022
conf/ndss
Packet-Level Open-World App Fingerprinting on Wireless Traffic.
Jianfeng Li
Shuohan Wu
Hao Zhou
Xiapu Luo
Ting Wang
Yangyang Liu
Xiaobo Ma
2022
conf/ndss
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Hao Zhou
Haoyu Wang
Xiapu Luo
Ting Chen
Yajin Zhou
Ting Wang
2021
conf/ccs
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.
Muhui Jiang
Lin Ma
Yajin Zhou
Qiang Liu
Cen Zhang
Zhi Wang
Xiapu Luo
Lei Wu
Kui Ren
2021
conf/ccs
Structural Attack against Graph Based Android Malware Detection.
Kaifa Zhao
Hao Zhou
Yulin Zhu
Xian Zhan
Kai Zhou
Jianfeng Li
Le Yu
Wei Yuan
Xiapu Luo
2021
conf/uss
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations.
Pengfei Jing
Qiyi Tang
Yuefeng Du
Lei Xue
Xiapu Luo
Ting Wang
Sen Nie
Shi Wu
2021
conf/uss
EOSAFE: Security Analysis of EOSIO Smart Contracts.
Ningyu He
Ruiyi Zhang
Haoyu Wang
Lei Wu
Xiapu Luo
Yao Guo
Ting Yu
Xuxian Jiang
2021
conf/sp
Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Lei Xue
Hao Zhou
Xiapu Luo
Yajin Zhou
Yang Shi
Guofei Gu
Fengwei Zhang
Man Ho Au
2021
conf/ndss
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
Kai Li
Jiaqi Chen
Xianghong Liu
Yuzhe Richard Tang
XiaoFeng Wang
Xiapu Luo
2020
journals/compsec
Characterizing cryptocurrency exchange scams.
Pengcheng Xia
Haoyu Wang
Bowen Zhang
Ru Ji
Bingyu Gao
Lei Wu
Xiapu Luo
Guoai Xu
2020
journals/tifs
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code.
Mohannad Alhanahnah
Qiben Yan
Hamid Bagheri
Hao Zhou
Yutaka Tsutano
Witawas Srisa-an
Xiapu Luo
2020
conf/ccs
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Ren Pang
Hua Shen
Xinyang Zhang
Shouling Ji
Yevgeniy Vorobeychik
Xiapu Luo
Alex X. Liu
Ting Wang
2020
conf/uss
Programmable In-Network Security for Context-aware BYOD Policies.
Qiao Kang
Lei Xue
Adam Morrison
Yuxin Tang
Ang Chen
Xiapu Luo
2020
conf/uss
Interpretable Deep Learning under Fire.
Xinyang Zhang
Ningfei Wang
Hua Shen
Shouling Ji
Xiapu Luo
Ting Wang
2020
conf/fc
Exploring the Monero Peer-to-Peer Network.
Tong Cao
Jiangshan Yu
Jérémie Decouchant
Xiapu Luo
Paulo Veríssimo
2020
conf/ndss
SODA: A Generic Online Detection Framework for Smart Contracts.
Ting Chen
Rong Cao
Ting Li
Xiapu Luo
Guofei Gu
Yufei Zhang
Zhou Liao
Hang Zhu
Gang Chen
Zheyuan He
Yuxing Tang
Xiaodong Lin
Xiaosong Zhang
2019
journals/tifs
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts.
Lei Xue
Chenxiong Qian
Hao Zhou
Xiapu Luo
Yajin Zhou
Yuru Shao
Alvin T. S. Chan
2019
conf/ccs
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Ting Chen
Yufei Zhang
Zihao Li
Xiapu Luo
Ting Wang
Rong Cao
Xiuzhuo Xiao
Xiaosong Zhang
2018
journals/tifs
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
Ming Fan
Jun Liu
Xiapu Luo
Kai Chen
Zhenzhou Tian
Qinghua Zheng
Ting Liu
2018
journals/tifs
LinkScope: Toward Detecting Target Link Flooding Attacks.
Lei Xue
Xiaobo Ma
Xiapu Luo
Edmond W. W. Chan
TungNgai Miu
Guofei Gu
2018
journals/tifs
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks.
Chenxu Wang
TungNgai Miu
Xiapu Luo
Jinhe Wang
2018
conf/ccs
Model-Reuse Attacks on Deep Learning Systems.
Yujie Ji
Xinyang Zhang
Shouling Ji
Xiapu Luo
Ting Wang
2018
conf/dsn
Localizing Function Errors in Mobile Apps with User Reviews.
Le Yu
Jiachi Chen
Hao Zhou
Xiapu Luo
Kang Liu
2017
journals/tifs
Toward Automatically Generating Privacy Policy for Android Apps.
Le Yu
Tao Zhang
Xiapu Luo
Lei Xue
Henry Chang
2017
conf/uss
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.
Lei Xue
Yajin Zhou
Ting Chen
Xiapu Luo
Guofei Gu
2016
journals/compsec
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Wenjuan Li
Weizhi Meng
Xiapu Luo
Lam-for Kwok
2016
conf/acisp
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Wei Chen
Xiapu Luo
Chengyu Yin
Bin Xiao
Man Ho Au
Yajuan Tang
2016
conf/acisp
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Shuang Zhao
Xiapu Luo
Bo Bai
Xiaobo Ma
Wei Zou
Xinliang Qiu
Man Ho Au
2016
conf/dsn
Can We Trust the Privacy Policies of Android Apps?
Le Yu
Xiapu Luo
Xule Liu
Tao Zhang
2015
conf/ccs
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications.
Le Yu
Tao Zhang
Xiapu Luo
Lei Xue
2015
conf/esorics
DexHunter: Toward Extracting Hidden Code from Packed Android Applications.
Yueqian Zhang
Xiapu Luo
Haoyang Yin
2014
journals/tifs
Building a Scalable System for Stealthy P2P-Botnet Detection.
Junjie Zhang
Roberto Perdisci
Wenke Lee
Xiapu Luo
Unum Sarfraz
2014
journals/tifs
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks.
Yajuan Tang
Xiapu Luo
Qing Hui
Rocky K. C. Chang
2014
conf/dsn
On Tracking Information Flows through JNI in Android Applications.
Chenxiong Qian
Xiapu Luo
Yuru Shao
Alvin T. S. Chan
2014
conf/acsac
Towards a scalable resource-driven approach for detecting repackaged Android applications.
Yuru Shao
Xiapu Luo
Chenxiong Qian
Pengfei Zhu
Lei Zhang
2013
journals/compsec
Inference attacks against trust-based onion routing: Trust degree to the rescue.
Peng Zhou
Xiapu Luo
Rocky K. C. Chang
2011
conf/ccs
Boosting the scalability of botnet detection using adaptive traffic sampling.
Junjie Zhang
Xiapu Luo
Roberto Perdisci
Guofei Gu
Wenke Lee
Nick Feamster
2011
conf/ndss
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Xiapu Luo
Peng Zhou
Edmond W. W. Chan
Wenke Lee
Rocky K. C. Chang
Roberto Perdisci
2011
conf/dsn
Detecting stealthy P2P botnets using statistical traffic fingerprints.
Junjie Zhang
Roberto Perdisci
Wenke Lee
Unum Sarfraz
Xiapu Luo
2011
conf/dsn
A combinatorial approach to network covert communications with applications in Web Leaks.
Xiapu Luo
Peng Zhou
Edmond W. W. Chan
Rocky K. C. Chang
Wenke Lee
2011
conf/acsac
Exposing invisible timing-based traffic watermarks with BACKLIT.
Xiapu Luo
Peng Zhou
Junjie Zhang
Roberto Perdisci
Wenke Lee
Rocky K. C. Chang
2010
conf/esorics
On the Secrecy of Spread-Spectrum Flow Watermarks.
Xiapu Luo
Junjie Zhang
Roberto Perdisci
Wenke Lee
2009
conf/ndss
Recursive DNS Architectures and Vulnerability Implications.
David Dagon
Manos Antonakakis
Kevin Day
Xiapu Luo
Christopher P. Lee
Wenke Lee
2009
conf/dsn
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks.
Roberto Perdisci
Manos Antonakakis
Xiapu Luo
Wenke Lee
2008
conf/dsn
TCP covert timing channels: Design and detection.
Xiapu Luo
Edmond W. W. Chan
Rocky K. C. Chang
2007
conf/sec
Crafting Web Counters into Covert Channels.
Xiapu Luo
Edmond W. W. Chan
Rocky K. C. Chang
2007
conf/esorics
Cloak: A Ten-Fold Way for Reliable Covert Communications.
Xiapu Luo
Edmond W. W. Chan
Rocky K. C. Chang
2005
conf/ndss
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
Xiapu Luo
Rocky K. C. Chang
2005
conf/dsn
Optimizing the Pulsing Denial-of-Service Attacks.
Xiapu Luo
Rocky K. C. Chang
Coauthors
Adam Morrison
(1)
Alex X. Liu
(1)
Alvin T. S. Chan
(2)
Ang Chen
(1)
Ao Qiao
(1)
Bang Wu
(4)
Bin Li
(1)
Bin Xiao
(1)
Bin Zhang
(3)
Bingyu Gao
(1)
Bo Bai
(1)
Bodong Zhao
(1)
Bowen Zhang
(1)
Cen Zhang
(2)
Changjiang Li
(1)
Chao Zhang
(2)
Chaoshun Zuo
(1)
Chengyu Yin
(1)
Chenxiong Qian
(5)
Chenxu Wang
(1)
Christopher P. Lee
(1)
Cuiying Gao
(4)
Danfeng (Daphne) Yao
(1)
David Dagon
(1)
Dijun Liu
(1)
Ding Li
(2)
Edmond W. W. Chan
(6)
Enhao Li
(1)
Fei Shao
(1)
Feng Dong
(3)
Feng Luo
(3)
Feng Xue
(1)
Fengliang He
(1)
Fenglong Ma
(1)
Fengwei Zhang
(3)
Fengyu Liu
(2)
Gang Chen
(1)
Gaozhun Huang
(1)
Guangbei Yi
(1)
Guangliang Yang
(1)
Guangwu Hu
(2)
Guoai Xu
(1)
Guofei Gu
(9)
Haipeng Cai
(7)
Hamid Bagheri
(1)
Hang Zhu
(1)
Hanyang Guo
(1)
Hao Zhou
(12)
Haoran Yang
(1)
Haoyang Huang
(1)
Haoyang Yin
(1)
Haoyi Liu
(1)
Haoyu Wang
(10)
Heng Li
(5)
Henry Chang
(1)
Hong-Ning Dai
(1)
Hongxin Hu
(1)
Hua Shen
(2)
Huancheng Zhou
(1)
Huangkun Lin
(1)
Jérémie Decouchant
(1)
Jiachi Chen
(2)
Jiadi Yu
(1)
Jiahao Luo
(1)
Jian Qu
(1)
Jianfeng Li
(7)
Jiang Ming
(1)
Jiang Xiao
(1)
Jiangshan Yu
(3)
Jiaqi Chen
(1)
Jiarun Dai
(1)
Jiashuo Liang
(1)
Jie Cai
(1)
Jiedong Chen
(1)
Jinan Jiang
(1)
Jincheng Wang
(1)
Jingwei Li
(1)
Jinhe Wang
(1)
Jinyang Ruan
(1)
Joseph K. Liu
(2)
Jun Liu
(1)
Junhan Duan
(1)
Junjie Zhang
(6)
Kai Chen
(1)
Kai Li
(1)
Kai Zhou
(2)
Kaifa Zhao
(3)
Kang Liu
(1)
Kevin Day
(1)
Kexin Jiao
(1)
Kui Ren
(1)
Kunsong Zhao
(1)
Lam-for Kwok
(1)
Le Yu
(10)
Lei Wu
(3)
Lei Xue
(12)
Lei Zhang
(1)
Lei Zhang
(1)
Li Feng
(1)
Liangyi Huang
(1)
Liheng Yuan
(1)
Lin Ma
(1)
Litao Qiao
(1)
Liu Wang
(1)
Long Cheng
(3)
Man Ho Au
(4)
Manos Antonakakis
(2)
Meng Xu
(1)
Mengling Liu
(1)
Min Yang
(2)
Ming Fan
(1)
Ming Yuan
(1)
Minghui Cai
(1)
Mohannad Alhanahnah
(1)
Muhui Jiang
(3)
Nick Feamster
(1)
Ningfei Wang
(1)
Ningyu He
(3)
Paulo Veríssimo
(1)
Peng Cheng
(1)
Peng Jiang
(1)
Peng Zhou
(4)
Pengcheng Xia
(1)
Pengfei Jing
(3)
Pengfei Liu
(1)
Pengfei Zhu
(1)
Penghui Li
(1)
Pengxiang Ma
(1)
Peter Ince
(2)
Qiang Liu
(1)
Qiao Kang
(1)
Qiben Yan
(1)
Qing Hui
(1)
Qing Li
(2)
Qingchuan Zhao
(1)
Qinghua Zheng
(1)
Qingqing Ye
(1)
Qixu Liu
(1)
Qiyi Tang
(1)
Ren Pang
(4)
Roberto Perdisci
(7)
Rocky K. C. Chang
(10)
Rong Cao
(2)
Ru Ji
(1)
Rui Hou
(1)
Ruijie Luo
(1)
Ruiyi Zhang
(1)
Sen Nie
(3)
Shaofei Li
(1)
Sheikh Mahbub Habib
(1)
Shenghui Li
(1)
Shi Wu
(3)
Shouling Ji
(6)
Shoumeng Yan
(2)
Shuang Zhao
(1)
Shuijun Yin
(2)
Shuohan Wu
(3)
Shuwei Song
(3)
Siyi Chen
(1)
Song Liao
(1)
Sungmin Hong
(1)
Tao Ni
(1)
Tao Wei
(1)
Tao Zhang
(4)
Teng Xu
(1)
Tianhao Bai
(1)
Tianle Sun
(1)
Tianqi Li
(1)
Tianwei Zhang
(1)
Tianyu Du
(1)
Ting Chen
(9)
Ting Li
(1)
Ting Liu
(2)
Ting Wang
(13)
Ting Yu
(1)
Tomasz P. Michalak
(1)
Tong Cao
(1)
TungNgai Miu
(2)
Unum Sarfraz
(2)
Wei Chen
(1)
Wei Yuan
(5)
Wei Yuan
(1)
Wei Zhou
(1)
Wei Zou
(1)
Weichao Li
(1)
Weimin Chen
(1)
Weina Niu
(1)
Weitao Xu
(1)
Weizhi Meng
(1)
Wen Li
(3)
Wenjuan Li
(1)
Wenkai Zhang
(1)
Wenke Lee
(9)
Wenwu Yang
(1)
Wenxuan Luo
(1)
Witawas Srisa-an
(1)
Wubing Wang
(1)
Xi Chen
(1)
Xi Xiao
(3)
Xian Zhan
(3)
Xiang Zhou
(2)
Xianghong Liu
(1)
Xiangming Wang
(1)
Xiangqun Chen
(1)
Xiangshan Gao
(1)
Xiao Yang
(1)
Xiaobing Sun
(1)
Xiaobo Ma
(6)
Xiaodong Lin
(1)
Xiaofei Xie
(1)
XiaoFeng Wang
(1)
Xiaoge Zhang
(1)
Xiaohan Zhang
(1)
Xiaohong Guan
(1)
Xiaokuan Zhang
(1)
Xiaoning Du
(2)
Xiaosong Zhang
(4)
Xiaoze Ni
(1)
Xiapu Luo
(102)
Xin Tan
(1)
Xinge You
(1)
Xinghao Peng
(3)
Xinghua Li
(1)
Xinhui Han
(1)
Xinliang Qiu
(1)
Xinyang Zhang
(3)
Xiuzhuo Xiao
(1)
Xu Nie
(1)
Xuhua Ding
(1)
Xule Liu
(1)
Xusheng Xiao
(3)
Xuxian Jiang
(1)
Yajin Zhou
(8)
Yajuan Tang
(2)
Yang Liu
(1)
Yang Liu
(1)
Yang Shi
(1)
Yangyang Liu
(4)
Yao Guo
(2)
Yaowen Zheng
(1)
Yevgeniy Vorobeychik
(1)
Yiming Zhang
(2)
Yingjie Cao
(1)
Yinliang Yue
(1)
Yinqian Zhang
(3)
Yinzhi Cao
(1)
Youkun Shi
(2)
Yuan Zhang
(2)
Yuefeng Du
(2)
Yuekang Li
(1)
Yueqian Zhang
(1)
Yufei Zhang
(2)
Yuhua Huang
(1)
Yujie Ji
(1)
Yulin Zhu
(2)
Yunpeng Tian
(1)
Yuru Shao
(3)
Yutaka Tsutano
(1)
Yuxin Hu
(1)
Yuxin Tang
(1)
Yuxing Tang
(1)
Yuzhe Richard Tang
(1)
Zesen Ye
(1)
Zhang Cheng
(1)
Zhaohan Xi
(3)
Zheng Song
(1)
Zheng Zhang
(1)
Zhengyu He
(2)
Zhenhua Li
(1)
Zhenkai Liang
(1)
Zhenyu Ning
(1)
Zhenyu Yan
(1)
Zhenyu Yang
(1)
Zhenzhou Tian
(1)
Zheyuan He
(6)
Zhi Wang
(1)
Zhihao Wang
(1)
Zhiniang Peng
(1)
Zhiqiang Cai
(1)
Zhiyuan Sun
(3)
Zhiyuan Yao
(1)
Zhou Liao
(1)
Zhutian Lin
(1)
Zihao Li
(8)
Zuchao Ma
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to