What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Long Cheng
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills.
Jingwen Yan
Song Liao
Mohammed Aldeen
Luyi Xing
Danfeng Yao
Long Cheng
2025
conf/uss
APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching.
Yu Nong
Haoran Yang
Long Cheng
Hongxin Hu
Haipeng Cai
2025
conf/uss
No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements.
Jingwen Yan
Song Liao
Jin Ma
Mohammed Aldeen
Salish Kumar
Long Cheng
2024
conf/ccs
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem.
Song Liao
Long Cheng
Xiapu Luo
Zheng Song
Haipeng Cai
Danfeng (Daphne) Yao
Hongxin Hu
2024
conf/sp
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Nishant Vishwamitra
Keyan Guo
Farhan Tajwar Romit
Isabelle Ondracek
Long Cheng
Ziming Zhao
Hongxin Hu
2024
conf/asiaccs
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform.
Wenbo Ding
Song Liao
Long Cheng
Xianghang Mi
Ziming Zhao
Hongxin Hu
2023
conf/ccs
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase.
Song Liao
Long Cheng
Haipeng Cai
Linke Guo
Hongxin Hu
2023
conf/ccs
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing.
Wen Li
Haoran Yang
Xiapu Luo
Long Cheng
Haipeng Cai
2023
conf/uss
PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems.
Wen Li
Jinyang Ruan
Guangbei Yi
Long Cheng
Xiapu Luo
Haipeng Cai
2022
conf/uss
SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild.
Jeffrey Young
Song Liao
Long Cheng
Hongxin Hu
Huixing Deng
2022
conf/sp
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Sisheng Liang
Zihao Zhan
Fan Yao
Long Cheng
Zhenkai Zhang
2022
conf/asiaccs
Understanding and Detecting Remote Infection on Linux-based IoT Devices.
Hongda Li
Qiqing Huang
Fei Ding
Hongxin Hu
Long Cheng
Guofei Gu
Ziming Zhao
2021
conf/ndss
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery.
Wenbo Ding
Hongxin Hu
Long Cheng
2021
conf/ndss
Towards Understanding and Detecting Cyberbullying in Real-world Images.
Nishant Vishwamitra
Hongxin Hu
Feng Luo
Long Cheng
2021
conf/dsn
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection.
Shouguo Yang
Long Cheng
Yicheng Zeng
Zhe Lang
Hongsong Zhu
Zhiqiang Shi
2020
conf/ccs
AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments.
Sihan Yu
Xiaonan Zhang
Pei Huang
Linke Guo
Long Cheng
Kuang-Ching Wang
2020
conf/ccs
Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms.
Long Cheng
Christin Wilson
Song Liao
Jeffrey Young
Daniel Dong
Hongxin Hu
2020
conf/ccs
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels.
Fei Ding
Hongda Li
Feng Luo
Hongxin Hu
Long Cheng
Hai Xiao
Rong Ge
2020
conf/acsac
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications.
Song Liao
Christin Wilson
Long Cheng
Hongxin Hu
Huixing Deng
2017
journals/tifs
FACT: A Framework for Authentication in Cloud-Based IP Traceback.
Long Cheng
Dinil Mon Divakaran
Aloysius Wooi Kiak Ang
Wee-Yong Lim
Vrizlynn L. L. Thing
2017
journals/popets
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
Sazzadur Rahaman
Long Cheng
Danfeng Daphne Yao
He Li
Jung-Min "Jerry" Park
2017
conf/ccs
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics.
Long Cheng
Ke Tian
Danfeng (Daphne) Yao
2017
conf/acsac
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
Long Cheng
Ke Tian
Danfeng (Daphne) Yao
2016
journals/tifs
Opportunistic Piggyback Marking for IP Traceback.
Long Cheng
Dinil Mon Divakaran
Wee-Yong Lim
Vrizlynn L. L. Thing
Coauthors
Aloysius Wooi Kiak Ang
(1)
Christin Wilson
(2)
Danfeng (Daphne) Yao
(3)
Danfeng Daphne Yao
(1)
Danfeng Yao
(1)
Daniel Dong
(1)
Dinil Mon Divakaran
(2)
Fan Yao
(1)
Farhan Tajwar Romit
(1)
Fei Ding
(2)
Feng Luo
(2)
Guangbei Yi
(1)
Guofei Gu
(1)
Hai Xiao
(1)
Haipeng Cai
(5)
Haoran Yang
(2)
He Li
(1)
Hongda Li
(2)
Hongsong Zhu
(1)
Hongxin Hu
(12)
Huixing Deng
(2)
Isabelle Ondracek
(1)
Jeffrey Young
(2)
Jin Ma
(1)
Jingwen Yan
(2)
Jinyang Ruan
(1)
Jung-Min "Jerry" Park
(1)
Ke Tian
(2)
Keyan Guo
(1)
Kuang-Ching Wang
(1)
Linke Guo
(2)
Long Cheng
(24)
Luyi Xing
(1)
Mohammed Aldeen
(2)
Nishant Vishwamitra
(2)
Pei Huang
(1)
Qiqing Huang
(1)
Rong Ge
(1)
Salish Kumar
(1)
Sazzadur Rahaman
(1)
Shouguo Yang
(1)
Sihan Yu
(1)
Sisheng Liang
(1)
Song Liao
(8)
Vrizlynn L. L. Thing
(2)
Wee-Yong Lim
(2)
Wen Li
(2)
Wenbo Ding
(2)
Xianghang Mi
(1)
Xiaonan Zhang
(1)
Xiapu Luo
(3)
Yicheng Zeng
(1)
Yu Nong
(1)
Zhe Lang
(1)
Zheng Song
(1)
Zhenkai Zhang
(1)
Zhiqiang Shi
(1)
Zihao Zhan
(1)
Ziming Zhao
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to