A heuristic framework to detect concurrency vulnerabilities C Liu, D Zou, P Luo, BB Zhu, H Jin Proceedings of the 34th annual computer security applications conference …, 2018 | 35 | 2018 |
Shadownet: A secure and efficient on-device model inference system for convolutional neural networks Z Sun, R Sun, C Liu, AR Chowdhury, L Lu, S Jha 2023 IEEE Symposium on Security and Privacy (SP), 1596-1612, 2023 | 23* | 2023 |
KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel. C Liu, Y Chen, L Lu NDSS, 2021 | 13 | 2021 |
Static detection of real-world buffer overflow induced by loop P Luo, D Zou, Y Du, H Jin, C Liu, J Shen Computers & Security 89, 101616, 2020 | 8 | 2020 |
Privacy-preserving motion detection for HEVC-compressed surveillance video C Liu, X Ma, S Cao, J Fu, BB Zhu ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022 | 4 | 2022 |
JPEG decompression in the homomorphic encryption domain X Ma, C Liu, S Cao, BB Zhu Proceedings of the 26th ACM international conference on Multimedia, 905-913, 2018 | 4 | 2018 |
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis B Feng, M Luo, C Liu, L Lu, E Kirda IEEE Transactions on Dependable and Secure Computing, 2023 | 1 | 2023 |
An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery C Liu, C Fu, D Xu, L Sun, L Han Algorithms and Architectures for Parallel Processing: 15th International …, 2015 | 1 | 2015 |