Seguir
Lannan Lisa Luo
Lannan Lisa Luo
Department of Computer Science, George Mason University
Dirección de correo verificada de gmu.edu - Página principal
Título
Citado por
Citado por
Año
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
2582014
Neural machine translation inspired binary code similarity comparison beyond function pairs
F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019
2362019
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
1232017
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis
K Redmond, L Luo, Q Zeng
The NDSS Workshop on Binary Analysis Research (BAR), 2019
632019
Touch well before use: Intuitive and secure authentication for iot devices
X Li, F Yan, F Zuo, Q Zeng, L Luo
The 25th annual international conference on mobile computing and networking …, 2019
552019
T2pair: Secure and usable pairing for heterogeneous iot devices
X Li, Q Zeng, L Luo, T Luo
Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020
462020
Repackage-proofing Android Apps
L Luo, Y Fu, D Wu, S Zhu, P Liu
Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016
462016
A multiversion programming inspired approach to detecting audio adversarial examples
Q Zeng, J Su, C Fu, G Kayas, L Luo
Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019
422019
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
42*2017
Resilient decentralized android application repackaging detection using logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li
Proceedings of the 2018 international symposium on code generation and …, 2018
392018
Integrating BIMserver and OpenStudio for energy efficient building
N Yu, Y Jiang, L Luo, S Lee, A Jallow, D Wu, JI Messner, RM Leicht, J Yen
Computing in Civil Engineering (2013), 516-523, 2013
332013
Pfirewall: Semantics-aware customizable data flow control for home automation systems
H Chi, Q Zeng, X Du, L Luo
arXiv preprint arXiv:1910.07987, 2019
292019
PFirewall: Semantics-aware customizable data flow control for smart home privacy protection
H Chi, Q Zeng, X Du, L Luo
arXiv preprint arXiv:2101.10522, 2021
222021
Solminer: mining distinct solutions in programs
L Luo, Q Zeng
Proceedings of the 38th International Conference on Software Engineering …, 2016
212016
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas
IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019
172019
Exploiting the inherent limitation of l0 adversarial examples
F Zuo, B Yang, X Li, Q Zeng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
16*2019
Westworld: Fuzzing-assisted remote dynamic symbolic execution of smart apps on iot cloud platforms
L Luo, Q Zeng, B Yang, F Zuo, J Wang
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
152021
Tainting-assisted and context-migrated symbolic execution of android framework for vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019
142019
Use It-No Need to Shake It! accurate implicit authentication for everyday objects with smart sensing
C Wu, X Li, F Zuo, L Luo, X Du, J Di, Q Zeng
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
82022
G2Auth: secure mutual authentication for drone delivery without special user-side hardware
C Wu, X Li, L Luo, Q Zeng
Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022
82022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20