Author of the publication

FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.

, , , , , and . USENIX Security Symposium, page 781-797. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy inference to supplier evaluation and selection based on quality index: a flexible approach., , and . Neural Computing and Applications, 23 (Supplement-1): 117-127 (2013)Evaluation of the reliability of transport networks based on the stochastic flow of moving objects., , and . Rel. Eng. & Sys. Safety, 93 (6): 838-844 (2008)Design of a coherent inverse synthetic aperture radar moving target simulator., , , , and . IEICE Electronic Express, 11 (24): 20141044 (2014)An ultra-high ramp rate arbitrary waveform generator for communication and radar applications., , , , , and . IEICE Electronic Express, 12 (3): 20141163 (2015)Evaluation of the Reliability of Emergency Networks under Time Constraints., and . CASE, page 259-263. IEEE, (2006)Automated Chinese-English translation scoring based on answer knowledge base., and . ICCI*CC, page 341-346. IEEE Computer Society, (2013)A Cloud-Oriented Services Self-Management Approach Based on Multi-agent System Technique., , , , and . UCC, page 261-268. IEEE Computer Society, (2014)Low-Power, Resilient Interconnection with Orthogonal Latin Squares., , , , and . IEEE Design & Test of Computers, 28 (2): 30-39 (2011)Clause States Based Configuration Checking in Local Search for Satisfiability., , , and . IEEE Trans. Cybernetics, 45 (5): 1014-1027 (2015)Provably secure server-aided verification signatures., , , and . Computers & Mathematics with Applications, 61 (7): 1705-1723 (2011)