Author of the publication

PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network.

, , , , , , and . CNCERT, volume 1299 of Communications in Computer and Information Science, page 3-15. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities., , , , , , and . IJCAI, page 4665-4671. ijcai.org, (2019)Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience., , , and . SERE (Companion), page 227-228. IEEE, (2013)AI-CTO: Knowledge graph for automated and dependable software stack solution., , , , , , and . J. Intell. Fuzzy Syst., 40 (1): 799-812 (2021)Droidrevealer: Automatically detecting Mysterious Codes in Android applications., , , , , and . DSC, page 535-536. IEEE, (2017)Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art., , , , , , , , , and 2 other author(s). Comput. Secur., (May 2023)One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware., , , , , , , , , and 1 other author(s). CoRR, (2022)A Large-Scale Study on Vulnerabilities in Linux using Vtopia., , , , and . QRS Companion, page 1-10. IEEE, (2021)A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering., , , , and . ASE, page 307-318. IEEE, (2023)POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application., , , , , and . CCS, page 1690-1692. ACM, (2015)机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine)., , , , , , and . 计算机科学, 45 (11A): 32-36 (2018)