default search action
Zehui Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Xixing Li, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang:
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. Comput. Secur. 138: 103618 (2024) - [j13]Shancheng Jiang, Zehui Wu, Haiqiong Yang, Kun Xiang, Weiping Ding, Zhen-Song Chen:
A prior knowledge-guided distributionally robust optimization-based adversarial training strategy for medical image classification. Inf. Sci. 673: 120705 (2024) - [c11]Zehui Wu, Ziwei Gong, Jaywon Koo, Julia Hirschberg:
Multimodal Multi-loss Fusion Network for Sentiment Analysis. NAACL-HLT 2024: 3588-3602 - [c10]Yi He, Yunchao Guan, Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li:
Demystifying the Security Implications in IoT Device Rental Services. USENIX Security Symposium 2024 - [i3]Zehui Wu, Ziwei Gong, Lin Ai, Pengyuan Shi, Kaan Donbekci, Julia Hirschberg:
Beyond Silent Letters: Amplifying LLMs in Emotion Recognition with Vocal Nuances. CoRR abs/2407.21315 (2024) - [i2]Ziwei Gong, Lin Ai, Harshsaiprasad Deshpande, Alexander Johnson, Emmy Phung, Zehui Wu, Ahmad Emami, Julia Hirschberg:
CREAM: Comparison-Based Reference-Free ELO-Ranked Automatic Evaluation for Meeting Summarization. CoRR abs/2409.10883 (2024) - 2023
- [c9]Xixing Li, Qiang Wei, Zehui Wu, Wei Guo:
A comprehensive survey of vulnerability detection method towards Linux-based IoT devices. CNCIT 2023: 35-41 - [c8]Yuwei Xu, Zehui Wu, Jie Cao, Jingdong Xu, Guang Cheng:
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment. ICPADS 2023: 675-682 - [i1]Zehui Wu, Ziwei Gong, Jaywon Koo, Julia Hirschberg:
Multi-Modality Multi-Loss Fusion Network. CoRR abs/2308.00264 (2023) - 2022
- [j12]Xinhui Zhao, Zehui Wu, Xiaobin Song, Qingxian Wang:
Secure analysis on entire software-defined network using coloring distribution model. Concurr. Comput. Pract. Exp. 34(14) (2022) - [c7]Peng Zhang, Xiaoyong He, Shuhao Lai, Zehui Wu:
A Third-Order CIFF Noise-Shaping SAR ADC with Nonbinary Split-Capacitor DAC. APCCAS 2022: 162-165 - 2021
- [j11]Huihui Huang, Siqi Lu, Zehui Wu, Qiang Wei:
An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2021(1): 150 (2021) - [j10]Wenbin Zhang, Zehui Wu, Qiang Wei, Huijie Yuan:
A Systematic Treat Model for Software-Defined Networking. KSII Trans. Internet Inf. Syst. 15(2): 580-599 (2021) - [j9]Xinhui Zhao, Qingxian Wang, Zehui Wu, Rui Guo:
Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation. Wirel. Pers. Commun. 117(4): 3431-3447 (2021) - [c6]Wanli Shi, Guomiao Zhou, Zehui Wu, Huiyong Zhang:
Deepbug: Bug Injection in Depth. EITCE 2021: 713-718 - 2020
- [j8]Yunchao Wang, Zehui Wu, Qiang Wei, Qingxian Wang:
EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization. KSII Trans. Internet Inf. Syst. 14(9): 3885-3906 (2020)
2010 – 2019
- 2019
- [j7]Yunchao Wang, Zehui Wu, Qiang Wei, Qingxian Wang:
NeuFuzz: Efficient Fuzzing With Deep Neural Network. IEEE Access 7: 36340-36352 (2019) - [j6]Xixing Li, Zehui Wu, Qiang Wei, Haolan Wu:
UISFuzz: An Efficient Fuzzing Method for CPU Undocumented Instruction Searching. IEEE Access 7: 149224-149236 (2019) - [j5]Xiaobin Song, Zehui Wu, Yan Cao, Qiang Wei:
ER-Fuzz:Conditional Code Removed Fuzzing. KSII Trans. Internet Inf. Syst. 13(7): 3511-3532 (2019) - 2018
- [c5]Xiaolong Liu, Zehui Wu, Qiang Wei:
An Improved Offline Symbolic Execution Approach. CSAI/ICIMT 2018: 314-320 - [c4]Xiaobin Song, Zehui Wu, Yunchao Wang:
Directer: A Parallel and Directed Fuzzing based on Concolic Execution. ICSIE 2018: 87-92 - 2017
- [j4]Zehui Wu, Qiang Wei, Kailei Ren, Qingxian Wang:
A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks. KSII Trans. Internet Inf. Syst. 11(2): 846-864 (2017) - [j3]Zehui Wu, Qiang Wei, Qingxian Wang:
基于OpenFlow的SDN网络攻防方法综述 (Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network). 计算机科学 44(6): 121-132 (2017) - 2016
- [j2]Qiang Wei, Zehui Wu, Kalei Ren, Qingxian Wang:
An OpenFlow User-Switch Remapping Approach for DDoS Defense. KSII Trans. Internet Inf. Syst. 10(9): 4529-4548 (2016) - [j1]Yunchao Wang, Qiang Wei, Zehui Wu:
基于静态污点分析的Android应用Intent注入漏洞检测方法 (Approach of Android Applications Intent Injection Vulnerability Detection Based on Static Taint Analysis). 计算机科学 43(9): 192-196 (2016) - [c3]Kailei Ren, Qiang Wei, Zehui Wu, Qingxian Wang:
SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System. SecureComm 2016: 762-765 - 2014
- [c2]Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu:
Program Crash Analysis Based on Taint Analysis. 3PGCIC 2014: 492-498 - [c1]Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu:
Decrypted data detection algorithm based on dynamic dataflow analysis. CITS 2014: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint