default search action
Ping Chen 0003
Person information
- affiliation: Fudan University, Institute for Big Data, Shanghai, China
- affiliation (former): Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA
- affiliation (former): Purdue University, Department of Computer Science, West Lafayette, USA
- affiliation (PhD 2012): Nanjing University Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, China
Other persons with the same name
- Ping Chen — disambiguation page
- Ping Chen 0001 — University of Massachusetts Boston, Department of Computer Science, MA, USA (and 2 more)
- Ping Chen 0002 — Peking University, Beijing, China
- Ping Chen 0004 — North University of China, Shanxi Key Laboratory of Signal Capturing and Processing, Taiyuan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Lan Zhang, Peng Liu, Yoon-Ho Choi, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1390-1402 (2023) - 2022
- [c21]Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang:
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers. EuroS&P 2022: 520-536 - 2021
- [j5]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks. IEEE Trans. Inf. Forensics Secur. 16: 4691-4704 (2021) - 2020
- [j4]Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. J. Comput. Secur. 28(5): 499-523 (2020)
2010 – 2019
- 2019
- [j3]Zhisheng Hu, Minghui Zhu, Ping Chen, Peng Liu:
On convergence rates of game theoretic reinforcement learning algorithms. Autom. 104: 90-101 (2019) - [p2]Zhisheng Hu, Ping Chen, Minghui Zhu, Peng Liu:
Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 54-93 - [p1]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - 2018
- [j2]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Peng Liu:
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. Cybersecur. 1(1): 3 (2018) - [i2]Xusheng Li, Zhisheng Hu, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
ROPNN: Detection of ROP Payloads Using Deep Neural Networks. CoRR abs/1807.11110 (2018) - 2017
- [c20]Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - [c19]Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao:
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIX Security Symposium 2017: 17-32 - [c18]Liang Deng, Peng Liu, Jun Xu, Ping Chen, Qingkai Zeng:
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring. VEE 2017: 83-96 - 2016
- [c17]Jun Xu, Pinyao Guo, Bo Chen, Robert F. Erbacher, Ping Chen, Peng Liu:
Demo: A Symbolic N-Variant System. MTD@CCS 2016: 65-68 - [c16]Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu:
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. CCS 2016: 529-540 - [c15]Zhisheng Hu, Ping Chen, Yang Lu, Minghui Zhu, Peng Liu:
Towards a Science for Adaptive Defense: Revisit Server Protection. CIC 2016: 112-121 - 2015
- [c14]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [i1]Ping Chen, Jun Xu, Jun Wang, Peng Liu:
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack. CoRR abs/1507.02786 (2015) - 2014
- [c13]Rui Wu, Ping Chen, Peng Liu, Bing Mao:
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs. DSN 2014: 574-585 - [c12]Wenbiao Ding, Xiao Xing, Ping Chen, Zhi Xin, Bing Mao:
Automatic construction of printable return-oriented programming payload. MALWARE 2014: 18-25 - 2013
- [j1]Ping Chen, Rui Wu, Bing Mao:
JITSafe: a framework against Just-in-time spraying attacks. IET Inf. Secur. 7(4): 283-292 (2013) - 2012
- [c11]Rui Wu, Ping Chen, Bing Mao, Li Xie:
RIM: A Method to Defend from JIT Spraying Attack. ARES 2012: 143-148 - [c10]Ping Chen, Dongyan Xu, Bing Mao:
CloudER: a framework for automatic software vulnerability location and patching in the cloud. AsiaCCS 2012: 50 - [c9]Feifei Wang, Ping Chen, Bing Mao, Li Xie:
RandHyp: Preventing Attacks via Xen Hypercall Interface. SEC 2012: 138-149 - 2011
- [c8]Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin:
Automatic construction of jump-oriented programming shellcode (on the x86). AsiaCCS 2011: 20-29 - [c7]Ping Chen, Yi Fang, Bing Mao, Li Xie:
JITDefender: A Defense against JIT Spraying Attacks. SEC 2011: 142-153 - 2010
- [c6]Ping Chen, Xiao Xing, Bing Mao, Li Xie:
Return-Oriented Rootkit without Returns (on the x86). ICICS 2010: 340-354 - [c5]Ping Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie:
Efficient Detection of the Return-Oriented Programming Malicious Code. ICISS 2010: 140-155
2000 – 2009
- 2009
- [c4]Ping Chen, Yi Wang, Zhi Xin, Bing Mao, Li Xie:
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. ARES 2009: 208-215 - [c3]Yi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie:
Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. ARES 2009: 349-354 - [c2]Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. ICICS 2009: 336-345 - [c1]Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
DROP: Detecting Return-Oriented Programming Malicious Code. ICISS 2009: 163-177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint