Dinghao Wu

    • Source: Scopus
    • Calculated based on no. of publications stored in Pure and citations from Scopus
    1995 …2021

    Research activity per year

    If you made any changes in Pure these will be visible here soon.
    Filter
    Conference contribution

    Search results

    • 2021

      Enhancing Robustness of Graph Convolutional Networks via Dropping Graph Connections

      Chen, L., Li, X. & Wu, D., 2021, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2020, Proceedings. Hutter, F., Kersting, K., Lijffijt, J. & Valera, I. (eds.). Springer Science and Business Media Deutschland GmbH, p. 412-428 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12459 LNAI).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2020

      Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries

      Wang, P., Zhang, J., Wang, S. & Wu, D., Sep 2020, Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-16 16 p. 9230354. (Proceedings - 5th IEEE European Symposium on Security and Privacy, Euro S and P 2020).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback

      Zhong, R., Chen, Y., Hu, H., Zhang, H., Lee, W. & Wu, D., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 955-970 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      7 Scopus citations
    • Unexpected data dependency creation and chaining: A new attack to SDN

      Xiao, F., Zhang, J., Huang, J., Gu, G., Wu, D. & Liu, P., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 1512-1526 15 p. 9152642. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • 2019

      A lightweight framework for regular expression verification

      Liu, X., Jiang, Y. & Wu, D., Mar 22 2019, Proceedings - 19th IEEE International Symposium on High Assurance Systems Engineering, HASE 2019. Nguyen, V., Jiang, C. & Yu, D. (eds.). IEEE Computer Society, p. 1-8 8 p. 8673038. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering; vol. 2019-January).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • Automatic grading of programming assignments: An approach based on formal semantics

      Liu, X., Wang, S., Wang, P. & Wu, D., May 2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET 2019. Institute of Electrical and Electronics Engineers Inc., p. 126-137 12 p. 8802114. (Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training, ICSE-SEET 2019).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations
    • DeepFuzz: Automatic generation of syntax valid C programs for fuzz testing

      Liu, X., Li, X., Prajapati, R. & Wu, D., 2019, 33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Innovative Applications of Artificial Intelligence Conference, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019. AAAI press, p. 1044-1051 8 p. (33rd AAAI Conference on Artificial Intelligence, AAAI 2019, 31st Innovative Applications of Artificial Intelligence Conference, IAAI 2019 and the 9th AAAI Symposium on Educational Advances in Artificial Intelligence, EAAI 2019).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      14 Scopus citations
    • Identifying cache-based side channels through secret-augmented abstract interpretation

      Wang, S., Bao, Y., Liu, X., Wang, P., Zhang, D. & Wu, D., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 657-674 18 p. (Proceedings of the 28th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      9 Scopus citations
    • MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus

      Wang, L., Xu, D., Ming, J., Fu, Y. & Wu, D., Nov 15 2019, SPRO 2019 - Proceedings of the 3rd ACM Workshop on Software Protection. Association for Computing Machinery, Inc, p. 15-26 12 p. (SPRO 2019 - Proceedings of the 3rd ACM Workshop on Software Protection).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • 2018

      Automated Synthesis of Access Control Lists

      Liu, X., Holden, B. & Wu, D., Jun 21 2018, Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017. Institute of Electrical and Electronics Engineers Inc., p. 104-109 6 p. (Proceedings - 2017 International Conference on Software Security and Assurance, ICSSA 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • Lambda obfuscation

      Lan, P., Wang, P., Wang, S. & Wu, D., 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 206-224 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • Protecting million-user iOS apps with obfuscation: Motivations, pitfalls, and experience

      Wang, P., Wu, D., Chen, Z. & Wei, T., May 27 2018, Proceedings 2018 ACM/IEEE 40th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP 2018. IEEE Computer Society, p. 235-244 10 p. (Proceedings - International Conference on Software Engineering).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • RedDroid: Android Application Redundancy Customization Based on Static Analysis

      Jiang, Y., Bao, Q., Wang, S., Liu, X. & Wu, D., Nov 16 2018, Proceedings - 29th IEEE International Symposium on Software Reliability Engineering, ISSRE 2018. Ghosh, S., Cukic, B., Poston, R., Natella, R. & Laranjeiro, N. (eds.). IEEE Computer Society, p. 189-199 11 p. 8539081. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2018-October).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      13 Scopus citations
    • SecControl: Bridging the gap between security tools and SDN controllers

      Wang, L. & Wu, D., 2018, Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Proceedings. Ghorbani, A., Ren, K., Zhu, S., Zhang, A. & Lin, X. (eds.). Springer Verlag, p. 11-31 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 239).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Turing obfuscation

      Wang, Y., Wang, S., Wang, P. & Wu, D., 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 225-244 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • VMhunt: A verifiable approach to partially-virtualized binary code simplification

      Xu, D., Ming, J., Fu, Y. & Wu, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 442-458 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      24 Scopus citations
    • 2017

      Adaptive unpacking of android apps

      Xue, L., Luo, X., Yu, L., Wang, S. & Wu, D., Jul 19 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 358-369 12 p. 7985676. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      52 Scopus citations
    • Binary code retrofiting and hardening using SGX

      Wang, S., Wang, W., Bao, Q., Wang, P., Wang, X. F. & Wu, D., Nov 3 2017, FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 43-49 7 p. (FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations
    • BinSIM: Trace-based semantic binary diffing via system call sliced segment equivalence checking

      Ming, J., Xu, D., Jiang, Y. & Wu, D., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 253-270 18 p. (Proceedings of the 26th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • BinSIM: Trace-based semantic binary diffing via system call sliced segment equivalence checking

      Ming, J., Xu, D., Jiang, Y. & Wu, D., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 253-270 18 p. (Proceedings of the 26th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      34 Scopus citations
    • Cached: Identifying cache-based timing channels in production software

      Wang, S., Wang, P., Liu, X., Zhang, D. & Wu, D., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 235-252 18 p. (Proceedings of the 26th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      49 Scopus citations
    • Cached: Identifying cache-based timing channels in production software

      Wang, S., Wang, P., Liu, X., Zhang, D. & Wu, D., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 235-252 18 p. (Proceedings of the 26th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Composite software diversification

      Wang, S., Wang, P. & Wu, D., Nov 2 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Institute of Electrical and Electronics Engineers Inc., p. 284-294 11 p. 8094429. (Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations
    • Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping

      Xu, D., Ming, J. & Wu, D., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 921-937 17 p. 7958617. (Proceedings - IEEE Symposium on Security and Privacy).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      40 Scopus citations
    • FEAST 2017: The secondworkshop on forming an ecosystem around software transformation

      Kim, T. & Wu, D., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2633-2634 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • In-memory fuzzing for binary code similarity analysis

      Wang, S. & Wu, D., Nov 20 2017, ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering. Nguyen, T. N., Rosu, G. & Di Penta, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-330 12 p. 8115645. (ASE 2017 - Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      14 Scopus citations
    • LibD: Scalable and precise third-party library detection in android markets

      Li, M., Wang, W., Wang, P., Wang, S., Wu, D., Liu, J., Xue, R. & Huo, W., Jul 19 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 335-346 12 p. 7985674. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      77 Scopus citations
    • Semantics-aware machine learning for function recognition in binary code

      Wang, S., Wang, P. & Wu, D., Nov 2 2017, Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017. Institute of Electrical and Electronics Engineers Inc., p. 388-398 11 p. 8094438. (Proceedings - 2017 IEEE International Conference on Software Maintenance and Evolution, ICSME 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      8 Scopus citations
    • 2016

      BinCFP: Efficient multi-threaded binary code control flow profiling

      Ming, J. & Wu, D., Dec 12 2016, Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016. Institute of Electrical and Electronics Engineers Inc., p. 61-66 6 p. 7781797. (Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods

      Jiang, Y., Zhang, C., Wu, D. & Liu, P., Mar 1 2016, Proceedings - 17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016. Babiceanu, R., Waeselynck, H., Xu, J., Paul, R. A. & Cukic, B. (eds.). IEEE Computer Society, p. 122-131 10 p. 7423143. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering; vol. 2016-March).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      17 Scopus citations
    • Generalized dynamic opaque predicates: A new control flow obfuscation method

      Xu, D., Ming, J. & Wu, D., 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      19 Scopus citations
    • ICruiser: Protecting Kernel Link-Based Data Structures with Secure Canary

      Li, W., Wu, D. & Liu, P., Sep 21 2016, Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016. Institute of Electrical and Electronics Engineers Inc., p. 31-38 8 p. 7573721. (Proceedings - 2016 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • JRed: Program Customization and Bloatware Mitigation Based on Static Analysis

      Jiang, Y., Wu, D. & Liu, P., Aug 24 2016, Proceedings - 2016 IEEE 40th Annual Computer Software and Applications Conference, COMPSAC 2016. Claycomb, W., Milojicic, D., Liu, L., Matskin, M., Zhang, Z., Reisman, S., Sato, H., Zhang, Z. & Ahamed, S. I. (eds.). IEEE Computer Society, p. 12-21 10 p. 7551989. (Proceedings - International Computer Software and Applications Conference; vol. 1).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      33 Scopus citations
    • Moving target defense against network reconnaissance with softwaredefined networking

      Wang, L. & Wu, D., 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9866 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      12 Scopus citations
    • Program-object level data flow analysis with applications to data leakage and contamination forensics

      Xiao, G., Wang, J., Liu, P., Ming, J. & Wu, D., Mar 9 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 277-284 8 p. (CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • Repackage-proofing android apps

      Luo, L., Fu, Y., Wu, D., Zhu, S. & Liu, P., Sep 29 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 550-561 12 p. 7579771. (Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      13 Scopus citations
    • StraightTaint: Decoupled offline symbolic taint analysis

      Ming, J., Wu, D., Wang, J., Xiao, G. & Liu, P., Aug 25 2016, ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering. Khurshid, S., Lo, D. & Apel, S. (eds.). Association for Computing Machinery, Inc, p. 308-319 12 p. (ASE 2016 - Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      29 Scopus citations
    • Translingual obfuscation

      Wang, P., Wang, S., Ming, J., Jiang, Y. & Wu, D., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 128-144 17 p. 7467351. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations
    • 2015

      A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)

      Jiang, Y., Zhang, C., Wu, D. & Liu, P., Nov 6 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., p. 184-185 2 p. 7322142. (Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      5 Scopus citations
    • LOOP: Logic-oriented opaque predicate detection in obfuscated binary code

      Ming, J., Xu, D., Wang, L. & Wu, D., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 757-768 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      36 Scopus citations
    • Memoized semantics-based binary diffing with application to malware lineage inference

      Ming, J., Xu, D. & Wu, D., 2015, ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Proceedings. Federrath, H. & Gollmann, D. (eds.). Springer New York LLC, p. 416-430 15 p. (IFIP Advances in Information and Communication Technology; vol. 455).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      12 Scopus citations
    • Reassembleable disassembling

      Wang, S., Wang, P. & Wu, D., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 627-642 16 p. (Proceedings of the 24th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      59 Scopus citations
    • Reassembleable disassembling

      Wang, S., Wang, P. & Wu, D., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 627-642 16 p. (Proceedings of the 24th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Replacement attacks: Automatically impeding behavior-based malware specifications

      Ming, J., Xin, Z., Lan, P., Wu, D., Liu, P. & Mao, B., 2015, Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, Revised Selected Papers. Malkin, T., Lewko, A. B., Kolesnikov, V. & Polychronakis, M. (eds.). Springer Verlag, p. 497-517 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9092).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations
    • Risk Assessment of Buffer 'Heartbleed' Over-Read Vulnerabilities

      Wang, J., Zhao, M., Zeng, Q., Wu, D. & Liu, P., Sep 14 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015. IEEE Computer Society, p. 555-562 8 p. 7266882. (Proceedings of the International Conference on Dependable Systems and Networks; vol. 2015-September).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      13 Scopus citations
    • TaintPipe: Pipelined symbolic taint analysis

      Ming, J., Wu, D., Xiao, G., Wang, J. & Liu, P., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 65-80 16 p. (Proceedings of the 24th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      38 Scopus citations
    • TaintPipe: Pipelined symbolic taint analysis

      Ming, J., Wu, D., Xiao, G., Wang, J. & Liu, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 65-80 16 p. (Proceedings of the 24th USENIX Security Symposium).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Uncovering the dilemmas on antivirus software design in modern mobile platforms

      Huang, H., Chen, K., Liu, P., Zhu, S. & Wu, D., Jan 1 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 359-366 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • 2014

      A framework for integrating change management with building information modeling

      Liu, F., Jallow, A. K., Anumba, C. J. & Wu, D., 2014, Computing in Civil and Building Engineering - Proceedings of the 2014 International Conference on Computing in Civil and Building Engineering. Issa, R. R. & Flood, I. (eds.). American Society of Civil Engineers (ASCE), p. 439-446 8 p. (Computing in Civil and Building Engineering - Proceedings of the 2014 International Conference on Computing in Civil and Building Engineering).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      11 Scopus citations
    • PiE: Programming in Eliza

      Liu, X. & Wu, D., 2014, ASE 2014 - Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. Association for Computing Machinery, Inc, p. 695-700 6 p. (ASE 2014 - Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      3 Scopus citations