• 20 Citations
  • 2 h-Index
20162019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Dongliang Mu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 3 Similar Profiles
Binary codes Engineering & Materials Science
Data storage equipment Engineering & Materials Science
Data Transformation Mathematics
Reverse engineering Engineering & Materials Science
Computer programming Engineering & Materials Science
Flow control Engineering & Materials Science
Defects Engineering & Materials Science
Feedback Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2016 2019

  • 20 Citations
  • 2 h-Index
  • 6 Conference contribution

Building Adversarial Defense with Non-invertible Data Transformations

Guo, W., Mu, D., Chen, L. & Gai, J., Jan 1 2019, PRICAI 2019: Trends in Artificial Intelligence - 16th Pacific Rim International Conference on Artificial Intelligence, Proceedings. Nayak, A. C. & Sharma, A. (eds.). Springer Verlag, p. 593-606 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11672 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Transformation
Neural Networks
Misclassification
Data Distribution
Dimensionality Reduction

PTrix: Efficient hardware-assisted fuzzing for COTS binary

Chen, Y., Mu, D., Xu, J., Sun, Z., Shen, W., Xing, X., Lu, L. & Mao, B., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 633-645 13 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Hardware
Defects
Program processors
Testing

DiffGuard: Obscuring sensitive information in canary based protections

Zhu, J., Zhou, W., Wang, Z., Mu, D. & Mao, B., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 738-751 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
12 Citations (Scopus)

Lemna: Explaining deep learning based security applications

Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Reverse engineering
Transparency
Image analysis
Learning systems

ROPOB: Obfuscating binary code via return oriented programming

Mu, D., Guo, J., Ding, W., Wang, Z., Mao, B. & Shi, L., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 721-737 17 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Computer programming
Flow control
Reverse engineering
Camouflage