Yapeng Ye
Yapeng Ye
Dirección de correo verificada de - Página principal
Citado por
Citado por
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces
Y Ye, Z Zhang, F Wang, X Zhang, D Xu
2021 Annual Network and Distributed System Security Symposium (NDSS), 2021
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary
Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021
Fvrc2016: The 2nd finger vein recognition competition
Y Ye, L Ni, H Zheng, S Liu, Y Zhu, D Zhang, W Xiang, W Li
2016 International Conference on Biometrics (ICB), 1-6, 2016
Effects of meteorological factors on finger vein recognition
Z He, Q Xu, Y Ye, W Li
2017 IEEE International Conference on Identity, Security and Behavior …, 2017
A Study on the Individuality of Finger Vein Based on Statistical Analysis
Y Ye, H Zheng, L Ni, S Liu, W Li
2016 International Conference on Biometrics (ICB), 1-5, 2016
Parameter adjustment of finger vein recognition algorithms
H Zheng, Y Ye, S Liu, L Ni, Z Yi, H Huang, W Li
2017 IEEE International Conference on Identity, Security and Behavior …, 2017
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling
Y Ye, Z Zhang, Q Shi, Y Aafer, X Zhang
2023 IEEE Symposium on Security and Privacy (SP), 2391-2408, 2023
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis
X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang
arXiv preprint arXiv:2306.02546, 2023
Which finger is the best for finger vein recognition?
H Zheng, Y Ye, L Ni, S Liu, W Li
2016 IEEE 8th International Conference on Biometrics Theory, Applications …, 2016
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications
Q Shi, J Shao, Y Ye, M Zheng, X Zhang
arXiv preprint arXiv:2305.11781, 2023
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
Pelican: Exploiting backdoors of naturally trained deep learning models in binary code analysis
Z Zhang, G Tao, G Shen, S An, Q Xu, Y Liu, Y Ye, Y Wu, X Zhang
USENIX Security Symposium, 2023, 2023
FuzzInMem: Fuzzing Programs via In-memory Structures
X Liu, W You, Y Ye, Z Zhang, J Huang, X Zhang
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
Z Su, X Xu, Z Huang, Z Zhang, Y Ye, J Huang, X Zhang
arXiv preprint arXiv:2402.11842, 2024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–15