Dinghao Wu, Ph.D. - Publications

Affiliations: 
2005 Princeton University, Princeton, NJ 
Area:
Software verification, computer security, programming languages, compilers.

8 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Li M, Wang P, Wang W, Wang S, Wu D, Liu J, Xue R, Huo W, Zou W. Large-scale Third-party Library Detection in Android Markets Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2018.2872958  0.369
2020 Tian D, Zeng Q, Wu D, Liu P, Hu C. Semi-synchronized Non-blocking Concurrent Kernel Cruising Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2020.2970183  0.317
2019 Ma H, Jia C, Li S, Zheng W, Wu D. Xmark: Dynamic Software Watermarking Using Collatz Conjecture Ieee Transactions On Information Forensics and Security. 14: 2859-2874. DOI: 10.1109/Tifs.2019.2908071  0.346
2017 Luo L, Ming J, Wu D, Liu P, Zhu S. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection Ieee Transactions On Software Engineering. 43: 1157-1177. DOI: 10.1109/Tse.2017.2655046  0.374
2016 Ming J, Zhang F, Wu D, Liu P, Zhu S. Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection Ieee Transactions On Reliability. 65: 1647-1664. DOI: 10.1109/Tr.2016.2570554  0.337
2016 Ming J, Xu D, Wu D. MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization Journal of Computer Virology and Hacking Techniques. 1-12. DOI: 10.1007/S11416-016-0279-X  0.37
2015 Jhi YC, Jia X, Wang X, Zhu S, Liu P, Wu D. Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection Ieee Transactions On Software Engineering. 41: 925-943. DOI: 10.1109/Tse.2015.2418777  0.374
2012 Kong D, Tian D, Pan Q, Liu P, Wu D. Semantic aware attribution analysis of remote exploits Security and Communication Networks. 6: 818-832. DOI: 10.1002/Sec.613  0.355
Show low-probability matches.