


Остановите войну!
for scientists:


default search action
Dinghao Wu
Person information

- affiliation: Penn State University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c86]Jinquan Zhang, Pei Wang, Dinghao Wu:
LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library. ENASE 2023: 283-292 - [c85]Songtao Liu, Zhengkai Tu, Minkai Xu, Zuobai Zhang, Lu Lin, Rex Ying, Jian Tang, Peilin Zhao, Dinghao Wu:
FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning. ICML 2023: 22028-22041 - [c84]Hangfan Zhang, Jinghui Chen, Lu Lin, Jinyuan Jia, Dinghao Wu:
Graph Contrastive Backdoor Attacks. ICML 2023: 40888-40910 - [c83]Zihao Wang, Pei Wang, Qinkun Bao, Dinghao Wu:
Source Code Implied Language Structure Abstraction through Backward Taint Analysis. ICSOFT 2023: 564-571 - [c82]Quan Li, Lingwei Chen, Yong Cai, Dinghao Wu:
Hierarchical Graph Neural Network for Patient Treatment Preference Prediction with External Knowledge. PAKDD (3) 2023: 204-215 - [c81]Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee:
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture. USENIX Security Symposium 2023 - [c80]Quan Li
, Lingwei Chen
, Shixiong Jing
, Dinghao Wu
:
Knowledge Distillation on Cross-Modal Adversarial Reprogramming for Data-Limited Attribute Inference. WWW (Companion Volume) 2023: 65-68 - [i9]Xiaoting Li, Lingwei Chen, Dinghao Wu:
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy. CoRR abs/2306.02488 (2023) - 2022
- [j18]Donghai Tian
, Qiang Zeng, Dinghao Wu
, Peng Liu
, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - [j17]Michael G. Kallitsis
, Rupesh Prajapati, Vasant G. Honavar
, Dinghao Wu, John Yen:
Detecting and Interpreting Changes in Scanning Behavior in Large Network Telescopes. IEEE Trans. Inf. Forensics Secur. 17: 3611-3625 (2022) - [j16]Lei Xue
, Hao Zhou, Xiapu Luo
, Le Yu
, Dinghao Wu
, Yajin Zhou
, Xiaobo Ma
:
PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Trans. Software Eng. 48(2): 551-570 (2022) - [c79]Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu:
ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing. AAAI 2022: 12559-12565 - [c78]Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu:
FuzzBoost: Reinforcement Compiler Fuzzing. ICICS 2022: 359-375 - [c77]Songtao Liu, Rex Ying, Hanze Dong, Lanqing Li, Tingyang Xu, Yu Rong, Peilin Zhao, Junzhou Huang, Dinghao Wu:
Local Augmentation for Graph Neural Networks. ICML 2022: 14054-14072 - [c76]Lingwei Chen, Xiaoting Li, Dinghao Wu:
Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection. SDM 2022: 693-701 - [c75]Xiaoting Li, Lingwei Chen, Dinghao Wu:
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks. SecureComm 2022: 710-728 - [c74]Quan Li, Xiaoting Li, Lingwei Chen, Dinghao Wu:
Distilling Knowledge on Text Graph for Social Media Attribute Inference. SIGIR 2022: 2024-2028 - [i8]Songtao Liu, Rex Ying, Hanze Dong, Lu Lin, Jinghui Chen, Dinghao Wu:
How Powerful is Implicit Denoising in Graph Neural Networks. CoRR abs/2209.14514 (2022) - [i7]Songtao Liu, Rex Ying, Zuobai Zhang, Peilin Zhao, Jian Tang, Lu Lin, Dinghao Wu:
Metro: Memory-Enhanced Transformer for Retrosynthetic Planning via Reaction Tree. CoRR abs/2209.15315 (2022) - 2021
- [j15]Zhenzhou Tian
, Yaqian Huang
, Borun Xie, Yanping Chen
, Lingwei Chen
, Dinghao Wu
:
Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling. IEEE Access 9: 49160-49175 (2021) - [c73]Rupesh Prajapati, Vasant G. Honavar
, Dinghao Wu, John Yen, Michalis Kallitsis
:
Shedding light into the darknet: scanning characterization and detection of temporal changes. CoNEXT 2021: 469-470 - [c72]Qinkun Bao, Zihao Wang, James R. Larus, Dinghao Wu:
Abacus: A Tool for Precise Side-Channel Analysis. ICSE (Companion Volume) 2021: 238-239 - [c71]Qinkun Bao, Zihao Wang, Xiaoting Li, James R. Larus, Dinghao Wu:
Abacus: Precise Side-Channel Analysis. ICSE 2021: 797-809 - [c70]Xiaoting Li, Lingwei Chen, Jinquan Zhang, James R. Larus, Dinghao Wu:
Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks. IJCNN 2021: 1-8 - [c69]Lei Xue, Yuxiao Yan, Luyi Yan
, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou:
Parema: an unpacking framework for demystifying VM-based Android packers. ISSTA 2021: 152-164 - [c68]Shixiong Jing, Qinkun Bao, Pei Wang, Xulong Tang, Dinghao Wu:
Characterizing AI Model Inference Applications Running in the SGX Environment. NAS 2021: 1-4 - [c67]Xiaoting Li, Lingwei Chen, Dinghao Wu:
Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks. SDM 2021: 208-216 - [c66]Yongheng Chen, Rui Zhong, Hong Hu, Hangfan Zhang, Yupeng Yang, Dinghao Wu, Wenke Lee:
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation. SP 2021: 642-658 - [i6]Michalis Kallitsis, Vasant G. Honavar, Rupesh Prajapati, Dinghao Wu, John Yen:
Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes. CoRR abs/2108.00079 (2021) - [i5]Songtao Liu, Hanze Dong, Lanqing Li, Tingyang Xu, Yu Rong, Peilin Zhao, Junzhou Huang, Dinghao Wu:
Local Augmentation for Graph Neural Networks. CoRR abs/2109.03856 (2021) - 2020
- [j14]Zhenzhou Tian
, Qing Wang
, Cong Gao, Lingwei Chen
, Dinghao Wu
:
Plagiarism Detection of Multi-Threaded Programs via Siamese Neural Networks. IEEE Access 8: 160802-160814 (2020) - [j13]Zhenzhou Tian, Qing Wang, Cong Gao, Lingwei Chen, Dinghao Wu:
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining. Int. J. Softw. Eng. Knowl. Eng. 30(11&12): 1667-1688 (2020) - [j12]Menghao Li
, Pei Wang
, Wei Wang, Shuai Wang
, Dinghao Wu
, Jian Liu
, Rui Xue
, Wei Huo, Wei Zou:
Large-Scale Third-Party Library Detection in Android Markets. IEEE Trans. Software Eng. 46(9): 981-1003 (2020) - [c65]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CCS 2020: 955-970 - [c64]Pei Wang, Jinquan Zhang, Shuai Wang, Dinghao Wu:
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries. EuroS&P 2020: 1-16 - [c63]Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su:
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. NDSS 2020 - [c62]Lingwei Chen, Xiaoting Li, Dinghao Wu:
Enhancing Robustness of Graph Convolutional Networks via Dropping Graph Connections. ECML/PKDD (3) 2020: 412-428 - [c61]Feng Xiao, Jinquan Zhang, Jianwei Huang, Guofei Gu, Dinghao Wu, Peng Liu:
Unexpected Data Dependency Creation and Chaining: A New Attack to SDN. SP 2020: 1512-1526 - [i4]Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu:
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. CoRR abs/2006.02398 (2020)
2010 – 2019
- 2019
- [j11]Li Wang, Dinghao Wu:
Bridging the Gap Between Security Tools and SDN Controllers. EAI Endorsed Trans. Security Safety 5(17): e1 (2019) - [j10]Pei Wang
, Dinghao Wu
, Zhaofeng Chen, Tao Wei:
Field experience with obfuscating million-user iOS apps in large enterprise mobile development. Softw. Pract. Exp. 49(2): 252-273 (2019) - [j9]Haoyu Ma
, Chunfu Jia
, Shijia Li
, Wantong Zheng
, Dinghao Wu
:
Xmark: Dynamic Software Watermarking Using Collatz Conjecture. IEEE Trans. Inf. Forensics Secur. 14(11): 2859-2874 (2019) - [c60]Xiao Liu, Xiaoting Li, Rupesh Prajapati, Dinghao Wu:
DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing. AAAI 2019: 1044-1051 - [c59]Li Wang, Dongpeng Xu
, Jiang Ming, Yu Fu, Dinghao Wu:
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus. SPRO@CCS 2019: 15-26 - [c58]Xiao Liu, Yufei Jiang, Dinghao Wu:
A Lightweight Framework for Regular Expression Verification. HASE 2019: 1-8 - [c57]Xiao Liu, Shuai Wang, Pei Wang, Dinghao Wu:
Automatic grading of programming assignments: an approach based on formal semantics. ICSE (SEET) 2019: 126-137 - [c56]Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. USENIX Security Symposium 2019: 657-674 - [i3]Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. CoRR abs/1905.13332 (2019) - [i2]Songtao Liu, Lingwei Chen, Hanze Dong, Zihao Wang, Dinghao Wu, Zengfeng Huang:
Higher-order Weighted Graph Convolutional Networks. CoRR abs/1911.04129 (2019) - 2018
- [c55]Dongpeng Xu
, Jiang Ming, Yu Fu, Dinghao Wu:
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. CCS 2018: 442-458 - [c54]Pei Wang, Qinkun Bao, Li Wang, Shuai Wang
, Zhaofeng Chen, Tao Wei, Dinghao Wu:
Software protection on the go: a large-scale empirical study on mobile app obfuscation. ICSE 2018: 26-36 - [c53]Pei Wang, Dinghao Wu, Zhaofeng Chen, Tao Wei:
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience. ICSE (SEIP) 2018: 235-244 - [c52]Yufei Jiang, Qinkun Bao, Shuai Wang
, Xiao Liu, Dinghao Wu:
RedDroid: Android Application Redundancy Customization Based on Static Analysis. ISSRE 2018: 189-199 - 2017
- [j8]Lannan Luo, Jiang Ming, Dinghao Wu
, Peng Liu, Sencun Zhu:
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Trans. Software Eng. 43(12): 1157-1177 (2017) - [j7]Jiang Ming, Dongpeng Xu
, Dinghao Wu:
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization. J. Comput. Virol. Hacking Tech. 13(3): 167-178 (2017) - [j6]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Impeding behavior-based malware analysis via replacement attacks to malware specifications. J. Comput. Virol. Hacking Tech. 13(3): 193-207 (2017) - [c51]Shuai Wang
, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, Dinghao Wu:
Binary Code Retrofitting and Hardening Using SGX. FEAST@CCS 2017: 43-49 - [c50]Taesoo Kim, Dinghao Wu:
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation. CCS 2017: 2633-2634 - [c49]Menghao Li, Wei Wang, Pei Wang, Shuai Wang
, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo:
LibD: scalable and precise third-party library detection in android markets. ICSE 2017: 335-346 - [c48]Lei Xue
, Xiapu Luo
, Le Yu, Shuai Wang, Dinghao Wu:
Adaptive unpacking of Android apps. ICSE 2017: 358-369 - [c47]Shuai Wang
, Pei Wang, Dinghao Wu:
Composite Software Diversification. ICSME 2017: 284-294 - [c46]Shuai Wang
, Pei Wang, Dinghao Wu:
Semantics-Aware Machine Learning for Function Recognition in Binary Code. ICSME 2017: 388-398 - [c45]Xiao Liu, Brett Holden, Dinghao Wu:
Automated Synthesis of Access Control Lists. ICSSA 2017: 104-109 - [c44]Shuai Wang
, Dinghao Wu:
In-memory fuzzing for binary code similarity analysis. ASE 2017: 319-330 - [c43]Li Wang, Dinghao Wu:
SecControl: Bridging the Gap Between Security Tools and SDN Controllers. ATCS/SePrIoT@SecureComm 2017: 11-31 - [c42]Pengwei Lan, Pei Wang, Shuai Wang
, Dinghao Wu:
Lambda Obfuscation. SecureComm 2017: 206-224 - [c41]Yan Wang, Shuai Wang
, Pei Wang, Dinghao Wu:
Turing Obfuscation. SecureComm 2017: 225-244 - [c40]Dongpeng Xu
, Jiang Ming, Dinghao Wu:
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping. IEEE Symposium on Security and Privacy 2017: 921-937 - [c39]Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu:
CacheD: Identifying Cache-Based Timing Channels in Production Software. USENIX Security Symposium 2017: 235-252 - [c38]Jiang Ming, Dongpeng Xu
, Yufei Jiang, Dinghao Wu:
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking. USENIX Security Symposium 2017: 253-270 - [e1]Taesoo Kim, Cliff Wang, Dinghao Wu:
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5395-3 [contents] - 2016
- [j5]Xiao Liu, Yufei Jiang, Lawrence Wu, Dinghao Wu:
Natural Shell: An Assistant for End-User Scripting. Int. J. People Oriented Program. 5(1): 1-18 (2016) - [j4]Jiang Ming
, Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection. IEEE Trans. Reliab. 65(4): 1647-1664 (2016) - [c37]Gaoyao Xiao, Jun Wang, Peng Liu, Jiang Ming, Dinghao Wu:
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics. CODASPY 2016: 277-284 - [c36]Yufei Jiang, Dinghao Wu, Peng Liu:
JRed: Program Customization and Bloatware Mitigation Based on Static Analysis. COMPSAC 2016: 12-21 - [c35]Lannan Luo, Yu Fu, Dinghao Wu, Sencun Zhu, Peng Liu:
Repackage-Proofing Android Apps. DSN 2016: 550-561 - [c34]Pei Wang, Shuai Wang
, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. EuroS&P 2016: 128-144 - [c33]Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. HASE 2016: 122-131 - [c32]Li Wang, Dinghao Wu:
Moving Target Defense Against Network Reconnaissance with Software Defined Networking. ISC 2016: 203-217 - [c31]Dongpeng Xu, Jiang Ming, Dinghao Wu:
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method. ISC 2016: 323-342 - [c30]Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, Peng Liu:
StraightTaint: decoupled offline symbolic taint analysis. ASE 2016: 308-319 - [c29]Wang Li, Dinghao Wu, Peng Liu:
iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary. QRS Companion 2016: 31-38 - [c28]Jiang Ming, Dinghao Wu:
BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling. SCAM 2016: 61-66 - [c27]Shuai Wang
, Pei Wang, Dinghao Wu:
UROBOROS: Instrumenting Stripped Binaries with Static Reassembling. SANER 2016: 236-247 - [i1]Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. CoRR abs/1601.00763 (2016) - 2015
- [j3]Yufei Jiang, Nan Yu, Jiang Ming, Sanghoon Lee, Jason DeGraw, John Yen, John I. Messner, Dinghao Wu:
Automatic building information model query generation. J. Inf. Technol. Constr. 20: 518-535 (2015) - [j2]Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, Dinghao Wu:
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Trans. Software Eng. 41(9): 925-943 (2015) - [c26]Jiang Ming, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, Bing Mao:
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. ACNS 2015: 497-517 - [c25]Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu:
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. AsiaCCS 2015: 7-18 - [c24]Jiang Ming, Dongpeng Xu
, Li Wang, Dinghao Wu:
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. CCS 2015: 757-768 - [c23]Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu:
Risk Assessment of Buffer "Heartbleed" Over-Read Vulnerabilities. DSN 2015: 555-562 - [c22]Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract). QRS Companion 2015: 184-185 - [c21]Jiang Ming, Dongpeng Xu, Dinghao Wu:
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. SEC 2015: 416-430 - [c20]Jiang Ming, Dinghao Wu, Gaoyao Xiao, Jun Wang, Peng Liu:
TaintPipe: Pipelined Symbolic Taint Analysis. USENIX Security Symposium 2015: 65-80 - [c19]Shuai Wang, Pei Wang, Dinghao Wu:
Reassembleable Disassembling. USENIX Security Symposium 2015: 627-642 - 2014
- [c18]Fangfang Zhang, Dinghao Wu, Peng Liu, Sencun Zhu:
Program Logic Based Software Plagiarism Detection. ISSRE 2014: 66-77 - [c17]Xiao Liu, Dinghao Wu:
PiE: programming in eliza. ASE 2014: 695-700 - [c16]Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. SecureComm (2) 2014: 359-366 - [c15]Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu:
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection. SIGSOFT FSE 2014: 389-400 - [c14]Fangfang Zhang, Heqing Huang, Sencun Zhu, Dinghao Wu, Peng Liu:
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. WISEC 2014: 25-36 - [p2]Dinghao Wu, John Fulmer, Shannon Johnson:
Teaching Information Security with Virtual Laboratories. Innovative Practices in Teaching Information Sciences and Technology 2014: 179-192 - [p1]Dinghao Wu, Peng Liu, Qiang Zeng, Donghai Tian:
Software Cruising: A New Technology for Building Concurrent Software Monitor. Secure Cloud Computing 2014: 303-324 - 2013
- [j1]Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu:
Semantic aware attribution analysis of remote exploits. Secur. Commun. Networks 6(7): 818-832 (2013) - [c13]Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu:
A Framework for Evaluating Mobile App Repackaging Detection Algorithms. TRUST 2013: 169-186 - 2012
- [c12]Chu Huang, Sencun Zhu, Dinghao Wu:
Towards Trusted Services: Result Verification Schemes for MapReduce. CCGRID 2012: 41-48 - [c11]Fangfang Zhang, Yoon-chan Jhi, Dinghao Wu, Peng Liu, Sencun Zhu:
A first step towards algorithm plagiarism detection. ISSTA 2012: 111-121 - [c10]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. NDSS 2012 - 2011
- [c9]Yoon-chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu:
Value-based program characterization and its application to software plagiarism detection. ICSE 2011: 756-765 - [c8]Cornelia Caragea, Nathan J. McNeese, Anuj R. Jaiswal, Greg Traylor, Hyun-Woo Kim, Prasenjit Mitra, Dinghao Wu, Andrea H. Tapia, C. Lee Giles, Bernard J. Jansen, John Yen:
Classifying text messages for the haiti earthquake. ISCRAM 2011 - [c7]Qiang Zeng, Dinghao Wu, Peng Liu:
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures. PLDI 2011: 367-377 - [c6]Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. SecureComm 2011: 190-208 - [c5]Baojun Qiu, Kang Zhao, Prasenjit Mitra, Dinghao Wu, Cornelia Caragea
, John Yen, Greta E. Greer, Kenneth Portier:
Get Online Support, Feel Better - Sentiment Analysis and Dynamics in an Online Cancer Survivor Community. SocialCom/PASSAT 2011: 274-281
2000 – 2009
- 2004
- [c4]Shaz Qadeer, Dinghao Wu:
KISS: keep it simple and sequential. PLDI 2004: 14-24 - [c3]Gang Tan
, Andrew W. Appel, Kedar N. Swadi, Dinghao Wu:
Construction of a Semantic Model for a Typed Assembly Language. VMCAI 2004: 30-43 - 2003
- [c2]Juan Chen, Dinghao Wu, Andrew W. Appel
, Hai Fang:
A provably sound TAL for back-end optimization. PLDI 2003: 208-219 - [c1]Dinghao Wu, Andrew W. Appel, Aaron Stump:
Foundational proof checkers with small witnesses. PPDP 2003: 264-274