default search action
Pei Wang 0007
Person information
- affiliation: Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
Other persons with the same name
- Pei Wang — disambiguation page
- Pei Wang 0001 — University of Arkansas at Little Rock, Little Rock, AR, USA
- Pei Wang 0002 — Temple University, Phoenixville, PA, USA
- Pei Wang 0003 — University of Electronic Science and Technology of China, School of Electronic Engineering, Chengdu, China
- Pei Wang 0004 — Henan University, School of Mathematics and Statistics, Kaifeng, China (and 2 more)
- Pei Wang 0005 — Guangdong University of Foreign Studies, School of Business, Guangzhou, China (and 1 more)
- Pei Wang 0006 — Yulin Normal University, Department of Guangxi Education, Key Laboratory of Complex System Optimization and Big Data Processing, China
- Pei Wang 0008 — Jiangsu University, Institute of Agricultural Engineering, Zhenjiang, China (and 1 more)
- Pei Wang 0009 — Beijing Normal University, China (and 1 more)
- Pei Wang 0010 — Wuhan University, School of Information Management, China
- Pei Wang 0011 — Northwestern Polytechnical University, School of Astronautics, National Key Laboratory of Aerospace Flight Dynamics, Xi'an, China
- Pei Wang 0012 — Chinese Academy of Science, Institute of Electronics, Department of Space Microwave Remote Sensing System, Beijing, China
Other persons with a similar name
- Jingpei Wang (aka: Jing-pei Wang) — disambiguation page
- Patrick Shen-Pei Wang (aka: Patrick S. P. Wang, Patrick Wang 0004) — Northeastern University, Boston, MA, USA (and 1 more)
- Pei-Hsin Wang
- Pei-Hua Wang
- Pei-Pei Wang
- Pei-Wen Wang
- Pei-Ying Wang
- Pei-Yu Wang
- Pei-Zhuang Wang
- Pei-hong Wang
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c19]Jinquan Zhang, Pei Wang, Dinghao Wu:
LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library. ENASE 2023: 283-292 - [c18]Zihao Wang, Pei Wang, Qinkun Bao, Dinghao Wu:
Source Code Implied Language Structure Abstraction through Backward Taint Analysis. ICSOFT 2023: 564-571 - 2021
- [c17]Shixiong Jing, Qinkun Bao, Pei Wang, Xulong Tang, Dinghao Wu:
Characterizing AI Model Inference Applications Running in the SGX Environment. NAS 2021: 1-4 - 2020
- [j2]Menghao Li, Pei Wang, Wei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo, Wei Zou:
Large-Scale Third-Party Library Detection in Android Markets. IEEE Trans. Software Eng. 46(9): 981-1003 (2020) - [c16]Pei Wang, Jinquan Zhang, Shuai Wang, Dinghao Wu:
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries. EuroS&P 2020: 1-16
2010 – 2019
- 2019
- [j1]Pei Wang, Dinghao Wu, Zhaofeng Chen, Tao Wei:
Field experience with obfuscating million-user iOS apps in large enterprise mobile development. Softw. Pract. Exp. 49(2): 252-273 (2019) - [c15]Xiao Liu, Shuai Wang, Pei Wang, Dinghao Wu:
Automatic grading of programming assignments: an approach based on formal semantics. ICSE (SEET) 2019: 126-137 - [c14]Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. USENIX Security Symposium 2019: 657-674 - [i2]Shuai Wang, Yuyan Bao, Xiao Liu, Pei Wang, Danfeng Zhang, Dinghao Wu:
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation. CoRR abs/1905.13332 (2019) - 2018
- [c13]Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, Dinghao Wu:
Software protection on the go: a large-scale empirical study on mobile app obfuscation. ICSE 2018: 26-36 - [c12]Pei Wang, Dinghao Wu, Zhaofeng Chen, Tao Wei:
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience. ICSE (SEIP) 2018: 235-244 - 2017
- [c11]Shuai Wang, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, Dinghao Wu:
Binary Code Retrofitting and Hardening Using SGX. FEAST@CCS 2017: 43-49 - [c10]Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo:
LibD: scalable and precise third-party library detection in android markets. ICSE 2017: 335-346 - [c9]Shuai Wang, Pei Wang, Dinghao Wu:
Composite Software Diversification. ICSME 2017: 284-294 - [c8]Shuai Wang, Pei Wang, Dinghao Wu:
Semantics-Aware Machine Learning for Function Recognition in Binary Code. ICSME 2017: 388-398 - [c7]Pengwei Lan, Pei Wang, Shuai Wang, Dinghao Wu:
Lambda Obfuscation. SecureComm 2017: 206-224 - [c6]Yan Wang, Shuai Wang, Pei Wang, Dinghao Wu:
Turing Obfuscation. SecureComm 2017: 225-244 - [c5]Shuai Wang, Pei Wang, Xiao Liu, Danfeng Zhang, Dinghao Wu:
CacheD: Identifying Cache-Based Timing Channels in Production Software. USENIX Security Symposium 2017: 235-252 - 2016
- [c4]Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu:
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. CCS 2016: 529-540 - [c3]Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. EuroS&P 2016: 128-144 - [c2]Shuai Wang, Pei Wang, Dinghao Wu:
UROBOROS: Instrumenting Stripped Binaries with Static Reassembling. SANER 2016: 236-247 - [i1]Pei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu:
Translingual Obfuscation. CoRR abs/1601.00763 (2016) - 2015
- [c1]Shuai Wang, Pei Wang, Dinghao Wu:
Reassembleable Disassembling. USENIX Security Symposium 2015: 627-642
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 20:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint