ANVIL: Software-based protection against next-generation rowhammer attacks ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin ACM SIGPLAN Notices 51 (4), 743-755, 2016 | 247 | 2016 |
A new approach for rowhammer attacks R Qiao, M Seaborn 2016 IEEE international symposium on hardware oriented security and trust …, 2016 | 148 | 2016 |
A platform for secure static binary instrumentation M Zhang, R Qiao, N Hasabnis, R Sekar Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on …, 2014 | 104 | 2014 |
NORAX: Enabling execute-only memory for COTS binaries on AArch64 Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ... 2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017 | 64 | 2017 |
Function interface analysis: A principled approach for function recognition in COTS binaries R Qiao, R Sekar 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 58 | 2017 |
A principled approach for rop defense R Qiao, M Zhang, R Sekar Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 37 | 2015 |
Checking correctness of code generator architecture specifications N Hasabnis, R Qiao, R Sekar 2015 IEEE/ACM International Symposium on Code Generation and Optimization …, 2015 | 14 | 2015 |
Effective function recovery for cots binaries using interface verification R Qiao, R Sekar Secure Syst. Lab, 2016 | 12 | 2016 |
Reetuparna Das, Matthew Hicks, Yossi Oren, and Todd M. Austin. ANVIL: software-based protection against next-generation rowhammer attacks ZB Aweke, SF Yitbarek, R Qiao Proceedings of the Twenty-First International Conference on Architectural …, 0 | 5 | |
Accurate Recovery of Functions in COTS Binaries R Qiao State University of New York at Stony Brook, 2017 | 3 | 2017 |
Graph pattern matching through model checking R Qiao, X Zhong, L Zhang, H He 2015 8th International Conference on Database Theory and Application (DTA), 1-5, 2015 | 2 | 2015 |
Surprise simulation using fuzzy logic R Qiao, X Zhong, S Yang, H He Intelligent Computing Theories and Technology: 9th International Conference …, 2013 | 2 | 2013 |
Graph pattern matching: Capturing bisimilar subgraph R Qiao, K Feng, H He, X Zhong International Journal of Pattern Recognition and Artificial Intelligence 35 …, 2021 | 1 | 2021 |
Fuzzy Logic Model of Surprise. R Qiao, Y Feng, X Zhong, Q Liu, H He J. Comput. 9 (11), 2761-2770, 2014 | 1 | 2014 |
Design and implementation of intelligent question and answer electronic dictionary in the context of big data R Qiao, X Zhong 2023 3rd Asia-Pacific Conference on Communications Technology and Computer …, 2023 | | 2023 |
RIPPB: A Robust and Improved PBFT Protocol for Blockchain M Ding, H He, R Qiao, X Zhou 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA …, 2022 | | 2022 |
Problem: code generator bugs N Hasabnis, R Qiao, R Sekar International Symposium on Code Generation and Optimization (CGO), 2015 | | 2015 |
An emotion understanding system R Qiao, H He, J Gu, M Liu, Y Feng, X Zhong The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014 …, 2014 | | 2014 |
Research and Design of Intelligent Library Management System under Big Data Platform Z Chen, Y Zhu, C Chen, X Zhong, R Qiao | | |
DTA 2015 R Qiao, X Zhong, L Zhang, H He | | |