Follow
Li Wang
Li Wang
Fontbonne University
Verified email at fontbonne.edu
Title
Cited by
Cited by
Year
Loop: Logic-oriented opaque predicate detection in obfuscated binary code
J Ming, D Xu, L Wang, D Wu
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1042015
Software protection on the go: A large-scale empirical study on mobile app obfuscation
P Wang, Q Bao, L Wang, S Wang, Z Chen, T Wei, D Wu
Proceedings of the 40th International Conference on Software Engineering, 26-36, 2018
322018
Moving target defense against network reconnaissance with software defined networking
L Wang, D Wu
Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016
312016
V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment leveraging Physically Unclonable Functions
AG Reddy, PR Babu, V Odelu, L Wang, SAP Kumar
IEEE Transactions on Industrial Cyber-Physical Systems, 2023
92023
MetaHunt: Towards taming malware mutation via studying the evolution of metamorphic virus
L Wang, D Xu, J Ming, Y Fu, D Wu
Proceedings of the 3rd ACM Workshop on Software Protection, 15-26, 2019
82019
Bridging the gap between security tools and SDN controllers
L Wang, D Wu
EAI Endorsed Transactions on Security and Safety, 2018
82018
Shoal: A network level moving target defense engine with software defined networking
L Wang
EAI Endorsed Transactions on Security and Safety 7 (25), e5-e5, 2021
42021
Seccontrol: Bridging the gap between security tools and sdn controllers
L Wang, D Wu
Security and Privacy in Communication Networks: SecureComm 2017 …, 2018
42018
iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary
W Li, D Wu, P Liu
2016 IEEE International Conference on Software Quality, Reliability and …, 2016
42016
Reducing attack surface with vm-based phantom server
L Wang, Z Wang, K Sun, S Jajodia
MILCOM 2013-2013 IEEE Military Communications Conference, 1429-1435, 2013
42013
Towards a Source-Code Oriented Attestation
A Ruan, Q Shen, L Wang, Q Chao, L Gu, Z Chen
CHINA COMMUNICATIONS 6 (No.4), 82-87, 2009
12009
Towards Network Level Moving Target Defense with Software Defined Networking
L Wang
The Pennsylvania State University, 2021
2021
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
A Ruan, Q Shen, L Gu, L Wang, L Shi, Y Yang, Z Chen
The 11th International Conference on Information and Communications Security …, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–13