Follow
Shu Wang
Shu Wang
Palo Alto Networks, Inc.
Verified email at paloaltonetworks.com - Homepage
Title
Cited by
Cited by
Year
PatchDB: A Large-Scale Security Patch Dataset
X Wang, S Wang, P Feng, K Sun, S Jajodia
IEEE DSN 2021 - 51st Annual IEEE/IFIP International Conference on Dependable …, 2021
442021
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition
S Wang, J Cao, X He, K Sun, Q Li
ACM CCS 2020 - ACM SIGSAC Conference on Computer and Communications Security …, 2020
352020
A Machine Learning Approach to Classify Security Patches into Vulnerability Types
X Wang, S Wang, K Sun, A Batcheller, S Jajodia
IEEE CNS 2020 - IEEE Conference on Communications and Network Security (CNS …, 2020
292020
Enhancing Malware Analysis Sandboxes with Emulated User Behavior
S Liu, P Feng, S Wang, K Sun, J Cao
Computers & Security 115, 102613, 2022
232022
PatchRNN: A Deep Learning-Based System for Security Patch Identification
X Wang, S Wang, P Feng, K Sun, S Jajodia, S Benchaaboun, F Geck
IEEE MILCOM 2021 - IEEE Military Communications Conference (MILCOM), 595-600, 2021
232021
Vehicle Type Classification via Adaptive Feature Clustering for Traffic Surveillance Video
S Wang, F Liu, Z Gan, Z Cui
WCSP 2016 - 8th International Conference on Wireless Communications & Signal …, 2016
182016
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics
S Wang, X Wang, K Sun, S Jajodia, H Wang, Q Li
IEEE S&P 2023 - IEEE Symposium on Security and Privacy (S&P), 604-621, 2023
172023
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems
S Wang, J Cao, K Sun, Q Li
RAID 2020 - 23rd International Symposium on Research in Attacks, Intrusions …, 2020
172020
BinProv: Binary Code Provenance Identification without Disassembly
X He, S Wang, Y Xing, P Feng, H Wang, Q Li, S Chen, K Sun
RAID 2022 - 25th International Symposium on Research in Attacks, Intrusions …, 2022
102022
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
S Wang, K Sun, Q Li
NDSS 2024 - Network and Distributed System Security Symposium (NDSS) 2024, 2024
12024
Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation
S Liu, S Wang, K Sun
IEEE DSN 2023 - 53rd Annual IEEE/IFIP International Conference on Dependable …, 2023
12023
Securing Voice Processing Systems from Malicious Audio Attacks
S Wang
George Mason University, 2023
12023
Exploring Security Commits in Python
S Sun, S Wang, X Wang, Y Xing, E Zhang, K Sun
IEEE ICSME 2023 - 39th IEEE International Conference on Software Maintenance …, 2023
12023
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks
X He, J Cao, S Wang, K Sun, L Xu, Q Li
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (INFOCOM …, 2022
12022
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning
X He, S Wang, P Feng, X Wang, S Sun, Q Li, K Sun
ACM AsiaCCS 2024 - ACM ASIA Conference on Computer and Communications …, 2024
2024
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
Y Xing, S Wang, S Sun, X He, K Sun, Q Li
USENIX Security 2024 - the 33rd USENIX Security Symposium, 1-16, 2024
2024
Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos
S Liu, S Wang, K Sun
Proceedings of the ACM on Human-Computer Interaction, Volume 8, Issue EICS, 2024, 2024
2024
Modulated Audio Replay Attack and Dual-Domain Defense
K Sun, S Wang
Secure Voice Processing Systems against Malicious Voice Attacks, 13-46, 2023
2023
Secure Voice Processing Systems for Driverless Vehicles
K Sun, S Wang
Secure Voice Processing Systems against Malicious Voice Attacks, 47-71, 2023
2023
Acoustic Compensation System Against Adversarial Voice Recognition
K Sun, S Wang
Secure Voice Processing Systems against Malicious Voice Attacks, 73-107, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20