共 50 条
- [3] A-R Exploit: An Automatic ROP Exploit Based On Long Sequence 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 50 - 56
- [4] Revery: From Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation) PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1914 - 1927
- [5] Towards Naturalistic Voice Conversion: NaturalVoices Dataset with an Automatic Processing Pipeline INTERSPEECH 2024, 2024, : 4358 - 4362
- [6] SAEG: Stateful Automatic Exploit Generation COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 127 - 145
- [7] Towards an Automatic Q&A Generation for Online Courses - A Pipeline Based Approach ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2019, PT II, 2019, 11626 : 237 - 241
- [8] Automatic Exploit Generation for Buffer Overflow Vulnerabilities 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 463 - 468
- [9] Automatic Polymorphic Exploit Generation for Software Vulnerabilities SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 216 - +
- [10] AUTOMATIC PIPELINE SELECTION HIGH PERFORMANCE SYSTEMS-THE MAGAZINE FOR TECHNOLOGY CHAMPIONS, 1989, 10 (03): : 68 - &