Kang Li
University of Georgia
H-index: 31
North America-United States
Top articles of Kang Li
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Whistleblower: A system-level empirical study on rowhammer | IEEE Transactions on Computers | Wei He Zhi Zhang Yueqiang Cheng Wenhao Wang Wei Song | 2023/1/10 |
{SoftTRR}: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh | Zhi Zhang Yueqiang Cheng Minghua Wang Wei He Wenhao Wang | 2022 | |
Implicit hammer: Cross-privilege-boundary rowhammer through implicit accesses | IEEE Transactions on Dependable and Secure Computing | Zhi Zhang Wei He Yueqiang Cheng Wenhao Wang Yansong Gao | 2022/10/14 |
SimLane: A Risk-Orientated Benchmark for Lane Detection | Xinyang Zhang Zhisheng Hu Shengjian Guo Zhenyu Zhong Kang Li | 2022/6/27 | |
GREBE: Unveiling exploitation potential for Linux kernel bugs | Zhenpeng Lin Yueqi Chen Yuhang Wu Dongliang Mu Chensheng Yu | 2022/5/22 | |
Sok: On the semantic ai security in autonomous driving | arXiv preprint arXiv:2203.05314 | Junjie Shen Ningfei Wang Ziwen Wan Yunpeng Luo Takami Sato | 2022/3/10 |
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization | Mengyuan Li Yinqian Zhang Huibo Wang Kang Li Yueqiang Cheng | 2021/12/6 | |
BitMine: An end-to-end tool for detecting rowhammer vulnerability | IEEE Transactions on Information Forensics and Security | Zhi Zhang Wei He Yueqiang Cheng Wenhao Wang Yansong Gao | 2021/11/13 |
Coverage-based scene fuzzing for virtual autonomous driving testing | arXiv preprint arXiv:2106.00873 | Zhisheng Hu Shengjian Guo Zhenyu Zhong Kang Li | 2021/6/2 |
Detecting localized adversarial examples: A generic approach using critical region analysis | Fengting Li Xuankai Liu Xiaoli Zhang Qi Li Kun Sun | 2021/5/10 | |
{CIPHERLEAKS}: Breaking Constant-time Cryptography on {AMD}{SEV} via the Ciphertext Side Channel | Mengyuan Li Yinqian Zhang Huibo Wang Kang Li Yueqiang Cheng | 2021 | |
Path sensitive fuzzing for native applications | IEEE Transactions on Dependable and Secure Computing | Shuitao Gan Chao Zhang Xiaojun Qin Xuwen Tu Kang Li | 2020/9/29 |
Scaling camouflage: Content disguising attack against computer vision applications | IEEE Transactions on Dependable and Secure Computing | Yufei Chen Chao Shen Cong Wang Qixue Xiao Kang Li | 2020/2/4 |