Wenke Lee
Georgia Institute of Technology
H-index: 102
North America-United States
Top articles of Wenke Lee
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Privacy preserving face-based authentication | 2022/11/8 | ||
Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT} | Nissy Sombatruang Tristan Caulfield Ingolf Becker Akira Fujita Takahiro Kasama | 2023 | |
The threat of offensive ai to organizations | Computers & Security | Yisroel Mirsky Ambra Demontis Jaidip Kotak Ram Shankar Deng Gelei | 2023 |
{µFUZZ}: Redesign of Parallel Fuzzing using Microservice Architecture | Yongheng Chen Rui Zhong Yupeng Yang Hong Hu Dinghao Wu | 2023 | |
{PUMM}: Preventing {Use-After-Free} Using Execution Unit Partitioning | Carter Yagemann Simon P Chung Brendan Saltaformaggio Wenke Lee | 2023 | |
Privacy-preserving fuzzy query system and method | 2023/9/14 | ||
{TRIDENT}: Towards Detecting and Mitigating Web-based Social Engineering Attacks | Zheng Yang Joey Allen Matthew Landen Roberto Perdisci Wenke Lee | 2023 | |
{VulChecker}: Graph-based Vulnerability Localization in Source Code | Yisroel Mirsky George Macon Michael Brown Carter Yagemann Matthew Pruett | 2023 | |
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem | Feng Xiao Zheng Yang Joey Allen Guangliang Yang Grant Williams | 2022/11/7 | |
Malware and Attack Technologies Knowledge Area Issue | Wenke Lee | 2021 | |
Devices, systems, and methods of program identification, isolation, and profile attachment | 2021/6/15 | ||
{ARCUS}: symbolic root cause analysis of exploits in production systems | Carter Yagemann Matthew Pruett Simon P Chung Kennon Bittick Brendan Saltaformaggio | 2021 | |
One engine to fuzz’em all: Generic language processor testing with semantic validation | Yongheng Chen Rui Zhong Hong Hu Hangfan Zhang Yupeng Yang | 2021/5/24 | |
Fuzzy labeled private set intersection with applications to private {Real-Time} biometric search | Erkam Uzun Simon P Chung Vladimir Kolesnikov Alexandra Boldyreva Wenke Lee | 2021 | |
Cryptographic key derivation from biometric inferences for remote authentication | Erkam Uzun Carter Yagemann Simon Chung Vladimir Kolesnikov Wenke Lee | 2021/5/24 | |
{DeepReflect}: Discovering malicious functionality through binary reconstruction | Evan Downing Yisroel Mirsky Kyuhong Park Wenke Lee | 2021 | |
SEPAL: Towards a large-scale analysis of SEAndroid policy customization | Dongsong Yu Guangliang Yang Guozhu Meng Xiaorui Gong Xiu Zhang | 2021/4/19 | |
Abusing hidden properties to attack the Node. js ecosystem | Feng Xiao Jianwei Huang Yichang Xiong Guangliang Yang Hong Hu | 2021 | |
The creation and detection of deepfakes: A survey | Yisroel Mirsky Wenke Lee | 2021/1/2 | |
Slimium: Debloating the chromium browser with feature subsetting | Chenxiong Qian Hyungjoon Koo ChangSeok Oh Taesoo Kim Wenke Lee | 2020/10/30 |