BibTeX records: Qingchuan Zhao

download as .bib file

@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19,
  author    = {Jiongyi Chen and
               Chaoshun Zuo and
               Wenrui Diao and
               Shuaike Dong and
               Qingchuan Zhao and
               Menghan Sun and
               Zhiqiang Lin and
               Yinqian Zhang and
               Kehuan Zhang},
  title     = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices
               and Users},
  booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages     = {222--233},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/DSN.2019.00034},
  doi       = {10.1109/DSN.2019.00034},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhaoZPL19,
  author    = {Qingchuan Zhao and
               Chaoshun Zuo and
               Giancarlo Pellegrino and
               Zhiqiang Lin},
  title     = {Geo-locating Drivers: {A} Study of Sensitive Data Leakage in Ride-Hailing
               Services},
  booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS}
               2019, San Diego, California, USA, February 24-27, 2019},
  publisher = {The Internet Society},
  year      = {2019},
  url       = {https://www.ndss-symposium.org/ndss-paper/geo-locating-drivers-a-study-of-sensitive-data-leakage-in-ride-hailing-services/},
  timestamp = {Thu, 02 May 2019 15:52:21 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/ZhaoZPL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenDZZL0LSYZ18,
  author    = {Jiongyi Chen and
               Wenrui Diao and
               Qingchuan Zhao and
               Chaoshun Zuo and
               Zhiqiang Lin and
               XiaoFeng Wang and
               Wing Cheong Lau and
               Menghan Sun and
               Ronghai Yang and
               Kehuan Zhang},
  title     = {IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based
               Fuzzing},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_01A-1\_Chen\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/ChenDZZL0LSYZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZuoZL17,
  author    = {Chaoshun Zuo and
               Qingchuan Zhao and
               Zhiqiang Lin},
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {{AUTHSCOPE:} Towards Automatic Discovery of Vulnerable Authorizations
               in Online Services},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {799--813},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956.3134089},
  doi       = {10.1145/3133956.3134089},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ZuoZL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GuZZL17,
  author    = {Yufei Gu and
               Qingchuan Zhao and
               Yinqian Zhang and
               Zhiqiang Lin},
  editor    = {Gail{-}Joon Ahn and
               Alexander Pretschner and
               Gabriel Ghinita},
  title     = {{PT-CFI:} Transparent Backward-Edge Control Flow Violation Detection
               Using Intel Processor Trace},
  booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  pages     = {173--184},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3029806.3029830},
  doi       = {10.1145/3029806.3029830},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/codaspy/GuZZL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/LiWHZM13,
  author    = {Jun Li and
               Tao Wang and
               Shuyue Hu and
               Qingchuan Zhao and
               Huaqing Min},
  editor    = {Jeffrey Parsons and
               Dickson K. W. Chiu},
  title     = {Products Competitive Relationships Mining},
  booktitle = {Advances in Conceptual Modeling - {ER} 2013 Workshops, LSAWM, MoBiD,
               RIGiM, SeCoGIS, WISM, DaSeM, SCME, and PhD Symposium, Hong Kong, China,
               November 11-13, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8697},
  pages     = {205--215},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-14139-8\_22},
  doi       = {10.1007/978-3-319-14139-8\_22},
  timestamp = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/er/LiWHZM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics