


default search action
Tao Wei 0002
Person information
- affiliation: Ant Group, Hangzhou, China
- affiliation: Baidu Inc., Beijing, China
- affiliation: Peking University, Beijing, China
- affiliation: University of California, Berkeley, CA, USA
Other persons with the same name
- Tao Wei — disambiguation page
- Tao Wei 0001
— Clemson University, NEXT Lab, Clemson, SC, USA (and 2 more) - Tao Wei 0003
— Ping An Technology, Shenzhen, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j17]Chao Niu
, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei:
SoK: FHE-Friendly Symmetric Ciphers and Transciphering. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(3): 583-613 (2025)
[j16]Chao Niu, Zhicong Huang
, Zhaomin Yang, Yi Chen
, Liang Kong, Cheng Hong
, Tao Wei:
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(4): 118-144 (2025)
[j15]Xinle Cao
, Jian Liu
, Hao Lu, Yan Liu
, Weixin Liu, Tao Wei, Kui Ren
:
On the Interoperability of Encrypted Databases. IEEE Trans. Dependable Secur. Comput. 22(2): 1011-1023 (2025)
[j14]Mingyan Zhu
, Yiming Li
, Junfeng Guo, Tao Wei, Shu-Tao Xia
, Zhan Qin
:
Towards Sample-Specific Backdoor Attack With Clean Labels via Attribute Trigger. IEEE Trans. Dependable Secur. Comput. 22(5): 4685-4698 (2025)
[j13]Yixiong Ji
, Jiahao Cao, Qi Li
, Yan Liu, Tao Wei, Ke Xu
, Jianping Wu:
Constructing SDN Covert Timing Channels Between Hosts With Unprivileged Attackers. IEEE Trans. Netw. 33(2): 612-623 (2025)
[c52]Yiming Zhang, Fengwei Zhang, Xiapu Luo, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan, Tao Wei, Zhengyu He:
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone. NDSS 2025
[c51]Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. NDSS 2025
[c50]Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, Wenguang Chen:
BumbleBee: Secure Two-party Inference Framework for Large Transformers. NDSS 2025
[c49]Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong
, Tao Wei, Wenguang Chen:
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations. SP 2025: 3328-3346
[c48]Xiaoyi Pang, Chenxu Zhao, Zhibo Wang, Jiahui Hu, Yinggui Wang, Lei Wang, Tao Wei, Kui Ren, Chun Chen:
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning. USENIX Security Symposium 2025: 6461-6479
[i24]Guangwei Li, Yuansen Zhang, Yinggui Wang, Shoumeng Yan, Lei Wang, Tao Wei:
PRIV-QA: Privacy-Preserving Question Answering for Cloud Large Language Models. CoRR abs/2502.13564 (2025)
[i23]Chung-ju Huang, Ziqi Zhang, Yinggui Wang, Binghui Wang, Tao Wei, Leye Wang:
VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software. CoRR abs/2507.02376 (2025)
[i22]Zichi Liu, Yinggui Wang, Tao Wei, Chao Ma:
AnchorSync: Global Consistency Optimization for Long Video Editing. CoRR abs/2508.14609 (2025)
[i21]Qingjie Zhang, Yujia Fu, Yang Wang, Liu Yan, Tao Wei, Ke Xu, Minlie Huang, Han Qiu:
On the Self-awareness of Large Reasoning Models' Capability Boundaries. CoRR abs/2509.24711 (2025)
[i20]Jiahao Liu, Bonan Ruan, Xianglin Yang, Zhiwei Lin, Yan Liu, Yang Wang, Tao Wei, Zhenkai Liang:
TraceAegis: Securing LLM-Based Agents via Hierarchical and Behavioral Anomaly Detection. CoRR abs/2510.11203 (2025)
[i19]Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, Tao Wei:
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. IACR Cryptol. ePrint Arch. 2025: 74 (2025)
[i18]Chao Niu, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei:
SoK: FHE-Friendly Symmetric Ciphers and Transciphering. IACR Cryptol. ePrint Arch. 2025: 669 (2025)
[i17]Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen:
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations. IACR Cryptol. ePrint Arch. 2025: 770 (2025)
[i16]Zhaomin Yang, Chao Niu, Benqiang Wei, Zhicong Huang, Cheng Hong, Tao Wei:
RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping. IACR Cryptol. ePrint Arch. 2025: 1534 (2025)- 2024
[c47]Zhicong Huang
, Wen-jie Lu
, Yuchen Wang
, Cheng Hong
, Tao Wei
, Wenguang Chen
:
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits. CCS 2024: 810-824
[c46]Huiyu Xu
, Yaopeng Wang
, Zhibo Wang
, Zhongjie Ba
, Wenxin Liu
, Lu Jin
, Haiqin Weng
, Tao Wei
, Kui Ren
:
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning. CCS 2024: 2207-2221
[c45]Minghua Wang
, Jingling Xue
, Lin Huang
, Yuan Zi, Tao Wei:
UnsafeCop: Towards Memory Safety for Real-World Unsafe Rust Code with Practical Bounded Model Checking. FM (2) 2024: 307-324
[c44]Haoyang Huang, Fengwei Zhang, Shoumeng Yan, Tao Wei, Zhengyu He:
SoK: A Comparison Study of Arm TrustZone and CCA. SEED 2024: 107-118
[i15]Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. CoRR abs/2409.02074 (2024)
[i14]Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, Wenguang Chen:
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits. IACR Cryptol. ePrint Arch. 2024: 1372 (2024)
[i13]Jingyu Li, Zhicong Huang, Min Zhang, Jian Liu, Cheng Hong, Tao Wei, Wenguang Chen:
PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting. IACR Cryptol. ePrint Arch. 2024: 1774 (2024)- 2023
[j12]Xinliang Miao
, Rui Chang
, Jianhong Zhao
, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren
:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. IEEE Trans. Dependable Secur. Comput. 20(1): 377-391 (2023)
[j11]Yiming Li
, Mingyan Zhu
, Xue Yang
, Yong Jiang
, Tao Wei, Shu-Tao Xia
:
Black-Box Dataset Ownership Verification via Backdoor Watermarking. IEEE Trans. Inf. Forensics Secur. 18: 2318-2332 (2023)
[c43]Xue Wang, Zhibo Wang, Haiqin Weng, Hengchang Guo, Zhifei Zhang, Lu Jin, Tao Wei, Kui Ren:
Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks. ICCV 2023: 2042-2051
[c42]Sicong Cao
, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei:
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. SP 2023: 2726-2743
[c41]Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang:
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. USENIX Security Symposium 2023: 2329-2346
[i12]Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang:
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. CoRR abs/2302.13520 (2023)
[i11]Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei:
ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. CoRR abs/2304.04233 (2023)
[i10]Ye Dong, Wen-jie Lu, Yancheng Zheng, Haoqi Wu, Derun Zhao, Jin Tan, Zhicong Huang, Cheng Hong, Tao Wei, Wenguang Chen:
PUMA: Secure Inference of LLaMA-7B in Five Minutes. CoRR abs/2307.12533 (2023)
[i9]Yiming Li, Mingyan Zhu, Junfeng Guo, Tao Wei, Shu-Tao Xia, Zhan Qin
:
Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger. CoRR abs/2312.04584 (2023)
[i8]Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Kui Ren, Cheng Hong, Tao Wei, Wenguang Chen:
BumbleBee: Secure Two-party Inference Framework for Large Transformers. IACR Cryptol. ePrint Arch. 2023: 1678 (2023)- 2022
[j10]Tianyu Du, Shouling Ji, Bo Wang, Sirui He, Jinfeng Li, Bo Li, Tao Wei, Yunhan Jia, Raheem Beyah, Ting Wang:
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks. Int. J. Intell. Syst. 37(9): 6463-6492 (2022)
[c40]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CVPR 2022: 10369-10378
[i7]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CoRR abs/2203.01584 (2022)- 2021
[c39]Zhuotao Liu
, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang:
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. AsiaCCS 2021: 565-577
[c38]Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin
, Tao Wei:
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. NDSS 2021- 2020
[c37]Mustakimur Rahman Khandaker
, Yueqiang Cheng, Zhi Wang, Tao Wei:
COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX. ASPLOS 2020: 971-985
[c36]Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Hao Chan, Zhenyu Zhong, Tao Wei:
Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking. ICLR 2020
[c35]Ruming Tang, Zheng Yang, Zeyan Li
, Weibin Meng, Haixin Wang
, Qi Li, Yongqian Sun, Dan Pei
, Tao Wei, Yanfei Xu, Yan Liu:
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. INFOCOM 2020: 2479-2488
[c34]Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, Long Lu:
SAVIOR: Towards Bug-Driven Hybrid Testing. SP 2020: 1580-1596
[i6]Haiqin Weng, Juntao Zhang, Feng Xue, Tao Wei, Shouling Ji, Zhiyuan Zong:
Privacy Leakage of Real-World Vertical Federated Learning. CoRR abs/2011.09290 (2020)
2010 – 2019
- 2019
[j9]Jian Mao
, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Phishing page detection via learning classifiers from page layout feature. EURASIP J. Wirel. Commun. Netw. 2019: 43 (2019)
[j8]Pei Wang
, Dinghao Wu
, Zhaofeng Chen, Tao Wei:
Field experience with obfuscating million-user iOS apps in large enterprise mobile development. Softw. Pract. Exp. 49(2): 252-273 (2019)
[c33]Dou Goodman, Xin Hao, Yang Wang, Jiawei Tang, Yunhan Jia, Pei Wang, Tao Wei:
ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield. CCSW 2019: 43
[c32]Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin:
Towards Memory Safe Enclave Programming with Rust-SGX. CCS 2019: 2333-2350
[i5]Yunhan Jia, Yantao Lu, Senem Velipasalar, Zhenyu Zhong, Tao Wei:
Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction. CoRR abs/1905.03333 (2019)
[i4]Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei:
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking. CoRR abs/1905.11026 (2019)
[i3]Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, Long Lu:
SAVIOR: Towards Bug-Driven Hybrid Testing. CoRR abs/1906.07327 (2019)
[i2]Dou Goodman, Tao Wei:
Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield. CoRR abs/1906.07997 (2019)- 2018
[c31]Chao Xu, Zhentan Feng, Yizheng Chen, Minghua Wang
, Tao Wei:
FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features. AISec@CCS 2018: 57-63
[c30]Pei Wang, Qinkun Bao, Li Wang, Shuai Wang
, Zhaofeng Chen, Tao Wei, Dinghao Wu:
Software protection on the go: a large-scale empirical study on mobile app obfuscation. ICSE 2018: 26-36
[c29]Pei Wang, Dinghao Wu, Zhaofeng Chen, Tao Wei:
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience. ICSE (SEIP) 2018: 235-244- 2017
[j7]Jian Mao
, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang
:
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity. IEEE Access 5: 17020-17030 (2017)
[j6]Yu Ding
, Tao Wei, Hui Xue, Yulong Zhang, Chao Zhang, Xinhui Han:
Accurate and efficient exploit capture and classification. Sci. China Inf. Sci. 60(5): 052110:1-052110:17 (2017)
[c28]Yu Ding, Ran Duan, Long Li, Yueqiang Cheng, Yulong Zhang, Tanghui Chen, Tao Wei, Huibo Wang:
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave. CCS 2017: 2491-2493
[c27]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang
:
Detecting Phishing Websites via Aggregation Analysis of Page Layouts. IIKI 2017: 224-230
[c26]Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei:
Adaptive Android Kernel Live Patching. USENIX Security Symposium 2017: 1253-1270
[c25]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang
:
Phishing Website Detection Based on Effective CSS Features of Web Pages. WASA 2017: 804-815
[i1]Yue Chen, Yulong Zhang, Zhi Wang, Tao Wei:
Downgrade Attack on TrustZone. CoRR abs/1707.05082 (2017)- 2016
[c24]Mingshen Sun, Tao Wei, John C. S. Lui:
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime. CCS 2016: 331-342- 2015
[j5]Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, Jianyu Zhang, Xinhui Han:
SF-DRDoS: The store-and-flood distributed reflective denial of service attack. Comput. Commun. 69: 107-115 (2015)
[j4]Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang:
Improving lookup reliability in Kad. Peer-to-Peer Netw. Appl. 8(1): 156-170 (2015)
[c23]Min Zheng, Hui Xue, Yulong Zhang, Tao Wei, John C. S. Lui:
Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates. AsiaCCS 2015: 463-474
[c22]Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, Peng Liu:
Towards Discovering and Understanding Task Hijacking in Android. USENIX Security Symposium 2015: 945-959- 2014
[j3]Laszlo Szekeres, Mathias Payer, Tao Wei, R. Sekar:
Eternal War in Memory. IEEE Secur. Priv. 12(3): 45-53 (2014)
[c21]Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, Chen Li:
Splider: A split-based crawler of the BT-DHT network and its applications. CCNC 2014: 327-335
[c20]Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han:
The store-and-flood distributed reflective denial of service attack. ICCCN 2014: 1-8
[c19]Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei:
A Website Credibility Assessment Scheme Based on Page Association. ISPEC 2014: 105-118
[c18]Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei:
Drawbridge: software-defined DDoS-resistant traffic engineering. SIGCOMM 2014: 591-592- 2013
[c17]Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres:
Protecting function pointers in binary. AsiaCCS 2013: 487-492
[c16]Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang
:
Rating Web Pages Using Page-Transition Evidence. ICICS 2013: 49-58
[c15]Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang
:
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features. INCoS 2013: 790-795
[c14]Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song:
SoK: Eternal War in Memory. IEEE Symposium on Security and Privacy 2013: 48-62
[c13]Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, Wei Zou:
Practical Control Flow Integrity and Randomization for Binary Executables. IEEE Symposium on Security and Privacy 2013: 559-573- 2012
[c12]Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu
, Tao Wei:
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage. INCoS 2012: 365-372
[c11]Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, Mo Zhou:
Revisiting why Kad lookup fails. P2P 2012: 37-42
[c10]Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang
, Wei Zou:
A Framework to Eliminate Backdoors from Response-Computable Authentication. IEEE Symposium on Security and Privacy 2012: 3-17
[c9]Bingshuang Liu, Zhaoyang Liu, Jianyu Zhang, Tao Wei, Wei Zou:
How many eyes are spying on your shared folders? WPES 2012: 109-116- 2011
[j2]Chao Zhang, Wei Zou, Tielei Wang, Yu Chen, Tao Wei:
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat. J. Comput. Secur. 19(6): 1083-1107 (2011)
[j1]Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution. ACM Trans. Inf. Syst. Secur. 14(2): 15:1-15:28 (2011)- 2010
[c8]Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang
, Wei Zou:
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks. ACSAC 2010: 327-336
[c7]Tao Wei, Tielei Wang, Lei Duan, Jing Luo:
Secure dynamic code generation against spraying. CCS 2010: 738-740
[c6]Chao Zhang, Tielei Wang, Tao Wei, Yu Chen, Wei Zou:
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. ESORICS 2010: 71-86
[c5]Tielei Wang, Tao Wei, Guofei Gu, Wei Zou:
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. IEEE Symposium on Security and Privacy 2010: 497-512
2000 – 2009
- 2009
[c4]Tielei Wang, Tao Wei, Zhiqiang Lin, Wei Zou:
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. NDSS 2009- 2007
[c3]Tao Wei, Jian Mao, Wei Zou, Yu Chen:
Structuring 2-way Branches in Binary Executables. COMPSAC (1) 2007: 115-118
[c2]Tao Wei, Jian Mao, Wei Zou, Yu Chen:
A New Algorithm for Identifying Loops in Decompilation. SAS 2007: 170-183- 2006
[c1]Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou:
Linkability of a Blind Signature Scheme and Its Improved Scheme. ICCSA (4) 2006: 262-270
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-14 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







