Chua, Zheng Leong
541  Ergebnisse:
Personensuche X
?
1

SHADEWATCHER: Recommendation-guided Cyber Threat Analysis u..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Zengy, Jun ; Wang, Xiang ; Liu, Jiahao... - p. 489-506 , 2022
 
?
2

Scalable Quantitative Verification For Deep Neural Networks:

, In: Proceedings of the 43rd International Conference on Software Engineering,
 
?
3

Scalable quantitative verification for deep neural networks:

, In: Proceedings of the 43rd International Conference on Software Engineering: Companion Proceedings,
 
?
4

Preventing Page Faults from Telling Your Secrets:

, In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security,
 
?
5

"The Web/Local" Boundary Is Fuzzy : A Security Study of ..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
Jia, Yaoqi ; Chua, Zheng Leong ; Hu, Hong... - p. 791-804 , 2016
 
?
9

Smartphone Volatile Memory Acquisition for Security Analysi..:

Thing, Vrizlynn ; Chua, Zheng-Leong
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-642-39218-4_17.  , 2013
 
?
10

Smartphone Volatile Memory Acquisition for Security Analysi..:

Thing, Vrizlynn ; Chua, Zheng-Leong
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-642-39218-4_17.  , 2013
 
?
14

Presence of Engineered Nano Materials in Food Chain and The..:

Wang, Zheng M ; Leong, David T ; Ng, Kee W...
International Conference on Materials for Advanced Technologies (ICMAT 2013).  , 2013
 
1-15