Qiu, Kefan
91  results:
Search for persons X
?
2

Penetrating Machine Learning Servers via Exploiting BMC Vul..:

, In: Machine Learning for Cyber Security; Lecture Notes in Computer Science,
Liu, Yashi ; Qiu, Kefan ; Liu, Lu. - p. 163-172 , 2024
 
?
4

EasyLog: An Efficient Kernel Logging Service for Machine Le..:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
Yang, Xundi ; Qiu, Kefan ; Zhang, Quanxin - p. 16-28 , 2024
 
?
5

DRSA: Debug Register-Based Self-relocating Attack Against S..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Blockchain Technology and Emerging Applications,
Zhang, Zheng ; Xue, Jingfeng ; Mu, Tianshi... - p. 23-40 , 2024
 
?
10

Hybrid isolation model for device application sandboxing de..:

Zhang, Jingci ; Zheng, Jun ; Zhang, Zheng...
International Journal of Intelligent Systems.  37 (2022)  12 - p. 11167-11187 , 2022
 
?
11

Towards robust and stealthy communication for wireless inte..:

Liang, Chen ; Qiu, Kefan ; Zhang, Zheng...
International Journal of Intelligent Systems.  37 (2022)  12 - p. 11791-11814 , 2022
 
?
13

Hybrid Isolation Model for Device Application Sandboxing De..:

, In: Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops,
Zhang, Jingci ; Zheng, Jun ; Zhang, Zheng... - p. 104-123 , 2022
 
?
14

Research on Off-Path Exploits of Network Protocols:

, In: Data Mining and Big Data; Communications in Computer and Information Science,
Hou, Falin ; Yu, Xiao ; Qiu, Kefan... - p. 73-80 , 2021
 
?
 
1-15