Chengyu

Results: 19



#Item
1

Towards an ISO standard for dialogue act annotation Harry Bunt*, Jan Alexandersson, Jean Carletta, Jae-Woong Choe, Alex Chengyu Fang, Koiti Hasida, Kiyong Lee, Volha Petukhova, Andrei Popescu-Belis, Laurent Romary, Claud

Add to Reading List

Source URL: publications.idiap.ch

- Date: 2010-07-28 07:31:41
    2

    Secretary Markets with Local Information Ning Chen1 , Martin Hoefer2,? , Marvin K¨ unnemann2,3 , 4 Chengyu Lin , and Peihan Miao5 1

    Add to Reading List

    Source URL: people.mpi-inf.mpg.de

    Language: English - Date: 2015-04-30 16:31:06
      3

      MANAGING SCIENTIFIC DATA WITH NDN Chengyu Fan, Susmit Shannigrahi, Steve DiBenedetto, Catherine Olschanowsky, Christos Papadopoulos NDNcomm 2015 Sept 28, 2015 Los Angeles, CA

      Add to Reading List

      Source URL: www.caida.org

      Language: English - Date: 2015-09-29 14:52:34
        4

        ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, and Wenke Lee School of Computer Science, Georgia Institute of Technology

        Add to Reading List

        Source URL: wenke.gtisc.gatech.edu

        Language: English - Date: 2015-09-04 21:45:19
          5

          Exploiting and Protecting Dynamic Code Generation Chengyu Song Chao Zhang Tielei Wang, Wenke Lee

          Add to Reading List

          Source URL: wenke.gtisc.gatech.edu

          Language: English - Date: 2014-12-07 22:15:01
            6

            Flowers for Automated Malware Analysis Chengyu Song and Paul Royal Georgia Institute of Technology , ABSTRACT

            Add to Reading List

            Source URL: media.blackhat.com

            Language: English - Date: 2012-07-22 17:41:57
              7

              Type Casting Verification: Stopping an Emerging Attack Vector Byoungyoung Lee, Chengyu Song, Taesoo Kim, and Wenke Lee School of Computer Science Georgia Institute of Technology Abstract

              Add to Reading List

              Source URL: wenke.gtisc.gatech.edu

              Language: English - Date: 2015-09-04 21:27:11
                8

                Mimesis Aegis: A Mimicry Privacy Shield A System’s Approach to Data Privacy on Public Cloud Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, and Alexandra Boldyreva College of Computing, Georgia Institut

                Add to Reading List

                Source URL: wenke.gtisc.gatech.edu

                Language: English - Date: 2014-08-26 21:26:58
                  9

                  Preventing Use-after-free with Dangling Pointers Nullification Byoungyoung Lee† Chengyu Song† Yeongjin Jang† Tielei Wang† Taesoo Kim† Long Lu∗ Wenke Lee† † {blee,

                  Add to Reading List

                  Source URL: wenke.gtisc.gatech.edu

                  Language: English - Date: 2014-12-07 22:14:33
                    10

                    A11y Attacks: Exploiting Accessibility in Operating Systems Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, and Wenke Lee School of Computer Science, College of Computing Georgia Institute of Technology, Atlant

                    Add to Reading List

                    Source URL: wenke.gtisc.gatech.edu

                    Language: English - Date: 2014-08-26 21:24:46
                      UPDATE