Lannan (Lisa) Luo
Lannan (Lisa) Luo
Department of Computer Science and Engineering, University of South Carolina
Verified email at cse.sc.edu - Homepage
Title
Cited by
Cited by
Year
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
1232014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
L Luo, J Ming, D Wu, P Liu, S Zhu
IEEE Transactions on Software Engineering 43 (12), 1157-1177, 2017
402017
Neural machine translation inspired binary code similarity comparison beyond function pairs
F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019
272019
Integrating BIMserver and OpenStudio for energy efficient building
N Yu, Y Jiang, L Luo, S Lee, A Jallow, D Wu, JI Messner, RM Leicht, J Yen
Computing in Civil Engineering (2013), 516-523, 2013
212013
Repackage-proofing Android Apps
L Luo, Y Fu, D Wu, S Zhu, P Liu
Proceedings of the 46th Annual IEEE/IFIP International Conference on …, 2016
182016
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
16*2017
Solminer: mining distinct solutions in programs
L Luo, Q Zeng
Proceedings of the 38th International Conference on Software Engineering …, 2016
132016
Resilient decentralized Android application repackaging detection using logic bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li
Proceedings of the 2018 International Symposium on Code Generation and …, 2018
92018
A multiversion programming inspired approach to detecting audio adversarial examples
Q Zeng, J Su, C Fu, G Kayas, L Luo
Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019
72019
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis
K Redmond, L Luo, Q Zeng
The NDSS Workshop on Binary Analysis Research (BAR), 2019
62019
Exploiting the inherent limitation of l0 adversarial examples
F Zuo, B Yang, X Li, Q Zeng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
42019
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding
Q Zeng, G Kayas, E Mohammed, L Luo, X Du, J Rhee
Proceedings of the 49th Annual IEEE/IFIP International Conference on …, 2019
3*2019
A Distributed Storage Access System for Mass Data using 3-tier Architecture
L Luo, G Sun, W Yu
Proceedings of 2011 International Conference on Computer Science and …, 2011
22011
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems
H Chi, Q Zeng, X Du, L Luo
arXiv preprint arXiv:1910.07987, 2019
12019
Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices
X Li, F Yan, F Zuo, Q Zeng, L Luo
The 25th Annual International Conference on Mobile Computing and Networking …, 2019
12019
On the Robustness of Stochastic Stealthy Network Against Android App Repackaging
R Norboev, Z Hossain, L Luo, Q Zeng
12017
Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification
L Luo
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
2020
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs
Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas
IEEE Transactions on Dependable and Secure Computing, 2019
2019
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing, 2019
2019
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection
X Li, X Qu, W Xu, S Wang, Y Tong, L Luo
arXiv preprint arXiv:1811.08951, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20