What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tao Wei
Google Scholar
33
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
SoK: FHE-Friendly Symmetric Ciphers and Transciphering.
Chao Niu
Benqiang Wei
Zhicong Huang
Zhaomin Yang
Cheng Hong
Meiqin Wang
Tao Wei
2025
conf/sp
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations.
Zhelei Zhou
Yun Li
Yuchen Wang
Zhaomin Yang
Bingsheng Zhang
Cheng Hong
Tao Wei
Wenguang Chen
2025
conf/ndss
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
Jiangyi Deng
Xinfeng Li
Yanjiao Chen
Yijie Bai
Haiqin Weng
Yan Liu
Tao Wei
Wenyuan Xu
2025
conf/ndss
BumbleBee: Secure Two-party Inference Framework for Large Transformers.
Wen-jie Lu
Zhicong Huang
Zhen Gu
Jingyu Li
Jian Liu
Cheng Hong
Kui Ren
Tao Wei
Wenguang Chen
2025
conf/ndss
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone.
Yiming Zhang
Fengwei Zhang
Xiapu Luo
Rui Hou
Xuhua Ding
Zhenkai Liang
Shoumeng Yan
Tao Wei
Zhengyu He
2025
journals/tches
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering.
Chao Niu
Zhicong Huang
Zhaomin Yang
Yi Chen
Liang Kong
Cheng Hong
Tao Wei
2025
conf/uss
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning.
Xiaoyi Pang
Chenxu Zhao
Zhibo Wang
Jiahui Hu
Yinggui Wang
Lei Wang
Tao Wei
Kui Ren
Chun Chen
2024
conf/ccs
Maliciously Secure Computation Framework for Packed and Mixed Circuits.
Zhicong Huang
Wen-jie Lu
Yuchen Wang
Cheng Hong
Tao Wei
Wenguang Chen
2024
conf/ccs
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Huiyu Xu
Yaopeng Wang
Zhibo Wang
Zhongjie Ba
Wenxin Liu
Lu Jin
Haiqin Weng
Tao Wei
Kui Ren
2023
journals/tifs
Black-Box Dataset Ownership Verification via Backdoor Watermarking.
Yiming Li
Mingyan Zhu
Xue Yang
Yong Jiang
Tao Wei
Shu-Tao Xia
2023
conf/uss
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
2023
conf/sp
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Sicong Cao
Biao He
Xiaobing Sun
Yu Ouyang
Chao Zhang
Xiaoxue Wu
Ting Su
Lili Bo
Bin Li
Chuanlei Ma
Jiajia Li
Tao Wei
2021
conf/asiaccs
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Zhuotao Liu
Hao Zhao
Sainan Li
Qi Li
Tao Wei
Yu Wang
2021
conf/ndss
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Zhenxiao Qi
Qian Feng
Yueqiang Cheng
Mengjia Yan
Peng Li
Heng Yin
Tao Wei
2020
conf/sp
SAVIOR: Towards Bug-Driven Hybrid Testing.
Yaohui Chen
Peng Li
Jun Xu
Shengjian Guo
Rundong Zhou
Yulong Zhang
Tao Wei
Long Lu
2019
conf/ccs
ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield.
Dou Goodman
Xin Hao
Yang Wang
Jiawei Tang
Yunhan Jia
Pei Wang
Tao Wei
2019
conf/ccs
Towards Memory Safe Enclave Programming with Rust-SGX.
Huibo Wang
Pei Wang
Yu Ding
Mingshen Sun
Yiming Jing
Ran Duan
Long Li
Yulong Zhang
Tao Wei
Zhiqiang Lin
2018
conf/ccs
FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features.
Chao Xu
Zhentan Feng
Yizheng Chen
Minghua Wang
Tao Wei
2017
conf/ccs
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Yu Ding
Ran Duan
Long Li
Yueqiang Cheng
Yulong Zhang
Tanghui Chen
Tao Wei
Huibo Wang
2017
conf/uss
Adaptive Android Kernel Live Patching.
Yue Chen
Yulong Zhang
Zhi Wang
Liangzhao Xia
Chenfu Bao
Tao Wei
2016
conf/ccs
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Mingshen Sun
Tao Wei
John C. S. Lui
2015
conf/ccs
Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Min Zheng
Hui Xue
Yulong Zhang
Tao Wei
John C. S. Lui
2015
conf/uss
Towards Discovering and Understanding Task Hijacking in Android.
Chuangang Ren
Yulong Zhang
Hui Xue
Tao Wei
Peng Liu
2013
conf/ccs
Protecting function pointers in binary.
Chao Zhang
Tao Wei
Zhaofeng Chen
Lei Duan
Stephen McCamant
Laszlo Szekeres
2013
conf/sp
SoK: Eternal War in Memory.
Laszlo Szekeres
Mathias Payer
Tao Wei
Dawn Song
2013
conf/sp
Practical Control Flow Integrity and Randomization for Binary Executables.
Chao Zhang
Tao Wei
Zhaofeng Chen
Lei Duan
Laszlo Szekeres
Stephen McCamant
Dawn Song
Wei Zou
2013
conf/icics
Rating Web Pages Using Page-Transition Evidence.
Jian Mao
Xinshu Dong
Pei Li
Tao Wei
Zhenkai Liang
2012
conf/sp
A Framework to Eliminate Backdoors from Response-Computable Authentication.
Shuaifu Dai
Tao Wei
Chao Zhang
Tielei Wang
Yu Ding
Zhenkai Liang
Wei Zou
2010
conf/ccs
Secure dynamic code generation against spraying.
Tao Wei
Tielei Wang
Lei Duan
Jing Luo
2010
conf/sp
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Tielei Wang
Tao Wei
Guofei Gu
Wei Zou
2010
conf/esorics
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Chao Zhang
Tielei Wang
Tao Wei
Yu Chen
Wei Zou
2010
conf/acsac
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Yu Ding
Tao Wei
Tielei Wang
Zhenkai Liang
Wei Zou
2009
conf/ndss
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Tielei Wang
Tao Wei
Zhiqiang Lin
Wei Zou
Coauthors
Benqiang Wei
(1)
Biao He
(1)
Bin Li
(1)
Bingsheng Zhang
(1)
Chao Niu
(2)
Chao Xu
(1)
Chao Zhang
(6)
Chenfu Bao
(1)
Cheng Hong
(5)
Chenxu Zhao
(1)
Chuangang Ren
(1)
Chuanlei Ma
(1)
Chun Chen
(1)
Dawn Song
(2)
Dou Goodman
(1)
Fengwei Zhang
(1)
Guofei Gu
(1)
Haiqin Weng
(2)
Han Qiu
(1)
Hao Zhao
(1)
Heng Yin
(1)
Hui Xue
(2)
Huibo Wang
(2)
Huiyu Xu
(1)
Jiahui Hu
(1)
Jiajia Li
(1)
Jialai Wang
(1)
Jian Liu
(1)
Jian Mao
(1)
Jiangyi Deng
(1)
Jiawei Tang
(1)
Jing Luo
(1)
Jingyu Li
(1)
John C. S. Lui
(2)
Jun Xu
(1)
Kui Ren
(3)
Laszlo Szekeres
(3)
Lei Duan
(3)
Lei Wang
(1)
Liang Kong
(1)
Liangzhao Xia
(1)
Lili Bo
(1)
Long Li
(2)
Long Lu
(1)
Lu Jin
(1)
Mathias Payer
(1)
Meiqi Wang
(1)
Meiqin Wang
(1)
Mengjia Yan
(1)
Min Zheng
(1)
Minghua Wang
(1)
Mingshen Sun
(2)
Mingyan Zhu
(1)
Pei Li
(1)
Pei Wang
(2)
Peng Li
(2)
Peng Liu
(1)
Qi Li
(2)
Qian Feng
(1)
Ran Duan
(2)
Rui Hou
(1)
Rundong Zhou
(1)
Sainan Li
(1)
Shengjian Guo
(1)
Shoumeng Yan
(1)
Shu-Tao Xia
(1)
Shuaifu Dai
(1)
Sicong Cao
(1)
Stephen McCamant
(2)
Tanghui Chen
(1)
Tao Wei
(33)
Tianwei Zhang
(1)
Tielei Wang
(6)
Ting Su
(1)
Wei Zou
(6)
Wen-jie Lu
(2)
Wenguang Chen
(3)
Wenxin Liu
(1)
Wenyuan Xu
(1)
Xiaobing Sun
(1)
Xiaoxue Wu
(1)
Xiaoyi Pang
(1)
Xiapu Luo
(1)
Xin Hao
(1)
Xinfeng Li
(1)
Xinshu Dong
(1)
Xue Yang
(1)
Xuhua Ding
(1)
Yan Liu
(1)
Yang Wang
(1)
Yanjiao Chen
(1)
Yaohui Chen
(1)
Yaopeng Wang
(1)
Yi Chen
(1)
Yijie Bai
(1)
Yiming Jing
(1)
Yiming Li
(1)
Yiming Zhang
(1)
Yinggui Wang
(1)
Yizheng Chen
(1)
Yong Jiang
(1)
Yu Chen
(1)
Yu Ding
(4)
Yu Ouyang
(1)
Yu Wang
(1)
Yuchen Wang
(2)
Yue Chen
(1)
Yueqiang Cheng
(2)
Yulong Zhang
(6)
Yun Li
(1)
Yunhan Jia
(1)
Zhaofeng Chen
(2)
Zhaomin Yang
(3)
Zhelei Zhou
(1)
Zhen Gu
(1)
Zhengyu He
(1)
Zhenkai Liang
(4)
Zhentan Feng
(1)
Zhenxiao Qi
(1)
Zhi Wang
(1)
Zhibo Wang
(2)
Zhicong Huang
(4)
Zhiqiang Lin
(2)
Zhongjie Ba
(1)
Zhuotao Liu
(1)
Ziyuan Zhang
(1)
Zongpeng Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to