Cited By
View all- Wang HSinghal ALiu P(2023)Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detectionCybersecurity10.1186/s42400-022-00135-86:1Online publication date: 5-Jan-2023
- Yang GLiu XTang C(2022)Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data StreamElectronics10.3390/electronics1120336311:20(3363)Online publication date: 18-Oct-2022
- Li XHu ZWang HFu YChen PZhu MLiu P(2020)DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristicsJournal of Computer Security10.3233/JCS-191368(1-25)Online publication date: 10-Sep-2020
- Show More Cited By