Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Filters
Results by year
Table representation of search results timeline featuring number of search results per year.
Year | Number of Results |
---|---|
2017 | 2 |
2018 | 1 |
2024 | 0 |
Search Results
3 results
Results by year
Filters applied: . Clear all
It looks like you are searching for an author.
Results are currently sorted by Best Match. To see the newest results first,
change the sort order to Most Recent.
Page 1
Did you mean
chaoqing tang
(9 results)?
Ffuzz: Towards full system high coverage fuzz testing on binary executables.
PLoS One. 2018 May 23;13(5):e0196733. doi: 10.1371/journal.pone.0196733. eCollection 2018.
PLoS One. 2018.
PMID: 29791469
Free PMC article.
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.
Wen S, Meng Q, Feng C, Tang C.
Wen S, et al. Among authors: tang c.
PLoS One. 2017 Nov 16;12(11):e0188229. doi: 10.1371/journal.pone.0188229. eCollection 2017.
PLoS One. 2017.
PMID: 29145458
Free PMC article.
Item in Clipboard
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen S, Meng Q, Feng C, Tang C.
Wen S, et al. Among authors: tang c.
PLoS One. 2017 Oct 19;12(10):e0186188. doi: 10.1371/journal.pone.0186188. eCollection 2017.
PLoS One. 2017.
PMID: 29049409
Free PMC article.
Item in Clipboard
Cite
Cite