


default search action
Songtao Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c10]Yuan Li, Chao Zhang, Jinhao Zhu, Penghui Li, Chenyang Li, Songtao Yang, Wende Tan:
VulShield: Protecting Vulnerable Code Before Deploying Patches. NDSS 2025 - [c9]Zhanpeng Liu, Yi Rong, Chenyang Li, Wende Tan, Yuan Li, Xinhui Han, Songtao Yang, Chao Zhang:
CCTAG: Configurable and Combinable Tagged Architecture. NDSS 2025 - 2023
- [j11]Zhongyu Pei
, Xingman Chen
, Songtao Yang
, Haixin Duan
, Chao Zhang
:
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective. IEEE Trans. Dependable Secur. Comput. 20(6): 5278-5292 (2023) - [c8]Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma
, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang:
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. ISSTA 2023: 867-879 - 2022
- [j10]Songtao Yang, Kaixiang Chen, Zhun Wang, Chao Zhang:
Exploit-oriented Automated Information Leakage. Int. J. Softw. Informatics 12(3): 331-350 (2022) - [c7]Yuan Li
, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang:
PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication. CCS 2022: 1901-1915 - [i1]Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang:
PACSan: Enforcing Memory Safety Based on ARM PA. CoRR abs/2202.03950 (2022) - 2021
- [j9]Songtao Yang
, Qingfeng Jiang:
Towards Region Queries with Strong Location Privacy in Mobile Network. Mob. Inf. Syst. 2021: 5972486:1-5972486:12 (2021) - [c6]Wende Tan, Yuan Li
, Chao Zhang, Xingman Chen, Songtao Yang, Ying Liu, Jianping Wu:
ROLoad: Securing Sensitive Operations with Pointee Integrity. DAC 2021: 307-312 - 2020
- [j8]Yong Tian
, Lina Ma
, Songtao Yang
, Qian Wang
:
A Methodology for Calculating Greenhouse Effect of Aircraft Cruise Using Genetic Algorithm-Optimized Wavelet Neural Network. Complex. 2020: 7141320:1-7141320:13 (2020) - [c5]Yuan Li
, Mingzhe Wang, Chao Zhang, Xingman Chen, Songtao Yang, Ying Liu:
Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms. CCS 2020: 1821-1835
2010 – 2019
- 2019
- [j7]Lei Zhang
, Jing Li, Songtao Yang, Yi Liu, Xu Zhang, Yue Sun:
A Markov Prediction-Based Privacy Protection Scheme for Continuous Query. J. Circuits Syst. Comput. 28(9): 1950147:1-1950147:20 (2019) - [c4]Yankui Zhang, Daming Wang, Haiyun Xu, Songtao Yang, Zhenyu Wang, Jiangdong You:
High-Accuracy DOA Estimation based on Vectorized Fourth-Order Cumulant with Coprime Array. ICCT 2019: 210-215 - 2018
- [j6]Lei Zhang
, Songtao Yang, Jing Li, Lili Yu:
A Particle Swarm Optimization Clustering-Based Attribute Generalization Privacy Protection Scheme. J. Circuits Syst. Comput. 27(11): 1850179:1-1850179:21 (2018) - [j5]Lei Zhang
, Jing Li, Songtao Yang, Bin Wang, Xingchao Bian:
A novel attributes anonymity scheme in continuous query. Wirel. Pers. Commun. 101(2): 943-961 (2018) - 2017
- [j4]Chunguang Ma, Lei Zhang
, Songtao Yang, Xiaodong Zheng:
Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services. J. Circuits Syst. Comput. 26(7): 1750119:1-1750119:25 (2017) - [j3]Lei Zhang, Jing Li, Songtao Yang, Bin Wang:
Privacy Preserving in Cloud Environment for Obstructed Shortest Path Query. Wirel. Pers. Commun. 96(2): 2305-2322 (2017) - [j2]Lei Zhang, Chunguang Ma, Songtao Yang, Xiaodong Zheng:
Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme. Wirel. Pers. Commun. 97(4): 6167-6187 (2017) - [c3]Lei Zhang, Chunguang Ma, Songtao Yang, Zengpeng Li
:
An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection. MSWiM 2017: 215-218 - 2015
- [j1]Chunguang Ma, Chang-li Zhou, Songtao Yang:
A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS. Int. J. Distributed Sens. Networks 11: 326953:1-326953:17 (2015) - [c2]Chang-li Zhou, Chunguang Ma, Songtao Yang:
An Improved Fine-Grained Encryption Method for Unstructured Big Data. ICYCSEE 2015: 361-369 - 2014
- [c1]Chang-li Zhou, Chunguang Ma, Songtao Yang, Peng Wu, Linlin Liu:
A Location Privacy Preserving Method Based on Sensitive Diversity for LBS. NPC 2014: 409-422
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-21 01:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint