| ANVIL: Software-based protection against next-generation rowhammer attacks ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin ACM SIGPLAN Notices 51 (4), 743-755, 2016 | 305 | 2016 |
| A new approach for rowhammer attacks R Qiao, M Seaborn 2016 IEEE international symposium on hardware oriented security and trust …, 2016 | 171 | 2016 |
| A platform for secure static binary instrumentation M Zhang, R Qiao, N Hasabnis, R Sekar Proceedings of the 10th ACM SIGPLAN/SIGOPS international conference on …, 2014 | 113 | 2014 |
| NORAX: Enabling execute-only memory for COTS binaries on AArch64 Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ... 2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017 | 66 | 2017 |
| Function interface analysis: A principled approach for function recognition in COTS binaries R Qiao, R Sekar 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 62 | 2017 |
| A principled approach for rop defense R Qiao, M Zhang, R Sekar Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 39 | 2015 |
| Checking correctness of code generator architecture specifications N Hasabnis, R Qiao, R Sekar 2015 IEEE/ACM International Symposium on Code Generation and Optimization …, 2015 | 15 | 2015 |
| Effective function recovery for cots binaries using interface verification R Qiao, R Sekar Secure Syst. Lab, 2016 | 12 | 2016 |
| Reetuparna Das, Matthew Hicks, Yossi Oren, and Todd M. Austin. ANVIL: software-based protection against next-generation rowhammer attacks ZB Aweke, SF Yitbarek, R Qiao Proceedings of the Twenty-First International Conference on Architectural …, 0 | 5 | |
| Accurate Recovery of Functions in COTS Binaries R Qiao State University of New York at Stony Brook, 2017 | 3 | 2017 |
| Surprise simulation using fuzzy logic R Qiao, X Zhong, S Yang, H He International Conference on Intelligent Computing, 110-119, 2013 | 3 | 2013 |
| Rippb: A robust and improved pbft protocol for blockchain M Ding, H He, R Qiao, X Zhou 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA …, 2022 | 2 | 2022 |
| Graph pattern matching through model checking R Qiao, X Zhong, L Zhang, H He 2015 8th International Conference on Database Theory and Application (DTA), 1-5, 2015 | 2 | 2015 |
| Graph pattern matching: Capturing bisimilar subgraph R Qiao, K Feng, H He, X Zhong International Journal of Pattern Recognition and Artificial Intelligence 35 …, 2021 | 1 | 2021 |
| Fuzzy Logic Model of Surprise. R Qiao, Y Feng, X Zhong, Q Liu, H He J. Comput. 9 (11), 2761-2770, 2014 | 1 | 2014 |
| Towards ML System Extensibility W Deng, A Ruan, M Frisella, KH Chen, SB Cho, JT Humphries, R Qiao, ... Proceedings of the 2025 Workshop on Hot Topics in Operating Systems, 119-126, 2025 | | 2025 |
| Design and implementation of intelligent question and answer electronic dictionary in the context of big data R Qiao, X Zhong 2023 3rd Asia-Pacific Conference on Communications Technology and Computer …, 2023 | | 2023 |
| Problem: code generator bugs N Hasabnis, R Qiao, R Sekar International Symposium on Code Generation and Optimization (CGO), 2015 | | 2015 |
| An emotion understanding system R Qiao, H He, J Gu, M Liu, Y Feng, X Zhong The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014 …, 2014 | | 2014 |
| DTA 2015 R Qiao, X Zhong, L Zhang, H He | | |