Biblio

Export 3 results:
Filters: Author is Peng Wang  [Clear All Filters]
2015
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th {USENIX} Security Symposium ({USENIX} Security 15). :659--674.
Wang P, Jiang H, Liu X, Han J.  2015.  Towards Hybrid Programming in Big Data. 7th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 15).