supported in part by the National Natural Science Foundation of China(Grant No.6177230861472209,and U1736209);Young Elite Scientists Spon-sorship Program by CAST(Grant No.2016QNRC001);award from Tsinghua Information Science And Technology National Laboratory.
Security vulnerability is one of the root causes of cyber-security threats.To discover vulnerabilities and fix them in advance,researchers have proposed several techniques,among which fuzzing is the most widely used o...
supported by National Grand Fundamental Research 973 Program of China(Grant No.2011CB30-2601);National Natural Science Foundation of China(Grant No.61379052);National High-tech R&D Program of China(863)(Grant No.2013AA01A213);Natural Science Foundation for Distinguished Young Scholars of Hunan Province(Grant No.S2010J5050);Specialized Research Fund for the Doctoral Program of Higher Education(Grant No.20124307110015)
The publish/subscribe (pub/sub) paradigm is a popular communication model for data dissemina- tion in large-scale distributed networks. However, sealability comes with a contradiction between the delivery latency an...