Jiang Ming
  • Bio
  • Honors & Awards
  • Publications
  • Team
  • Teaching & Services
  • Versatility
  • Contact
  • Templates
    • Recent & Upcoming Talks
      • Example Talk
    • Blog
      • ๐ŸŽ‰ Easily create your own simple yet highly customizable blog
      • ๐Ÿง  Sharpen your thinking with a second brain
      • ๐Ÿ“ˆ Communicate your results effectively with the best data visualizations
      • ๐Ÿ‘ฉ๐Ÿผโ€๐Ÿซ Teach academic courses
      • โœ… Manage your projects
    • Pandas
    • PyTorch
    • scikit-learn
    • Teaching
      • Learn JavaScript
      • Learn Python
    • An example preprint / working paper
    • An example journal article
    • An example conference paper
  • Publications
    • [USENIX ATC '25] MemoryTrap: Booby Trapping Memory to Counter Memory Disclosure Attacks with Hardware Support
    • [FSE '25] Revisiting Optimization-Resilience Claims in Binary Diffing Tools: Insights from LLVM Peephole Optimization Analysis
    • [S&P '25] Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation
    • [NDSS '25] Retrofitting XoM for Stripped Binaries without Embedded Data Relocation
    • [NSDI '24] Towards Intelligent Automobile Cockpit via A New Container Architecture
    • [CCS '23] PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
    • [USENIX Security '23] On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling
    • [USENIX Security '22] PolyCruise: A Cross-Language Dynamic Information Flow Analysis
    • [ASPLOS '22] One Size Does Not Fit All: Security Hardening of MIPS Embedded Systems via Static Binary Debloating for Shared Libraries
    • [NDSS '22] Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators
    • [CCS '21] Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization
    • [USENIX Security '21] MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
    • [USENIX Security '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware
    • [PLDI '21] Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study
    • [PLDI '21] Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions
    • [ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization
    • [CCS '20] PatchScope: Memory Object Centric Patch Diffing
    • [CCS '20] VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing
    • [MobiSys '19] "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
    • [CCS '18] VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
    • [CCS '18] Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
    • [USENIX Security '18] Towards Predicting Efficient and Anonymous Tor Circuits
    • [USENIX Security '17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
    • [S&P '17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
    • [ASE '16] StraightTaint: Decoupled Offline Symbolic Taint Analysis
    • [CCS '15] LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
    • [USENIX Security '15] TaintPipe: Pipelined Symbolic Taint Analysis
    • [FSE '14] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
  • Recent & Upcoming Talks
    • Postdoc, PhD, Master, and Visiting Students
  • Recent & Upcoming Talks
    • Photography
  • Teaching & Services
    • Information Security
    • Intro to Language-Based Security
    • Technical Program Committee
  • Projects
  • Experience

Pandas

Oct 26, 2023 ยท 1 min read
Go to Project Site

Flexible and powerful data analysis / manipulation library for Python, providing labeled data structures.

Last updated on Oct 26, 2023
Hugo Wowchemy Markdown
Jiang Ming
Authors
Jiang Ming
Associate Professor of Computer Science

PyTorch Oct 26, 2023 →

ยฉ 2025 Me. This work is licensed under CC BY NC ND 4.0

Published with Hugo Blox Builder โ€” the free, open source website builder that empowers creators.