2024
SYNTONY: Potential-aware fuzzing with particle swarm optimization.
J. Syst. Softw., February, 2024
GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
2023
ELAMD: An ensemble learning framework for adversarial malware defense.
J. Inf. Secur. Appl., June, 2023
pAFL: Adaptive Energy Allocation with Upper Confidence Bound.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023
2022
Towards time evolved malware identification using two-head neural network.
J. Inf. Secur. Appl., 2022
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022
MDCD: A malware detection approach in cloud using deep learning.
Trans. Emerg. Telecommun. Technol., 2022
2021
BinDeep: A deep learning approach to binary code similarity detection.
Expert Syst. Appl., 2021
CMFuzz: context-aware adaptive mutation for fuzzers.
Empir. Softw. Eng., 2021
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021
2020
Identification and addressing of internet of things based on distributed ID.
Int. J. Embed. Syst., 2020
MSYM: A multichannel communication system for android devices.
Comput. Networks, 2020
LAFuzz: Neural Network for Efficient Fuzzing.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020
DepTaint: A Static Taint Analysis Method Based on Program Dependence.
Proceedings of the ICMSS 2020: 2020 4th International Conference on Management Engineering, 2020
VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
2019
KEcruiser: A novel control flow protection for kernel extensions.
Future Gener. Comput. Syst., 2019
E-WBM: An Effort-Based Vulnerability Discovery Model.
IEEE Access, 2019
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning.
IEEE Access, 2019
Segmental Symbolic Execution Based on Clustering.
Proceedings of the 2019 IEEE SmartWorld, 2019
2018
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries.
Secur. Commun. Networks, 2018
2017
SulleyEX: A Fuzzer for Stateful Network Protocol.
Proceedings of the Network and System Security - 11th International Conference, 2017
Defenses Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017
2015
An Improved WiFi Indoor Positioning Algorithm by Weighted Fusion.
Sensors, 2015
Research on Identification and Addressing of the Internet of Things.
Proceedings of the 10th International Conference on P2P, 2015
2013
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis.
Proceedings of the IEEE 11th International Conference on Dependable, 2013
2011
Memory errors prevention technology for C/C++ program based on probability.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011
2009
Metamorphic malware detection technology based on aggregating emerging patterns.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2006
Embedded Intelligence: Enabling In-Situ Power Management for Wireless Sensor Networks.
Proceedings of the Smart Sensing and Context, First European Conference, EuroSSC 2006, 2006