Web Page Classification Based on Graph Neural Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
C++ Memory Detection Tool Based on Dynamic Instrumentation.
Proceedings of the Advances in Internet, 2018
A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Research on UPnP Protocol Security of Gateway Device.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
A practical off-line taint analysis framework and its application in reverse engineering of file format.
Comput. Secur., 2015
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications.
Proceedings of the IEEE 12th International Conference on Dependable, 2014
SymWalker: Symbolic Execution in Routines of Binary Code.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Analysis on Password Protection in Android Applications.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Synthesis Algorithm of Homology Detection Based on AHP.
Int. J. Comput. Intell. Syst., 2013
Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013
Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification.
J. Multim., 2011
Ontology Model-Based Static Analysis of Security Vulnerabilities.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Security Assurance with Metamorphic Testing and Genetic Algorithm.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010
The Consistency of an Access Control List.
Proceedings of the Information and Communications Security, 4th International Conference, 2002