Bin Liang

Orcid: 0000-0002-4818-7164

Affiliations:
  • Renmin University of China, School of Information, Key Laboratory of Data Engineering and Knowledge Engineering, Beijing, China


According to our database1, Bin Liang authored at least 59 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

Define-Use Guided Path Exploration for Better Forced Execution.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Raisin: Identifying Rare Sensitive Functions for Bug Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
A collective attestation scheme towards cloud system.
Clust. Comput., October, 2023

Data-driven prognostics based on time-frequency analysis and symbolic recurrent neural network for fuel cells under dynamic load.
Reliab. Eng. Syst. Saf., May, 2023

Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering.
IEEE Trans. Software Eng., April, 2023

Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
CoRR, 2023

Data-driven prognostics based on time-frequency analysis and symbolic recurrent neural network for fuel cells under dynamic load.
CoRR, 2023

Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts.
IEEE Trans. Computers, 2022

Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges.
Comput. Secur., 2022

Hunting bugs with accelerated optimal graph vertex matching.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2021

Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness.
IEEE Trans. Computers, 2021

We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature.
CoRR, 2021

2020
Corrections to "Detecting Bugs by Discovering Expectations and Their Violations".
IEEE Trans. Software Eng., 2020

TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020

Do not jail my app: Detecting the Android plugin environments by time lag contradiction.
J. Comput. Secur., 2020

Identifying parasitic malware as outliers by code clustering.
J. Comput. Secur., 2020

Cecoin: A decentralized PKI mitigating MitM attacks.
Future Gener. Comput. Syst., 2020

On the fine-grained fingerprinting threat to software-defined networks.
Future Gener. Comput. Syst., 2020

SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Multiple-entry testing of Android applications by constructing activity launching contexts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Experimental Comparisons of Verifiable Delay Functions.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Detecting Bugs by Discovering Expectations and Their Violations.
IEEE Trans. Software Eng., 2019

ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Detecting concurrency memory corruption vulnerabilities.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

SLF: fuzzing without valid seed inputs.
Proceedings of the 41st International Conference on Software Engineering, 2019

DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
NAR-miner: discovering negative association rules from code for bug detection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Deep Text Classification Can be Fooled.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation).
计算机科学, 2017

Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction.
CoRR, 2017

Fine-Grained Fingerprinting Threats to Software-Defined Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016

Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016

AntMiner: mining more bugs by reducing noise interference.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015

Android Implicit Information Flow Demystified.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

HDROP: Detecting ROP Attacks Using Performance Monitoring Counters.
Proceedings of the Information Security Practice and Experience, 2014

AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction.
Proceedings of the 36th International Conference on Software Engineering, 2014

Scriptless Timing Attacks on Web Browser Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2011
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Detecting stealthy malware with inter-structure and imported signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2005
A Formal Description of SECIMOS Operating System.
Proceedings of the Computer Network Security, 2005

Security On-demand Architecture with Multiple Modules Support.
Proceedings of the Information Security Practice and Experience, 2005

Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005


  Loading...