Bin Liang
Orcid: 0000-0002-4818-7164Affiliations:
- Renmin University of China, School of Information, Key Laboratory of Data Engineering and Knowledge Engineering, Beijing, China
According to our database1,
Bin Liang
authored at least 59 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Data-driven prognostics based on time-frequency analysis and symbolic recurrent neural network for fuel cells under dynamic load.
Reliab. Eng. Syst. Saf., May, 2023
IEEE Trans. Software Eng., April, 2023
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
CoRR, 2023
Data-driven prognostics based on time-frequency analysis and symbolic recurrent neural network for fuel cells under dynamic load.
CoRR, 2023
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Computers, 2022
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges.
Comput. Secur., 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Computers, 2021
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature.
CoRR, 2021
2020
IEEE Trans. Software Eng., 2020
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020
Do not jail my app: Detecting the Android plugin environments by time lag contradiction.
J. Comput. Secur., 2020
J. Comput. Secur., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Multiple-entry testing of Android applications by constructing activity launching contexts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
IEEE Trans. Software Eng., 2019
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
2017
一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation).
计算机科学, 2017
CoRR, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016
Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
2015
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction.
Proceedings of the 36th International Conference on Software Engineering, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2011
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
2005
Proceedings of the Computer Network Security, 2005
Proceedings of the Information Security Practice and Experience, 2005
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005