Binbin Zhao

Orcid: 0000-0002-2025-1291

According to our database1, Binbin Zhao authored at least 35 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Spatio-temporal forecasting of landslide hazard in Chongqing National Transmission Protection Regions, China.
Int. J. Digit. Earth, December, 2024

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024

The Growth of Contemporary Music Subject and the Reform of Music Teaching in Universities.
Int. J. Web Based Learn. Teach. Technol., 2024

Advanced risk assessment framework for land subsidence impacts on transmission towers in salt lake region.
Environ. Model. Softw., 2024

FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization.
CoRR, 2024

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
The Prediction of Transmission Towers' Foundation Ground Subsidence in the Salt Lake Area Based on Multi-Temporal Interferometric Synthetic Aperture Radar and Deep Learning.
Remote. Sens., October, 2023

Precise Measurement of Magnetic Shielding Residual Field and Light Shift Based on <sup>87</sup>Rb Atomic Magnetometer.
IEEE Trans. Instrum. Meas., 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2022

A Novel Near-Real-Time GB-InSAR Slope Deformation Monitoring Method.
Remote. Sens., 2022

Susceptibility Analysis of Land Subsidence along the Transmission Line in the Salt Lake Area Based on Remote Sensing Interpretation.
Remote. Sens., 2022

EMS: History-Driven Mutation for Coverage-based Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SLIME: program-sensitive energy allocation for fuzzing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
Recent Advances in Self-Powered Piezoelectric and Triboelectric Sensors: From Material and Structure Design to Frontier Applications of Artificial Intelligence.
Sensors, 2021

Susceptibility Assessment for Landslide Initiated along Power Transmission Lines.
Remote. Sens., 2021

A 2-order additive fuzzy measure identification method based on intuitionistic fuzzy sets and its application in credit evaluation.
J. Intell. Fuzzy Syst., 2021

Basketball shooting technology based on acceleration sensor fusion motion capture technology.
EURASIP J. Adv. Signal Process., 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Deformation Monitoring of Earth Fissure Hazards Using Terrestrial Laser Scanning.
Sensors, 2019

Refinement of Landslide Susceptibility Map Using Persistent Scatterer Interferometry in Areas of Intense Mining Activities in the Karst Region of Southwest China.
Remote. Sens., 2019

Assembling deviation estimation based on the real mating status of assembly.
Comput. Aided Des., 2019

Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019

2018
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2016
虚拟分组撤销策略的云存储访问控制模型 (Virtual Group Revocation Policy-based Cloud Storage Access Control Model).
计算机科学, 2016

2015
A practical technique to solve settlements overlapping roads problem in map generalization.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
Research on change classification description and identification of corresponding area objects in multi-scale maps.
Proceedings of the 22nd International Conference on Geoinformatics, 2014

2012
Application of Bi-Dimensional Empirical Mode Decomposition (BEMD) in Extraction of platinum and palladium Anomalies Features.
Adv. Data Sci. Adapt. Anal., 2012

2011
Application of BEMD in extraction of regional and local gravity anomalies associated with Au mineralization within Western Shandong Uplift Block, Eastern China.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
Bidimensional empirical mode decomposition (BEMD) for extraction of gravity anomalies associated with gold mineralization in the Tongshi gold field, Western Shandong Uplifted Block, Eastern China.
Comput. Geosci., 2010

2009
Application of Scale Invariant Generator in Quantitative Extraction of Ore-forming Information from Gravitational Data: A Case Study from Tongshi Gold Field, Eastern China.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009


  Loading...