Hong Li
Orcid: 0000-0003-1353-7838Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing Key Laboratory of IOT Information Security, China
According to our database1,
Hong Li
authored at least 91 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., December, 2024
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers.
ACM Trans. Softw. Eng. Methodol., May, 2024
ACM Trans. Softw. Eng. Methodol., February, 2024
IEEE Trans. Mob. Comput., January, 2024
Multi-granularity cross-modal representation learning for named entity recognition on social media.
Inf. Process. Manag., January, 2024
CoRR, 2024
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023
IEEE Trans. Computers, October, 2023
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.
Knowl. Inf. Syst., October, 2023
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks.
Comput. Secur., September, 2023
Owner name entity recognition in websites based on multiscale features and multimodal co-attention.
Expert Syst. Appl., August, 2023
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA.
IEEE Internet Things J., July, 2023
IEEE Internet Things J., April, 2023
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.
IEEE Trans. Dependable Secur. Comput., 2023
Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer.
Int. J. Intell. Syst., 2023
A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments.
CoRR, 2023
Comput. Secur., 2023
DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries.
Proceedings of the IEEE Military Communications Conference, 2023
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
FlowEmbed: Binary function embedding model based on relational control flow graph and byte sequence.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Database Systems for Advanced Applications. DASFAA 2023 International Workshops, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain.
IEEE Internet Things J., 2022
Reinforcement learning based adversarial malware example generation against black-box detectors.
Comput. Secur., 2022
Joint Classification of IoT Devices and Relations in the Internet with Network Traffic.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
Proceedings of the Security and Privacy in Communication Networks, 2022
Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence.
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the Wireless Sensor Networks - 16th China Conference, 2022
2021
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Emerging Technologies for Education - 6th International Symposium, 2021
2020
Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2020
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.
Future Gener. Comput. Syst., 2020
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Wireless Sensor Networks - 14th China Conference, 2020
2019
IEEE Trans. Serv. Comput., 2019
Detecting stealthy attacks against industrial control systems based on residual skewness analysis.
EURASIP J. Wirel. Commun. Netw., 2019
Cybersecur., 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2018
Wirel. Commun. Mob. Comput., 2018
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining.
Math. Found. Comput., 2018
Int. J. Distributed Sens. Networks, 2018
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications.
IEEE Access, 2018
IEEE Access, 2018
Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
Wirel. Commun. Mob. Comput., 2017
Mitigating Data Sparsity Using Similarity Reinforcement-Enhanced Collaborative Filtering.
ACM Trans. Internet Techn., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017
2016
EURASIP J. Wirel. Commun. Netw., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016
2015
IEEE Commun. Mag., 2015
2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014