Jianming Fu

Orcid: 0000-0002-4639-5824

According to our database1, Jianming Fu authored at least 61 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks.
IEEE Trans. Mob. Comput., July, 2024

EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones.
IEEE Internet Things J., February, 2024

A survey on the evolution of fileless attacks and detection techniques.
Comput. Secur., February, 2024

Modeling implicit variable and latent structure for aspect-based sentiment quadruple extraction.
Neurocomputing, 2024

2023
Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing.
IEEE Trans. Inf. Forensics Secur., 2023

PointerScope: Understanding Pointer Patching for Code Randomization.
IEEE Trans. Dependable Secur. Comput., 2023

A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Error-Related Negativity-Based Robot-Assisted Stroke Rehabilitation System: Design and Proof-of-Concept.
Frontiers Neurorobotics, 2022

Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning.
Appl. Soft Comput., 2022

Design of a Cable-Driven Interactive Rehabilitation Device with 3D Trajectory Tracking and Force Feedback.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

2021
Assessing the Security of Campus Networks: The Case of Seven Universities.
Sensors, 2021

Occupational Therapy Assessment for Upper Limb Rehabilitation: A Multisensor-Based Approach.
Frontiers Digit. Health, 2021

Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT.
Comput. Networks, 2021

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.
Proceedings of the 30th USENIX Security Symposium, 2021

Robot-Assisted quantitative assessment of axis misalignment of wrist joint.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2021

App's Auto-Login Function Security Testing via Android OS-Level Virtualization.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

An Immersive Motor Imagery Training System for Post-Stroke Rehabilitation Combining VR and EMG-based Real-Time Feedback.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
An Efficient Deep Learning Based Method for Speech Assessment of Mandarin-Speaking Aphasic Patients.
IEEE J. Biomed. Health Informatics, 2020

Event evolution model for cybersecurity event mining in tweet streams.
Inf. Sci., 2020

MFRep: Joint user and employer alignment across heterogeneous social networks.
Neurocomputing, 2020

SPWalk: Similar Property Oriented Feature Learning for Phishing Detection.
IEEE Access, 2020

A Longitudinal Investigation of the Efficacy of Supported In-Home Post-Stroke Rehabilitation.
IEEE Access, 2020

Family Identification of AGE-Generated Android Malware Using Tree-Based Feature.
Proceedings of the 19th IEEE International Conference on Trust, 2020

VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

JTaint: Finding Privacy-Leakage in Chrome Extensions.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
A Novel Multistandard Compliant Hand Function Assessment Method Using an Infrared Imaging Device.
IEEE J. Biomed. Health Informatics, 2019

Error-Related Neural Responses Recorded by Electroencephalography During Post-stroke Rehabilitation Movements.
Frontiers Neurorobotics, 2019

Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram.
CoRR, 2019

Web Scanner Detection Based on Behavioral Differences.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

"Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

2018
Function Risk Assessment Under Memory Leakage.
Proceedings of the International Conference on Networking and Network Applications, 2018

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Development of a Pneumatic Robotic System for Bilateral Upper Limb Interactive Training with Variable Resistance.
Proceedings of the 2018 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2018

2017
Social Bots Detection on Mobile Social Networks.
Int. J. Netw. Secur., 2017

FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection.
Proceedings of the Security and Privacy in Communication Networks, 2017

An Empirical Study of Unsolicited Content Injection into a Website.
Proceedings of the International Conference on Networking and Network Applications, 2017

Curtain: Keep Your Hosts Away from USB Attacks.
Proceedings of the Information Security - 20th International Conference, 2017

2016
SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network.
Secur. Commun. Networks, 2016

Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Android App Malicious Behavior Detection Based on User Intention.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Impact of Environment on Branch Transfer of Software.
Proceedings of the Security and Privacy in Communication Networks, 2016

Control Flow Integrity Enforcement with Dynamic Code Optimization.
Proceedings of the Information Security - 19th International Conference, 2016

2015
一种安全风险可控的弹性移动云计算通用框架 (Risk-controllable Common Elastic Mobile Cloud Computing Framework).
计算机科学, 2015

An Instruction-Set Randomization Using Length-Preserving Permutation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Computation Integrity Measurement Based on Branch Transfer.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
A Fuzzing Framework Based on Symbolic Execution and Combinatorial Testing.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Motion recognition for unsupervised hand rehabilitation using support vector machine.
Proceedings of the 2012 IEEE Biomedical Circuits and Systems Conference, 2012

2011
Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Research on theory and key technology of trusted computing platform security testing and evaluation.
Sci. China Inf. Sci., 2010

2008
Fingerprinting Executable Programs Based on Color Moments of a Novel Abstract Call Graph.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

PerformTrust: Trust model integrated past and current performance in P2P file sharing systems.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
A Worm Containment Model Based on Neighbor-Alarm.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Assigning Block Size Based on Speculation for Parallel Downloading.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
An Adaptive Service Strategy Based on User Rating in P2P.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

An Optimistic Fair Protocol for P2P Chained Transaction.
Proceedings of the Advances in Computer Science, 2005

2004
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Modeling the Behavior of Ada Tasks and Verifying Its Safety.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004


  Loading...