Liehui Jiang
According to our database1,
Liehui Jiang
authored at least 32 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024
Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
Expert Syst. Appl., November, 2023
IEEE Trans. Dependable Secur. Comput., 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system.
Concurr. Comput. Pract. Exp., 2022
Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
2020
Determining the base address of MIPS firmware based on absolute address statistics and string reference matching.
Comput. Secur., 2020
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
2019
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps.
Int. J. Distributed Sens. Networks, 2019
Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method.
Concurr. Comput. Pract. Exp., 2019
A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving.
IEEE Access, 2019
2018
Wirel. Pers. Commun., 2018
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment.
Secur. Commun. Networks, 2018
KSII Trans. Internet Inf. Syst., 2018
Towards a multilayered permission-based access control for extending Android security.
Concurr. Comput. Pract. Exp., 2018
2017
MIPE: a practical memory integrity protection method in a trusted execution environment.
Clust. Comput., 2017
Proceedings of the Information Security Practice and Experience, 2017
2016
计算机科学, 2016
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment.
Proceedings of the 6th International Conference on Communication and Network Security, 2016
A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
基于存储访问模型的细粒度存储变量识别算法 (Fine-grained Variable Entity Identification Algorithm Based on Memory Access Model).
计算机科学, 2015
2014
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2012
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012
2010
2009
Proceedings of the Advances in Software Engineering, 2009
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.
Proceedings of the Security Technology, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the High Performance Computing and Applications, 2009