Zhiqiang Shi

Orcid: 0000-0001-6168-8003

According to our database1, Zhiqiang Shi authored at least 44 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge.
ACM Trans. Softw. Eng. Methodol., January, 2024

Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning.
Proc. ACM Softw. Eng., 2024

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions.
CoRR, 2024

TaiE: Function Identification for Monolithic Firmware.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

DeLink: Source File Information Recovery in Binaries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Differential Privacy Generative Adversarial Networks in Recommendation Systems.
Proceedings of the 2024 4th International Conference on Artificial Intelligence, 2024

2023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023

VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware.
Comput. Secur., March, 2023

SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2023

2022
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

Research on Path Planning of Mobile Robot Based on Improved Theta* Algorithm.
Algorithms, 2022

Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
A Robust IoT Device Identification Method with Unknown Traffic Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Transformer-XL With Graph Neural Network for Source Code Summarization.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

PMatch: Semantic-based Patch Detection for Binary Programs.
Proceedings of the IEEE International Performance, 2021

Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Research on Test Method of C2 System's VMF interoperation function.
Proceedings of the CSAI 2020: 2020 4th International Conference on Computer Science and Artificial Intelligence, 2020

2019
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

HIMALIA: Recovering Compiler Optimization Levels from Binaries by Deep Learning.
Proceedings of the Intelligent Systems and Applications, 2018

Sbsd: Detecting the Sequence Attack through Sensor Data in ICSs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Defense Against Advanced Persistent Threats with Expert System for Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Poster: Towards Fully Distributed User Authentication with Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

On eavesdropping attacks and countermeasures for MU-MIMO systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

2015
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
An Energy Efficient Data Transmission Mechanism for Middleware of Wireless Sensor Network.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Image Completion Using Global Patch Matching and Optimal Seam Synthesis.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Security of Cyber Physical System.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

2013
MERPL: A more memory-efficient storing mode in RPL.
Proceedings of the 19th IEEE International Conference on Networks, 2013

ST-XCP: A Stable XCP Protocol.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
An Open Conformance Test System towards the Standardization of Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

2011
Smoothing the XCP sender.
Proceedings of the 17th IEEE International Conference on Networks, 2011

Congestion Control in Networks with Mixed IP and P2P Traffic.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Transmission scheduling for multi-homed transport protocols with network failure tolerance.
Telecommun. Syst., 2010

2009
Mobility support using the mobile port mapping.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

2005
A Discovery Algorithm for Physical Topology in Switched Ethernets.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

2003
Robust Clustering of Acoustic Emission Signals Using Neural Networks and Signal Subspace Projections.
EURASIP J. Adv. Signal Process., 2003

2001
Acoustic emission classification using signal subspace projections.
Proceedings of the IEEE International Conference on Acoustics, 2001

PID autotuning for integrating processes with specifications on gain and phase margins.
Proceedings of the American Control Conference, 2001


  Loading...