دنبال کردن
Hongliang Liang
Hongliang Liang
ایمیل تأیید شده در bupt.edu.cn
عنوان
نقل شده توسط
نقل شده توسط
سال
Fuzzing: State of the art
H Liang, X Pei, X Jia, W Shen, J Zhang
IEEE Transactions on Reliability 67 (3), 1199-1218, 2018
3162018
Seml: A semantic LSTM model for software defect prediction
H Liang, Y Yu, L Jiang, Z Xie
IEEe Access 7, 83812-83824, 2019
1322019
Deep learning with customized abstract syntax tree for bug localization
H Liang, L Sun, M Wang, Y Yang
IEEE Access 7, 116309-116320, 2019
772019
Sequence directed hybrid fuzzing
H Liang, L Jiang, L Ai, J Wei
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
412020
Sequence coverage directed greybox fuzzing
H Liang, Y Zhang, Y Yu, Z Xie, L Jiang
2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC …, 2019
392019
Establishing trusted i/o paths for sgx client systems with aurora
H Liang, M Li, Y Chen, L Jiang, Z Xie, T Yang
IEEE Transactions on Information Forensics and Security 15, 1589-1600, 2019
332019
An end-to-end model for android malware detection
H Liang, Y Song, D Xiao
2017 IEEE International Conference on Intelligence and Security Informatics …, 2017
302017
MLSA: A static bugs analysis tool based on LLVM IR
H Liang, L Wang, D Wu, J Xu
2016 17th IEEE/ACIS International Conference on Software Engineering …, 2016
272016
Modeling function-level interactions for file-level bug localization
H Liang, D Hang, X Li
Empirical Software Engineering 27 (7), 186, 2022
212022
FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching
H Liang, Z Xie, Y Chen, H Ning, J Wang
Computers & Security 99, 102032, 2020
212020
Bring the missing jigsaw back: Trustedclock for sgx enclaves
H Liang, M Li
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
202018
Fog-cloud task scheduling of energy consumption optimisation with deadline consideration
J Xu, X Sun, R Zhang, H Liang, Q Duan
International Journal of Internet Manufacturing and Services 7 (4), 375-392, 2020
172020
Jsac: A novel framework to detect malicious javascript via cnns over ast and cfg
H Liang, Y Yang, L Sun, L Jiang
2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019
162019
Survey on privacy protection of android devices
H Liang, D Wu, J Xu, H Ma
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
162015
Enforcing multiple security policies for android system
T Guo, P Zhang, H Liang, S Shao
2nd International Symposium on Computer, Communication, Control and …, 2013
162013
Generative pre-trained transformer-based reinforcement learning for testing web application firewalls
H Liang, X Li, D Xiao, J Liu, Y Zhou, A Wang, J Li
IEEE Transactions on Dependable and Secure Computing 21 (1), 309-324, 2023
152023
Understanding and detecting performance and security bugs in IoT oses
H Liang, Q Zhao, Y Wang, H Liu
2016 17th IEEE/ACIS International Conference on Software Engineering …, 2016
152016
AST-path based compare-aggregate network for code clone detection
H Liang, L Ai
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
132021
Aurora: Providing trusted system services for enclaves on an untrusted system
H Liang, M Li, Q Zhang, Y Yu, L Jiang, Y Chen
arXiv preprint arXiv:1802.03530, 2018
132018
Design and implementation of a security label common framework
HL Liang, YF Sun, QS Zhao, XF Zhang, B Sun
Journal of Software 14 (3), 547-552, 2003
132003
سیستم در حال حاضر قادر به انجام عملکرد نیست. بعداً دوباره امتحان کنید.
مقاله‌ها 1–20