Baojiang Cui

Orcid: 0000-0001-6937-4068

According to our database1, Baojiang Cui authored at least 162 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A formal security analysis of the fast authentication procedure based on the security context in 5G networks.
Soft Comput., February, 2024

Ins Finder: A Practical CPU Undocumented Instruction Detection Framework.
J. Circuits Syst. Comput., February, 2024

Formal Analysis of 5G EAP-TLS 1.3.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

A DPI-Based Network Traffic Feature Vector Optimization Model.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Network Scanning Detection Based on Spatiotemporal Behavior.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding Network.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Fuzzing IoT Devices via Android App Interfaces with Large Language Model.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees Algorithm.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

2023
Deep neural network pruning method based on sensitive layers and reinforcement learning.
Artif. Intell. Rev., November, 2023

Watching your call: Breaking VoLTE Privacy in LTE/5G Networks.
Proc. Priv. Enhancing Technol., April, 2023

An Attack to One-Tap Authentication Services in Cellular Networks.
IEEE Trans. Inf. Forensics Secur., 2023

On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks.
Sensors, 2023

Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network.
Comput. Commun., 2023

IPT-CFI: Control Flow Integrity Vulnerability Detection Based on Intel Processor Trace.
Proceedings of the Advances in Internet, Data & Web Technologies, 2023

Traffic-Oriented Shellcode Detection Based on VSM.
Proceedings of the Advances in Internet, Data & Web Technologies, 2023

A Vulnerability Detection Method for SDN with Optimized Fuzzing.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Defending Trace-Back Attack in 3D Wireless Internet of Things.
IEEE/ACM Trans. Netw., 2022

A novel privacy-aware model for nonparametric decentralized detection.
Comput. Secur., 2022

Attacks Against Security Context in 5G Network.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

Research on 6G Satellite-Terrestrial Integrated Network Architecture.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

Software Control Flow Anomaly Detection Technology Based On Neural Network.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined Rules.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

2021
Firmware code instrumentation technology for internet of things-based services.
World Wide Web, 2021

A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure.
Secur. Commun. Networks, 2021

A novel model for anomaly detection in network traffic based on kernel support vector machine.
Comput. Secur., 2021

Simulation-Based Fuzzing for Smart IoT Devices.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Fuzzing with Multi-dimensional Control of Mutation Strategy.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and Classification.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

An ELF Recovery Method for Linux Malicious Process Detection.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Web Page Classification Based on Graph Neural Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

A GPU memory leakage code defect detection method based on the API calling feature.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

Smart Contract Vulnerability Detection Based on Symbolic Execution Technology.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

Malware Classification Based on Graph Neural Network Using Control Flow Graph.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

2020
Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT.
IEEE Trans. Ind. Informatics, 2020

Learning URL Embedding for Malicious Website Detection.
IEEE Trans. Ind. Informatics, 2020

Outsourced privacy-aware task allocation with flexible expressions in crowdsourcing.
Future Gener. Comput. Syst., 2020

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations.
Future Gener. Comput. Syst., 2020

IoTSIT: A Static Instrumentation Tool for IoT Devices.
IEEE Access, 2020

MLAB-BiLSTM: Online Web Attack Detection Via Attention-Based Deep Neural Networks.
Proceedings of the Security and Privacy in Digital Economy, 2020

A Novel Web Anomaly Detection Approach Based on Semantic Structure.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Reinforcement Learning-Based Fuzzing Technology.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Anomaly Network Traffic Detection Based on Deep Transfer Learning.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Research on Vulnerability Site Location and Vulnerability Similarity Technology.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

A Targeted Fuzzing Technique Based on Neural Networks and Particle Swarm Optimization.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

The Study and Realization of a Binary-Based Address Sanitizer Based on Code Injection.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

A Static Instrumentation Method for IoT Firmware ELF Binary Emulation Patching.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Research on Association Analysis Technology of Network Attack Trace Based on Web Log.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Greybox Fuzzing Based on Ant Colony Algorithm.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

Ontology-based services for software vulnerability detection: a survey.
Serv. Oriented Comput. Appl., 2019

Fuzzing method based on field filter and packet repair for GTPv2 protocol.
Internet Things, 2019

Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network.
IEEE Access, 2019

An SDN-Based Dynamic Security Architecture for Space Information Networks.
Proceedings of the Space Information Networks - 4th International Conference, 2019

A Static Instrumentation Method for ELF Binary.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Bidirectional LSTM: An Innovative Approach for Phishing URL Identification.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

State-Based Fuzzing for S1AP.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Recombining TCP sessions based on finite state machine to detect cyber attackers.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Obfuscation Algorithms Based on Congruence Equation and Knapsack Problem.
Proceedings of the Advances in Internet, 2019

Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition System.
Proceedings of the Advances in Internet, 2019

Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
An improved payload-based anomaly detector for web applications.
J. Netw. Comput. Appl., 2018

Searchable symmetric encryption based on the inner product for cloud storage.
Int. J. Web Grid Serv., 2018

Malicious URL detection with feature extraction based on machine learning.
Int. J. High Perform. Comput. Netw., 2018

A systematic review of fuzzing techniques.
Comput. Secur., 2018

Malicious Domain Name Recognition Based on Deep Neural Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Webshell Detection Technology Based on HTTP Traffic Analysis.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

The Study and Realization of Vulnerability-Oriented Fuzzing Technology for ActiveX Plug-Ins.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

C++ Memory Detection Tool Based on Dynamic Instrumentation.
Proceedings of the Advances in Internet, 2018

Fuzzing Test Method Based on Constraint-Conditions Priority for LTE-EPC Protocol.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Improved Secure ZigBee Light Link Touchlink Commissioning Protocol Design.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Study on Sensitive Data Protection Based on SEAndroid.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

An Adaptive Analysis Framework for Correlating Cyber-Security-Related Data.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework.
Soft Comput., 2017

Malware algorithm classification method based on big data analysis.
Int. J. Web Grid Serv., 2017

A review of data management and protocols for vehicular networks.
Int. J. Web Grid Serv., 2017

Uploading multiply deferrable big data to the cloud platform using cost-effective online algorithms.
Future Gener. Comput. Syst., 2017

Software Abnormal Behavior Detection Based on Hidden Markov Model.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Study on Android Native Layer Code Protection Based on Improved O-LLVM.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

A Data Masking Scheme for Sensitive Big Data Based on Format-Preserving Encryption.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Hinge Classification Algorithm Based on Asynchronous Gradient Descent.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Payload-Based Web Attack Detection Using Deep Neural Network.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Embedded System Vulnerability Mining Technology Based on In-memory Fuzzing Test.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Research on UPnP Protocol Security of Gateway Device.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Mocov: Model Based Fuzzing Through Coverage Guided Technology.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Detecting Malware Based on Opcode N-Gram and Machine Learning.
Proceedings of the Advances on P2P, 2017

2016
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage.
IEEE Trans. Computers, 2016

A taint based approach for automatic reverse engineering of gray-box file formats.
Soft Comput., 2016

CG-Fuzzing: a comprehensive fuzzy algorithm for ZigBee.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Design and analysis of secure mechanisms based on tripartite credibility for RFID systems.
Comput. Stand. Interfaces, 2016

Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Dynamic Taint Tracking of Web Application Based on Static Code Analysis.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Research on the Identification of Software Behavior in Anomaly Detection.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

The Performance Optimization of Hadoop during Mining Online Education Packets for Malware Detection.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Anomaly Detection Model Based on Hadoop Platform and Weka Interface.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Design and implementation of software consistency detection system based on Netty framework.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

An Attack Detection System for Multiple Web Applications Based on Big Data Platform.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

The generation of XSS attacks developing in the detect detection.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A program behavior recognition algorithm based on assembly instruction sequence similarity.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language.
Trans. Comput. Collect. Intell., 2015

Service-oriented mobile malware detection system based on mining strategies.
Pervasive Mob. Comput., 2015

Enhanced Key Management Protocols for Wireless Sensor Networks.
Mob. Inf. Syst., 2015

Improved collaborative filtering with intensity-based contraction.
J. Ambient Intell. Humaniz. Comput., 2015

A practical off-line taint analysis framework and its application in reverse engineering of file format.
Comput. Secur., 2015

Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Security Analysis of Openstack Keystone.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An AST-based Code Plagiarism Detection Algorithm.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Space Time Protocol Based on IEEE1588.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Static-Based Test Case Dynamic Generation for SQLIVs Detection.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

The Research of Aspect-Oriented Dynamic Analysis Based on Static Analysis.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

ADDFuzzer: A New Fuzzing Framework of Android Device Drivers.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Detection of LTE Protocol Based on Format Fuzz.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature Extraction.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Study on Security Protocol Analysis and Design Technology for RFID System.
Proceedings of the 10th International Conference on P2P, 2015

Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Novel Fuzzing Method for Zigbee Based on Finite State Machine.
Int. J. Distributed Sens. Networks, 2014

Multi-key Searchable Encryption without Random Oracle.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Sentence Similarity Based on Semantic Vector Model.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

An Enhanced Secure Mechanism of Low Level Reader Protocol (LLRP) V1.1.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Security Analysis of TAU Procedure in LTE Network.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Mining Mobile Internet Packets for Malware Detection.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

JavaScript Malicious Codes Analysis Based on Naive Bayes Classification.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

OpenSSL HeartBleed: Security Management of Implements of Basic Protocols.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

A Security Enhanced IEEE1588 Protocol for Deep-Space Environment.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
A novel vulnerability detection method for ZigBee MAC layer.
Int. J. Grid Util. Comput., 2013

Synthesis Algorithm of Homology Detection Based on AHP.
Int. J. Comput. Intell. Syst., 2013

Improving Association Rules by Optimizing Discretization Based on a Hybrid GA: A Case Study of Data from Forest Ecology Stations in China.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

A Code Comparison Algorithm Based on AST for Plagiarism Detection.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

RFSM-Fuzzing a Smart Fuzzing Algorithm Based on Regression FSM.
Proceedings of the Eighth International Conference on P2P, 2013

2012
A Secure Hierarchical Key Management Scheme in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2012

2011
Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification.
J. Multim., 2011

Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Homology Detection Based on Abstract Syntax Tree Combined Simple Semantics Analysis.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

2004
Study on Performance of IP-SWAN Based on Distributed NS-RAID.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004


  Loading...