Bin Liang

According to our database1, Bin Liang authored at least 20 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Deep Text Classification Can be Fooled.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction.
CoRR, 2017

Deep Text Classification Can be Fooled.
CoRR, 2017

Fine-Grained Fingerprinting Threats to Software-Defined Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurrency and Computation: Practice and Experience, 2016

Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016

AntMiner: mining more bugs by reducing noise interference.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015

Android Implicit Information Flow Demystified.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

HDROP: Detecting ROP Attacks Using Performance Monitoring Counters.
Proceedings of the Information Security Practice and Experience, 2014

AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction.
Proceedings of the 36th International Conference on Software Engineering, 2014

Scriptless Timing Attacks on Web Browser Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2011
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Detecting stealthy malware with inter-structure and imported signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009


  Loading...