Bin Liang

According to our database1, Bin Liang authored at least 26 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

SLF: fuzzing without valid seed inputs.
Proceedings of the 41st International Conference on Software Engineering, 2019

Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
NAR-miner: discovering negative association rules from code for bug detection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Deep Text Classification Can be Fooled.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction.
CoRR, 2017

Deep Text Classification Can be Fooled.
CoRR, 2017

Fine-Grained Fingerprinting Threats to Software-Defined Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurrency and Computation: Practice and Experience, 2016

Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016

AntMiner: mining more bugs by reducing noise interference.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015

Android Implicit Information Flow Demystified.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

HDROP: Detecting ROP Attacks Using Performance Monitoring Counters.
Proceedings of the Information Security Practice and Experience, 2014

AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction.
Proceedings of the 36th International Conference on Software Engineering, 2014

Scriptless Timing Attacks on Web Browser Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2011
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Detecting stealthy malware with inter-structure and imported signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009


  Loading...