Bing Mao
Orcid: 0000-0002-2374-549X
According to our database1,
Bing Mao
authored at least 78 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Performance-Guaranteed Finite-Time Tracking for Uncertain Strict-Feedback Nonlinear Systems.
IEEE Trans. Circuits Syst. II Express Briefs, January, 2024
2023
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search.
Int. J. Softw. Eng. Knowl. Eng., October, 2023
Int. J. Softw. Eng. Knowl. Eng., October, 2023
Comput. Secur., June, 2023
Predefined-Time Bounded Consensus of Multiagent Systems With Unknown Nonlinearity via Distributed Adaptive Fuzzy Control.
IEEE Trans. Cybern., April, 2023
Global adaptive fuzzy consensus control of nonlinear multi-agent systems via distributed event-triggered communication.
J. Frankl. Inst., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
2022
Fixed-Time Synchronization in the pth Moment for Time-Varying Delay Stochastic Multilayer Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2022
SIAM J. Control. Optim., 2022
Adaptive Fuzzy Tracking Control with Global Prescribed-Time Prescribed Performance for Uncertain Strict-Feedback Nonlinear Systems.
CoRR, 2022
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy.
Proceedings of the IEEE International Conference on Software Analysis, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Nimbus: Toward Speed Up Function Signature Recovery via Input Resizing and Multi-Task Learning.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Uncertainty-guided Mutual Consistency Training for Semi-supervised Biomedical Relation Extraction.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
2021
IEEE Trans. Software Eng., 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Formation Tracking of Second-Order Multi-Agent Systems With Multiple Leaders Based on Sampled Data.
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Finite-Time Intra-Layer and Inter-Layer Quasi-Synchronization of Two-Layer Multi-Weighted Networks.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
AEFNet: Adaptive Scale Feature Based on Elastic-and-Funnel Neural Network for Healthcare Representation.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
2019
J. Comput. Sci. Technol., 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks.
EAI Endorsed Trans. Security Safety, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Detection, Classification and Characterization of Android Malware Using API Data Dependency.
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Int. J. Inf. Sec., 2012
Proceedings of the Information Security and Privacy Research, 2012
CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
2009
Proceedings of the Information Systems Security, 5th International Conference, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009
2006
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Advances in Computer Science, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
ACM SIGOPS Oper. Syst. Rev., 2005
2004
The design and implementation of a runtime system for graph-oriented parallel and distributed programming.
J. Syst. Softw., 2004
1999
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999