Bodong Li

Orcid: 0000-0001-7427-9057

According to our database1, Bodong Li authored at least 22 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison.
IEEE Trans. Software Eng., 2021

2020
Target tracker with masked discriminative correlation filter.
IET Image Process., 2020

2019
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Sensors and Instrumentation for Downhole Environments - Challenges and Opportunities.
Proceedings of the 13th International Conference on Sensing Technology, 2019

Instruments, Measurement Principles and Communication Technologies for Downhole Drilling Environments
Smart Sensors, Measurement and Instrumentation 32, Springer, ISBN: 978-3-030-04899-0, 2019

2018
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018

The complex data denoising in MR images based on the directional extension for the undecimated wavelet transform.
Biomed. Signal Process. Control., 2018

BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017

Downhole Applications of Magnetic Sensors.
Sensors, 2017

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2015
A method to initialize free parameters in lattice structure of arbitrary-length linear phase perfect reconstruction filter bank.
Signal Process., 2015

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

SSG: Sensor Security Guard for Android Smartphones.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Lattice Structure for Regular Linear Phase Paraunitary Filter Bank With Odd Decimation Factor.
IEEE Signal Process. Lett., 2014

A method for initializing free parameters in lattice structure of linear phase perfect reconstruction filter bank.
Signal Process., 2014

A Novel Image Fusion Method based on Translation Invariant Wavelet Transforms.
J. Softw., 2014

2013
Lattice Structure for Generalized-Support Multidimensional Linear Phase Perfect Reconstruction Filter Bank.
IEEE Trans. Image Process., 2013

2012
A New Design Method of the Starting Block in Lattice Structure of Arbitrary-Length Linear Phase Paraunitary Filter Bank by Combining Two Polyphase Matrices.
IEEE Trans. Circuits Syst. II Express Briefs, 2012

2009
Construction of Arbitrary Dimensional Biorthogonal Multiwavelet Using Lifting Scheme.
IEEE Trans. Image Process., 2009

2007
Prediction of Transmembrane Helix Using a Compound Neural Network.
Proceedings of the Third International Conference on Natural Computation, 2007


  Loading...