Chaojing Tang

Orcid: 0000-0002-9025-2791

According to our database1, Chaojing Tang authored at least 70 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective.
Symmetry, 2022

Pusher: an augmented fuzzer based on the connection between input and comparison operand.
Frontiers Comput. Sci., 2022

Default: Mutual Information-based Crash Triage for Massive Crashes.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Evocatio: Conjuring Bug Capabilities from a Single PoC.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Low-complexity sphere decoding for MIMO-SCMA systems.
IET Commun., 2021

Reducing Test Cases with Attention Mechanism of Neural Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

Igor: Crash Deduplication Through Root-Cause Clustering.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Number of quantum measurement outcomes as a resource.
Quantum Inf. Process., 2020

2019
Multi-Dimensional Space-Time Block Coding Aided Downlink MIMO-SCMA.
IEEE Trans. Veh. Technol., 2019

Uplink Spatial Modulation SCMA System.
IEEE Commun. Lett., 2019

Marking Key Segment of Program Input via Attention Mechanism.
IEEE Access, 2019

NeuralTaint: A Key Segment Marking Tool Based on Neural Network.
IEEE Access, 2019

Program State Sensitive Parallel Fuzzing for Real World Software.
IEEE Access, 2019

Grant-Free Rateless SCMA for Cellular Internet of Things Networks.
IEEE Access, 2019

Locating Vulnerability in Binaries Using Deep Neural Networks.
IEEE Access, 2019

A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks.
IEEE Access, 2019

Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game.
IEEE Access, 2019

2018
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression.
Secur. Commun. Networks, 2018

Discover deeper bugs with dynamic symbolic execution and coverage-based fuzz testing.
IET Softw., 2018

Formal Method for Security Analysis of Electronic Payment Protocols.
IEICE Trans. Inf. Syst., 2018

Improved Wolf Pack Algorithm Based on Differential Evolution Elite Set.
IEICE Trans. Inf. Syst., 2018

A real-time inversion attack on the GMR-2 cipher used in the satellite phones.
Sci. China Inf. Sci., 2018

Design and Optimization of Joint Iterative Detection and Decoding Receiver for Uplink Polar Coded SCMA System.
IEEE Access, 2018

Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin.
IEEE Access, 2018

Joint Iterative Detection and Decoding Receiver for Polar Coded SCMA System.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Parallelization of Extracting Binary Program Execution Trace Offline.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

A Large-scale Parallel Fuzzing System.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

Improved wolf pack algorithm with differential evolution for global numerical optimization.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

2017
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs.
Secur. Commun. Networks, 2017

Novel Logical Method for Security Analysis of Electronic Payment Protocols.
CoRR, 2017

Area-Dividing Route Mutation in Moving Target Defense Based on SDN.
Proceedings of the Network and System Security - 11th International Conference, 2017

An Intelligent Strategy to Gain Profit for Bitcoin Mining Pools.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

A Novel Hybrid Based on Wolf Pack Algorithm and Differential Evolution Algorithm.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

An efficient strategy to eliminate malleability of bitcoin transaction.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Detecting integer overflow in Windows binary executables based on symbolic execution.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Analyzing network protocol binary software with joint symbolic execution.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

Nose Tip Detection and Face Localization from Face Range Image Based on Multi-angle Energy.
Proceedings of the E-Learning and Games - 10th International Conference, 2016

Testing Network Protocol Binary Software with Selective Symbolic Execution.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Predicting buffer overflow using semi-supervised learning.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party.
Quantum Inf. Process., 2015

Diversity gain of lattice constellation-based joint orthogonal space-time block coding.
IET Commun., 2015

Robust nose tip detection for face range images based on local features in scale-space.
Proceedings of the 2015 International Conference on 3D Imaging, 2015

Software Vulnerability Detection Based on Code Coverage and Test Cost.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Protocol Reverse Engineering Using LDA and Association Analysis.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer.
Secur. Commun. Networks, 2014

Differential phase shift quantum private comparison.
Quantum Inf. Process., 2014

RFID seeking: Finding a lost tag rather than only detecting its missing.
J. Netw. Comput. Appl., 2014

Efficient centralized track initiation method for multistatic radar.
Proceedings of the 17th International Conference on Information Fusion, 2014

Find Dense Correspondence between High Resolution Non-rigid 3D Human Faces.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014

2013
Another Improvement of LMAP++: An RFID Authentication Protocol.
Proceedings of the Trustworthy Computing and Services, 2013

Automatic classification for vulnerability based on machine learning.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Software Defect Prediction Using Dynamic Support Vector Machine.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks.
KSII Trans. Internet Inf. Syst., 2012

Completely decoupled space-time block codes with low-rate feedback.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Key Privacy in McEliece Public Key Cryptosystem.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
A Cyclotomic Lattice Based Quasi-Orthogonal STBC for Eight Transmit Antennas.
IEEE Signal Process. Lett., 2010

Misbehavior Detection Algorithm in CCSDS Space Telecommand System.
IEEE Commun. Lett., 2010

Achieving space and time diversity by using lattice constellation based joint Alamouti coding.
IEEE Commun. Lett., 2010

2009
Application and performance analysis of various AEAD techniques for space telecommand authentication.
IEEE Trans. Wirel. Commun., 2009

Recursive channel estimation algorithms for iterative receiver in MIMO-OFDM systems.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Low Complexity Variational Bayes Iterative Receiver for MIMO-OFDM Systems.
Proceedings of IEEE International Conference on Communications, 2009

Improved design of two and four-group decodable STBCs with larger diversity product for eight transmit antennas.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation.
Proceedings of the International Symposium on Information Processing, 2008

2005
On the Security of Two Key-Updating Signature Schemes.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005


  Loading...