Donghai Tian

Orcid: 0000-0003-2217-4514

According to our database1, Donghai Tian authored at least 37 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SYNTONY: Potential-aware fuzzing with particle swarm optimization.
J. Syst. Softw., February, 2024

A novel malware detection method based on API embedding and API parameters.
J. Supercomput., January, 2024

2023
ELAMD: An ensemble learning framework for adversarial malware defense.
J. Inf. Secur. Appl., June, 2023

2022
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising.
IEEE Trans. Cloud Comput., 2022

Towards time evolved malware identification using two-head neural network.
J. Inf. Secur. Appl., 2022

CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022

MDCD: A malware detection approach in cloud using deep learning.
Trans. Emerg. Telecommun. Technol., 2022

2021
BinDeep: A deep learning approach to binary code similarity detection.
Expert Syst. Appl., 2021

CMFuzz: context-aware adaptive mutation for fuzzers.
Empir. Softw. Eng., 2021

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021

2020
MSYM: A multichannel communication system for android devices.
Comput. Networks, 2020

VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
KEcruiser: A novel control flow protection for kernel extensions.
Future Gener. Comput. Syst., 2019

An online approach to defeating ROP attacks∗.
Concurr. Comput. Pract. Exp., 2019

E-WBM: An Effort-Based Vulnerability Discovery Model.
IEEE Access, 2019

A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning.
IEEE Access, 2019

2018
A policy-centric approach to protecting OS kernel from vulnerable LKMs.
Softw. Pract. Exp., 2018

Binary Obfuscation Based Reassemble.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

2017
An Online Approach for Kernel-level Keylogger Detection and Defense.
J. Inf. Sci. Eng., 2017

A Practical Method to Confine Sensitive API Invocations on Commodity Hardware.
Proceedings of the Network and System Security - 11th International Conference, 2017

FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

An Online Approach to Defeating Return-Oriented-Programming Attacks.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016

2015
Dynamic Tracking Reinforcement Based on Simplified Control Flow.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
A Virtualization-Based Approach for Application Whitelisting.
IEICE Trans. Inf. Syst., 2014

iCruiser: An Improved Approach for Concurrent Heap Buffer Overflow Monitoring.
IEICE Trans. Inf. Syst., 2014

Defeating buffer overflow attacks via virtualization.
Comput. Electr. Eng., 2014

Software Cruising: A New Technology for Building Concurrent Software Monitor.
Proceedings of the Secure Cloud Computing, 2014

2013
Semantic aware attribution analysis of remote exploits.
Secur. Commun. Networks, 2013

Efficient Shellcode Detection on Commodity Hardware.
IEICE Trans. Inf. Syst., 2013

2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits.
Proceedings of the Security and Privacy in Communication Networks, 2011

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Proceedings of the Network and Distributed System Security Symposium, 2011

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011

2010
Protecting Kernel Data through Virtualization Technology.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010

2009
Hierarchical Distributed Alert Correlation Model.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...