Hongliang Liang

Orcid: 0000-0001-6877-780X

According to our database1, Hongliang Liang authored at least 54 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multiple Targets Directed Greybox Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2024

Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Value Peripheral Register Values for Fuzzing MCU Firmware.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

2022
Path context augmented statement and network for learning programs.
Empir. Softw. Eng., 2022

Modeling function-level interactions for file-level bug localization.
Empir. Softw. Eng., 2022

Detecting Exploit Primitives Automatically for Heap Vulnerabilities on Binary Programs.
CoRR, 2022

Multiple Targets Directed Greybox Fuzzing.
CoRR, 2022

Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2022

DEPA: Determining Exploit Primitives Automatically for Interactive Programs.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

2021
Architectural Protection of Trusted System Services for SGX Enclaves in Cloud Computing.
IEEE Trans. Cloud Comput., 2021

Parametric model order reduction based on parallel tensor compression.
Int. J. Syst. Sci., 2021

AST-path Based Compare-Aggregate Network for Code Clone Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

An Undergraduate Course for FOSS and with FOSS.
Proceedings of the ICEEL 2021: 5th International Conference on Education and E-Learning, Virtual Event, Japan, November 5, 2021

2020
Establishing Trusted I/O Paths for SGX Client Systems With Aurora.
IEEE Trans. Inf. Forensics Secur., 2020

FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching.
Comput. Secur., 2020

Sequence Directed Hybrid Fuzzing.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

GTFuzz: Guard Token Directed Grey-Box Fuzzing.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

Automated data race bugs addition.
Proceedings of the 13th European Workshop on Systems Security, 2020

X-AFL: a kernel fuzzer combining passive and active fuzzing.
Proceedings of the 13th European Workshop on Systems Security, 2020

A Practical Concolic Execution Technique for Large Scale Software Systems.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

2019
Seml: A Semantic LSTM Model for Software Defect Prediction.
IEEE Access, 2019

Deep Learning With Customized Abstract Syntax Tree for Bug Localization.
IEEE Access, 2019

Sequence coverage directed greybox fuzzing.
Proceedings of the 27th International Conference on Program Comprehension, 2019

Toward Migration of SGX-Enabled Containers.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

JSAC: A Novel Framework to Detect Malicious JavaScript via CNNs over AST and CFG.
Proceedings of the International Joint Conference on Neural Networks, 2019

Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Fuzzing: State of the Art.
IEEE Trans. Reliab., 2018

A Temporal Adaptive Access Mechanism for Data Fusion in an IoT Environment.
Sensors, 2018

Aurora: Providing Trusted System Services for Enclaves On an Untrusted System.
CoRR, 2018

AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

USE: unified and split execution for exposing divergences between versions.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Bring the Missing Jigsaw Back: TrustedClock for SGX Enclaves.
Proceedings of the 11th European Workshop on Systems Security, 2018

2017
vmOS: A virtualization-based, secure desktop system.
Comput. Secur., 2017

Foundation of a Framework to Support Compliance Checking in Construction Industry.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2017

Improving the precision of static analysis: Symbolic execution based on GCC abstract syntax tree.
Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, 2017

An end-to-end model for Android malware detection.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Fuzzing the Font Parser of Compound Documents.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

A Novel Method Makes Concolic System More Effective.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
MLSA: a static bugs analysis tool based on LLVM IR.
Int. J. Networked Distributed Comput., 2016

Providing Privacy Protection and Personalization Awareness for Android Devices.
Int. J. Distributed Sens. Networks, 2016

Understanding and detecting performance and security bugs in IOT OSes.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Verifying RTuinOS using VCC: From approach to practice.
Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering, 2016

Semantics-Based Anomaly Detection of Processes in Linux Containers.
Proceedings of the International Conference on Identification, 2016

A New Pre-copy Strategy for Live Migration of Virtual Machines.
Proceedings of the International Conference on Identification, 2016

A Correctness Verification Method for C Programs Based on VCC.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
PAPDroid: Personalization Awareness Privacy Protection in Android.
Proceedings of the International Conference on Identification, 2015

The Relation of Energy-Consumption and the Population of People.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

An Uneven Distributed System for Dynamic Taint Analysis Framework.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Survey on Privacy Protection of Android Devices.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
A Lightweight Security Isolation Approach for Virtual Machines Deployment.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

JavaScript Malicious Codes Analysis Based on Naive Bayes Classification.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
EAdroid: Providing Environment Adaptive Security for Android System.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2009
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework.
Proceedings of the Information Security Practice and Experience, 2009

2005
Security On-demand Architecture with Multiple Modules Support.
Proceedings of the Information Security Practice and Experience, 2005


  Loading...