Hui Shu

Orcid: 0000-0002-2797-1355

According to our database1, Hui Shu authored at least 23 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries.
Comput. Secur., December, 2023

PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning.
Comput. Secur., May, 2023

A Generic Fundus Image Enhancement Network Boosted by Frequency Self-supervised Representation Learning.
CoRR, 2023

2022
Model of Execution Trace Obfuscation Between Threads.
IEEE Trans. Dependable Secur. Comput., 2022

UniASM: Binary Code Similarity Detection without Fine-tuning.
CoRR, 2022

spotFuzzer: Static Instrument and Fuzzing Windows COTs.
CoRR, 2022

DeMal: Module decomposition of malware based on community discovery.
Comput. Secur., 2022

MinSIB: Minimized static instrumentation for fuzzing binaries.
Comput. Secur., 2022

Protocol Reverse-Engineering Methods and Tools: A Survey.
Comput. Commun., 2022

Walle: An End-to-End, General-Purpose, and Large-Scale Production System for Device-Cloud Collaborative Machine Learning.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

2021
A Method for Resume Information Extraction Using BERT-BiLSTM-CRF.
Proceedings of the 21st International Conference on Communication Technology, 2021

A Review on IoT Botnet.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

2020
INT8 Winograd Acceleration for Conv1D Equipped ASR Models Deployed on Mobile Devices.
CoRR, 2020

FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution.
IEEE Access, 2020

2019
BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary.
IEEE Access, 2019

Semantic-based Malware Behavior Description: Past and Future.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

2018
Competition, cooperation, and performance: an empirical investigation of Chinese online sellers.
Inf. Syst. E Bus. Manag., 2018

2016
A study on the equilibrium of regional industrial spatial distribution based on grey prediction model.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

2014
An optimal policy for a single-vendor and a single-buyer integrated system with setup cost reduction and process-quality improvement.
Int. J. Syst. Sci., 2014

Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2009
A Process Model for Forensic Analysis of Symbian Smart Phones.
Proceedings of the Advances in Software Engineering, 2009

Ewap: Using Symbolic Execution to Exploit Windows Applications.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Wetrp: A Platform for Recording of Windows Program Execution Traces.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...