Jian Liu

Orcid: 0000-0002-7557-8347

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Chinese Academy of Sciences, Institute of Software, Beijing, China (PhD 2005)


According to our database1, Jian Liu authored at least 27 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Non-Uniform Exposure Imaging via Neuromorphic Shutter Control.
CoRR, 2024

CARDSHARK: Understanding and Stablizing Linux Kernel Concurrency Bugs Against the Odds.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting.
Comput. Networks, May, 2023

2022
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
Cybersecur., 2022

Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution.
Proceedings of the 31st USENIX Security Symposium, 2022

A Graph Learning Approach with Audit Records for Advanced Attack Investigation.
Proceedings of the IEEE Global Communications Conference, 2022

2021
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Large-Scale Third-Party Library Detection in Android Markets.
IEEE Trans. Software Eng., 2020

Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Towards Network Anomaly Detection Using Graph Embedding.
Proceedings of the Computational Science - ICCS 2020, 2020

2018
Eliminating Path Redundancy via Postconditioned Symbolic Execution.
IEEE Trans. Software Eng., 2018

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

LibD: scalable and precise third-party library detection in android markets.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

A deployable sampling strategy for data race detection.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

2015
Explaining Software Failures by Cascade Fault Localization.
ACM Trans. Design Autom. Electr. Syst., 2015

Postconditioned Symbolic Execution.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

A Synergistic Analysis Method for Explaining Failed Regression Tests.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Program structure aware fault localization.
Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, 2014

2012
Remote rehabilitation model based on BAN and cloud computing technology.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

A study of regional cooperative emergency care system for ST-elevation myocardial infarction patients based on the internet of things.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Efficient Loop-Extended Model Checking of Data Structure Methods.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

2010
Supporting Flexible Reification of Design Patterns.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010


  Loading...