Jianmin Pang

Orcid: 0000-0003-1835-5419

According to our database1, Jianmin Pang authored at least 62 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Few-shot short-text classification with language representations and centroid similarity.
Appl. Intell., April, 2023

Binary Vulnerability Similarity Detection Based on Function Parameter Dependency.
Int. J. Semantic Web Inf. Syst., 2023

BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

AMPT: Automatic Mixed-Precision Tuning Based on Accuracy Gain.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Revisiting split tiling for stencil computations in polyhedral compilation.
J. Supercomput., 2022

A Method of Short Text Representation Fusion with Weighted Word Embeddings and Extended Topic Information.
Sensors, 2022

Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning.
Int. J. Digit. Crime Forensics, 2022

What Factors Affect the Performance of Software after Migration: A Case Study on Sunway TaihuLight Supercomputer.
IEICE Trans. Inf. Syst., 2022

Automatically Generating High-performance Matrix Multiplication Kernels on the Latest Sunway Processor.
Proceedings of the 51st International Conference on Parallel Processing, 2022

2021
Enhancing Dynamic Binary Translation in Mobile Computing by Leveraging Polyhedral Optimization.
Wirel. Commun. Mob. Comput., 2021

Compiler-directed scratchpad memory data transfer optimization for multithreaded applications on a heterogeneous many-core architecture.
J. Supercomput., 2021

Research on Multi-label Text Classification Method Based on tALBERT-CNN.
Int. J. Comput. Intell. Syst., 2021

Dual-axial self-attention network for text classification.
Sci. China Inf. Sci., 2021

Study on Binary Code Evolution with Concrete Semantic Analysis.
Proceedings of the Data Science, 2021

Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud.
Proceedings of the Data Science, 2021

Parallel Region Reconstruction Technique for Sunway High-Performance Multi-core Processors.
Proceedings of the Data Science, 2021

2020
Record Atomistic Simulation of Crystalline Silicon: Bridging Microscale Structures and Macroscale Properties.
J. Comput. Chem., 2020

2019
拟态构造Web服务器的服务质量量化方法 (QoS Quantification Method for Web Server with Mimic Construction).
计算机科学, 2019

基于SW26010处理器的FT程序的性能优化 (Performance Optimization of FT Program Based on SW26010 Processor).
计算机科学, 2019

Expdf: Exploits Detection System Based on Machine-Learning.
Int. J. Comput. Intell. Syst., 2019

Dynamic Translation Optimization Method Based on Static Pre-Translation.
IEEE Access, 2019

A Novelty Network Attack Detection Model based on Immunology.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019

Recurrent Neural Network Based Binary Code Vulnerability Detection.
Proceedings of the ACAI 2019: 2nd International Conference on Algorithms, 2019

2018
Automatic Benchmark Generation Framework for Malware Detection.
Secur. Commun. Networks, 2018

基于软件多样化的拟态安全防御策略 (Mimic Security Defence Strategy Based on Software Diversity).
计算机科学, 2018

Common Program Similarity Metric Method for Anti-Obfuscation.
IEEE Access, 2018

2017
一种面向云多层应用的费用高效的资源管理方法 (Cost-efficient Resource Management for Cloud Multi-tier Applications).
计算机科学, 2017

Planning virtual infrastructures for time critical applications with multiple deadline constraints.
Future Gener. Comput. Syst., 2017

A Binary Translation Backend Registers Allocation Algorithm Based on Priority.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
基于小波变换的木马心跳行为检测方法 (Trojans Keep-alive Behavior Detection Approach Based on Wavelet Transform).
计算机科学, 2016

A New Compile-Time Obfuscation Scheme for Software Protection.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
一种基于主动认知决策的高效能模型 (High-productivity Model Based on Proactive Cognition and Decision).
计算机科学, 2015

A Program Threat Judgement Model Based on Fuzzy Set Theory.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

On-Demand Self-Adaptivity of Service Availability for Cloud Multi-tier Applications.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

Ameba: A High-Performance and Energy-Efficient Online Video Retrieval System.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

2014
Migration of CUDA Program Based on a Divide-and-Conquer Method.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
The Synchronization Treatment in Implementing Data-Parallel Programming Languages on CPUs.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A flag simulation strategy based on fusion of semantic trees in binary translation.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Convergence and Scalarization in Whole Function Vectorization.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Data recovery of user-defined procedures in binary translation.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

2012
MEGA: a real-time visualisation framework for large-scale terrain.
Int. J. Simul. Process. Model., 2012

Variable optimization in code migration from GPU to multi-core.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

BTMD: A Framework of Binary Translation Based Malcode Detector.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
The multi-threaded optimization of dynamic binary translation.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2009
Static Analysis of Malware to Detect Exception Return.
Proceedings of the International Forum on Information Technology and Applications, 2009

Graphical Annotation of Suspicious Behaviors.
Proceedings of the International Forum on Information Technology and Applications, 2009

2008
Using Queuing Network to Evaluate IXP2400 Based VoIP SPS.
Proceedings of the Fourth International Conference on Networking and Services, 2008

Formal Abstraction of Semantics for Detecting Malicious Code.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Consistency Combination Algorithm for Global Dynamic Computation and Data Decomposition.
Proceedings of the Second International Conference on Complex, 2008

Reconstructing Control Flow in Modulo Scheduled Loops.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

Recovering Variable-Argument Functions from Binary Executables.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Dynamic decomposition algorithm merging control flow analysis.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

Research on the Recovery Technology of Floating-point Parameters in Binary Translation.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Parameter and Return-value Analysis of Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
LFTOP : An LF based approach to domain specific reasoning.
PhD thesis, 2006

Semantic Abstraction of IA-64 Multimedia Instructions.
Proceedings of the 2006 International Conference on Semantics, 2006

Improvement and Implementation of Accurate Array Data-Flow Analysis.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications & Conference on Real-Time Computing Systems and Applications, 2006

Automatic code generation of data decomposition.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

2005
<i>LFTOP</i>: An <i>LF</i>-Based Approach to Domain-Specific Reasoning.
J. Comput. Sci. Technol., 2005


  Loading...