Jingfeng Xue

Orcid: 0000-0002-3087-9701

According to our database1, Jingfeng Xue authored at least 50 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An empirical study of problems and evaluation of IoT malware classification label sources.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Bypassing software-based remote attestation using debug registers.
Connect. Sci., 2024

FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

2023
WHGDroid: Effective android malware detection based on weighted heterogeneous graph.
J. Inf. Secur. Appl., September, 2023

Decentralized Policy-Hidden Fine-Grained Redaction in Blockchain-Based IoT Systems.
Sensors, August, 2023

A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA).
Comput. Secur., June, 2023

Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition.
Neurocomputing, 2023

Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications.
Expert Syst. Appl., 2023

DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication.
Proceedings of the Blockchain Technology and Emerging Applications, 2023

2022
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT.
Inf. Sci., 2022

Boosting training for PDF malware classifier via active learning.
Int. J. Intell. Syst., 2022

Online Teaching of Computer Fundamentals Course During the Pandemic.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

Blockchain-based Reputation Evaluation Using Game Theory in Social Networking.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

2021
A Survey on Adversarial Attack in the Age of Artificial Intelligence.
Wirel. Commun. Mob. Comput., 2021

The Acoustic System of the Fendouzhe HOV.
Sensors, 2021

APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework.
Inf. Sci., 2021

Hybrid sequence-based Android malware detection using natural language processing.
Int. J. Intell. Syst., 2021

A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model.
Proceedings of the 21st International Conference on Communication Technology, 2021

2020
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope.
Secur. Commun. Networks, 2020

Research on Network Risk Evaluation Method Based on a Differential Manifold.
IEEE Access, 2020

A Malware Classification Method Based on the Capsule Network.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Detection of Malicious Domains in APT via Mining Massive DNS Logs.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

An Effective Remote Data Disaster Recovery Plan for the Space TT&C System.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
MalInsight: A systematic profiling based malware detection framework.
J. Netw. Comput. Appl., 2019

Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine.
IET Inf. Secur., 2019

An online approach to defeating ROP attacks∗.
Concurr. Comput. Pract. Exp., 2019

MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics.
Comput. Secur., 2019

A Method for Calculating Network System Security Risk Based on a Lie Group.
IEEE Access, 2019

Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly.
IEEE Access, 2019

2018
An Approach for Internal Network Security Metric Based on Attack Probability.
Secur. Commun. Networks, 2018

An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis.
Secur. Commun. Networks, 2018

Malware Visualization for Fine-Grained Classification.
IEEE Access, 2018

A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation Domain.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A Practical Method to Confine Sensitive API Invocations on Commodity Hardware.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Detecting Method of Array Bounds Defects Based on Symbolic Execution.
Proceedings of the Network and System Security - 11th International Conference, 2017

Class Level Research on Modifying Information Transmission Path of the Cooperative Network Based on the Cohesion of Class.
Proceedings of the Fuzzy Systems and Data Mining III, 2017

An Online Approach to Defeating Return-Oriented-Programming Attacks.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016

Optimization of program recursive function calls analysis method.
Autom. Control. Comput. Sci., 2016

2015
An Improved WiFi Indoor Positioning Algorithm by Weighted Fusion.
Sensors, 2015

Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs.
Proceedings of the 10th International Conference on P2P, 2015

2014
An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

A Virtualization-Based Approach for Application Whitelisting.
IEICE Trans. Inf. Syst., 2014

Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2011
Memory errors prevention technology for C/C++ program based on probability.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

2009
Metamorphic malware detection technology based on aggregating emerging patterns.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2007
A Context-Aware Trust Establishment and Mapping Framework for Web Applications.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...