Ke Tian

Orcid: 0000-0002-6784-5820

According to our database1, Ke Tian authored at least 35 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Isochronous Temporal Metric for Neighbourhood Analysis in Classification Tasks.
SN Comput. Sci., November, 2023

2022
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022

2021
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2021

aiai at the FinSim-2 task: Finance Domain Terms Automatic Classification Via Word Ontology and Embedding.
Proceedings of the Companion of The Web Conference 2021, 2021

aiai at the FinSBD-3 task: Structure Boundary Detection of Noisy Financial Texts in English and French Using Data Augmentation and Hybrid Deep Learning Model.
Proceedings of the Companion of The Web Conference 2021, 2021

Living-Off-The-Land Command Detection Using Active Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Unsupervised Heart Abnormality Detection Based on Phonocardiogram Analysis with Beta Variational Auto-Encoders.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Detection of Repackaged Android Malware with Code-Heterogeneity Features.
IEEE Trans. Dependable Secur. Comput., 2020

Negative Curvature Hollow Core Fiber Based All-Fiber Interferometer and Its Sensing Applications to Temperature and Strain.
Sensors, 2020

Prioritizing data flows and sinks for app security transformation.
Comput. Secur., 2020

Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Quality Estimation for Machine Translation with Multi-granularity Interaction.
Proceedings of the Machine Translation - 16th China Conference, 2020

2019
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.
CoRR, 2018

FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale.
Proceedings of the Security and Privacy in Communication Networks, 2018

Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned.
CoRR, 2017

ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Probabilistic Program Modeling for High-Precision Anomaly Classification.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Multi-viewpoint Smartphone AR-based Learning System for Solar Movement Observations.
Int. J. Interact. Mob. Technol., 2014

Lunar Observation Support System Using Smartphone AR for Astronomy Education.
Int. J. Interact. Mob. Technol., 2014

M-VSARL system in secondary school science education: Lunar phase class case study.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Development of a Multi-viewpoint AR-Based Mobile Learning System for Supporting Lunar Observation.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

2012
D-ODMRP: a destination-driven on-demand multicast routing protocol for mobile ad hoc networks.
IET Commun., 2012

2010
The Effect of TBM Hydraulic Piping System Parameters on FSI Vibration.
Proceedings of the Intelligent Robotics and Applications - Third International Conference, 2010

Data Gathering Protocols for Wireless Sensor Networks with Mobile Sinks.
Proceedings of the Global Communications Conference, 2010

Research on Unified Authorized Management Platform in E-government.
Proceedings of the Fifth Annual ChinaGrid Conference, ChinaGrid 2010, Guangzhou, 2010

2009
Destination-Driven On-Demand Multicast Routing Protocol for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

Research of Reliability-Based Four Layers Access Control Model.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

2008
Research on Dynamic Delegation Model.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008


  Loading...