Liehui Jiang

According to our database1, Liehui Jiang authored at least 31 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024

2023
DUEN: Dynamic ensemble handling class imbalance in network intrusion detection.
Expert Syst. Appl., November, 2023

CVTEE: A Compatible Verified TEE Architecture With Enhanced Security.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs.
IEEE Trans. Inf. Forensics Secur., 2022

WYSIWYG: IoT Device Identification Based on WebUI Login Pages.
Sensors, 2022

A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system.
Concurr. Comput. Pract. Exp., 2022

Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

2020
Determining the base address of MIPS firmware based on absolute address statistics and string reference matching.
Comput. Secur., 2020

A Shape-inference-based Approach to Enhance Constraint Independence Optimization.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps.
Int. J. Distributed Sens. Networks, 2019

Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method.
Concurr. Comput. Pract. Exp., 2019

A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving.
IEEE Access, 2019

2018
Algorithm Analysis for Big Data in Education Based on Depth Learning.
Wirel. Pers. Commun., 2018

Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment.
Secur. Commun. Networks, 2018

A Multi-level Perception Security Model Using Virtualization.
KSII Trans. Internet Inf. Syst., 2018

Towards a multilayered permission-based access control for extending Android security.
Concurr. Comput. Pract. Exp., 2018

2017
MIPE: a practical memory integrity protection method in a trusted execution environment.
Clust. Comput., 2017

An Effective Authentication for Client Application Using ARM TrustZone.
Proceedings of the Information Security Practice and Experience, 2017

2016
基于热例程的动态二进制翻译优化 (Hot-routine Based Optimization of Dynamic Binary Translation).
计算机科学, 2016

An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

A Fine-Granular Programming Scheme for Irregular Scientific Applications.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

Enhancement of Permission Management for an ARM-Android Platform.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
基于存储访问模型的细粒度存储变量识别算法 (Fine-grained Variable Entity Identification Algorithm Based on Memory Access Model).
计算机科学, 2015

2014
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2012
Analysis of Cryptographic Algorithms' Characters in Binary File.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

2010
ARM Static Library Identification Framework.
J. Softw., 2010

2009
A Process Model for Forensic Analysis of Symbian Smart Phones.
Proceedings of the Advances in Software Engineering, 2009

Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.
Proceedings of the Security Technology, 2009

High Performance and Parallel Model for LU Decomposition on FPGAs.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Ultra High Throughput Implementations for MD5 Hash Algorithm on FPGA.
Proceedings of the High Performance Computing and Applications, 2009


  Loading...