Minhuan Huang

According to our database1, Minhuan Huang authored at least 29 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

ADV-POST: Physically Realistic Adversarial Poster for Attacking Semantic Segmentation Models in Autonomous Driving.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

InFuzz: An Interactive Tool for Enhancing Efficiency in Fuzzing through Visual Bottleneck Analysis (Registered Report).
Proceedings of the 2nd International Fuzzing Workshop, 2023

2022
A Survey of Human-machine Collaboration in Fuzzing.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

An Automatic Code Generation Method Based on Sequence Generative Adversarial Network.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2019
Research on Evaluation Index System for Software Vulnerability Analysis Methods.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
A General Testing Framework Based on Veins for Securing VANET Applications.
Proceedings of the 2018 IEEE SmartWorld, 2018

Security Analysis of Intelligent Transportation Systems Based on Simulation Data.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Remote Protocol Vulnerability Discovery for Intelligent Transportation Systems (ITS).
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
An Integration Testing Platform for Software Vulnerability Detection Method.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Novel Method Makes Concolic System More Effective.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2015
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network.
KSII Trans. Internet Inf. Syst., 2015

2014
Memory-Size-Assisted Buffer Overflow Detection.
J. Softw., 2014

An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
A Test Case Generation Technique for VMM Fuzzing.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

SA4WSs: A Security Architecture for Web Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Towards sharing disks between host OS and virtual machine with volume snapshot technology.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
A Rerouting Controlled ISL Handover Protocol For LEO Satellite Networks.
KSII Trans. Internet Inf. Syst., 2012

Reversing Engineering Data Structures in Binary Programs: Overview and Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
ATCS: An adaptive TCP coding scheme for satellite IP networks.
KSII Trans. Internet Inf. Syst., 2011

Towards Detecting Thread Deadlock in Java Programs with JVM Introspection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Research on survivability metrics based on survivable process of network system.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

An Overview of Bootkit Attacking Approaches.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Implicit detection of stealth software with a local-booted virtual machine.
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010

2009
Research on Technologies of Building Experimental Environment for Network Worm Simulation.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Improving performance of intrusion detection system by applying a new machine learning strategy.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008


  Loading...