Qingbao Li
Orcid: 0000-0001-8712-3887
  According to our database1,
  Qingbao Li
  authored at least 34 papers
  between 2008 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    Inf. Sci., 2025
    
  
BinOpLeR: Optimization level recovery from binaries based on rich semantic instruction image and weighted voting.
    
  
    Inf. Softw. Technol., 2025
    
  
NPFTaint: Detecting highly exploitable vulnerabilities in Linux-based IoT firmware with network parsing functions.
    
  
    Comput. Secur., 2025
    
  
  2023
Cross-architecture Binary Function Similarity Detection based on Composite Feature Model.
    
  
    KSII Trans. Internet Inf. Syst., 2023
    
  
  2021
BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity.
    
  
    Inf. Softw. Technol., 2021
    
  
  2020
    J. Netw. Comput. Appl., 2020
    
  
Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks.
    
  
    Comput. Secur., 2020
    
  
Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes.
    
  
    IEEE Access, 2020
    
  
PA-GAN: A Patch-Attention Based Aggregation Network for Face Recognition in Surveillance.
    
  
    IEEE Access, 2020
    
  
CP-GAN: A Cross-Pose Profile Face Frontalization Boosting Pose-Invariant Face Recognition.
    
  
    IEEE Access, 2020
    
  
    Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020
    
  
An Information Intelligent Search Method for Computer Forensics Based on Text Similarity.
    
  
    Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
    
  
    Proceedings of the ICBDC 2020: 5th International Conference on Big Data and Computing, 2020
    
  
  2019
DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton.
    
  
    Comput. Secur., 2019
    
  
DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software.
    
  
    IEEE Access, 2019
    
  
Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications.
    
  
    IEEE Access, 2019
    
  
LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks.
    
  
    Proceedings of the ICVIP 2019: The 3rd International Conference on Video and Image Processing, 2019
    
  
    Proceedings of the ICIT 2019, 2019
    
  
Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm.
    
  
    Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
    
  
  2018
    KSII Trans. Internet Inf. Syst., 2018
    
  
    Digit. Investig., 2018
    
  
    Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
    
  
  2017
一种动态优先级排序的虚拟机I/O调度算法 (I/O Scheduling Algorithm Based on Dynamic Prioritization in Virtual Machines).
    
  
    计算机科学, 2017
    
  
  2015
一种基于完整性保护的终端计算机安全防护方法 (Integrity Based Security Protection Method for Terminal Computer).
    
  
    计算机科学, 2015
    
  
    Proceedings of the Information and Communications Security - 17th International Conference, 2015
    
  
  2013
    Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013
    
  
  2012
    Proceedings of the Information Computing and Applications - Third International Conference, 2012
    
  
  2008
    Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
    
  
    Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
    
  
    Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008