Qingbao Li

Orcid: 0000-0001-8712-3887

According to our database1, Qingbao Li authored at least 30 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity.
Inf. Softw. Technol., 2021

2020
A Survey of Exploitation Techniques and Defenses for Program Data Attacks.
J. Netw. Comput. Appl., 2020

Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks.
Comput. Secur., 2020

Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes.
IEEE Access, 2020

Reverse Engineering of Intel Microcode Update Structure.
IEEE Access, 2020

Unpaired Domain Transfer for Data Augment in Face Recognition.
IEEE Access, 2020

PA-GAN: A Patch-Attention Based Aggregation Network for Face Recognition in Surveillance.
IEEE Access, 2020

CP-GAN: A Cross-Pose Profile Face Frontalization Boosting Pose-Invariant Face Recognition.
IEEE Access, 2020

Refined CNNs for Face Recognition Applications on Embedded Devices.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

An Information Intelligent Search Method for Computer Forensics Based on Text Similarity.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

Efficient Cache Strategy for Face Recognition System.
Proceedings of the ICBDC 2020: 5th International Conference on Big Data and Computing, 2020

2019
基于划分的自适应随机测试综述 (Survey on Adaptive Random Testing by Partitioning).
计算机科学, 2019

DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton.
Comput. Secur., 2019

A Firmware Code Gene Extraction Technology for IoT Terminal.
IEEE Access, 2019

DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software.
IEEE Access, 2019

Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications.
IEEE Access, 2019

LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks.
Proceedings of the ICVIP 2019: The 3rd International Conference on Video and Image Processing, 2019

Malware Detection Method based on Control Flow Analysis.
Proceedings of the ICIT 2019, 2019

Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Defending Non-control-data Attacks using Influence Domain Monitoring.
KSII Trans. Internet Inf. Syst., 2018

Logical acquisition method based on data migration for Android mobile devices.
Digit. Investig., 2018

Network Storage Covert Channel Detection Based on Data Joint Analysis.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
一种动态优先级排序的虚拟机I/O调度算法 (I/O Scheduling Algorithm Based on Dynamic Prioritization in Virtual Machines).
计算机科学, 2017

2015
一种基于完整性保护的终端计算机安全防护方法 (Integrity Based Security Protection Method for Terminal Computer).
计算机科学, 2015

Ensuring Kernel Integrity Using KIPBMFH.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2013
Binary Program Statistical Features Hiding through Huffman Obfuscated Coding.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

2012
Code-Controlled Hardware Trojan Horse.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2008
Research on the Algorithm of Decrypting Encrypted Synchronous Sequential Machine.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

The Design and Implementation of Crossbar in SMP Symmetrical Multi-processor System.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Hardware Threat: The Challenge of Information Security.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...