Rui Ma

Orcid: 0000-0003-1954-5775

Affiliations:
  • Beijing Institute of Technology, School of Software, Beijing Key Laboratory of Software Security Engineering Technology, China


According to our database1, Rui Ma authored at least 27 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SYNTONY: Potential-aware fuzzing with particle swarm optimization.
J. Syst. Softw., February, 2024

2023
ELAMD: An ensemble learning framework for adversarial malware defense.
J. Inf. Secur. Appl., June, 2023

pAFL: Adaptive Energy Allocation with Upper Confidence Bound.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
Towards time evolved malware identification using two-head neural network.
J. Inf. Secur. Appl., 2022

CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022

MDCD: A malware detection approach in cloud using deep learning.
Trans. Emerg. Telecommun. Technol., 2022

2021
BinDeep: A deep learning approach to binary code similarity detection.
Expert Syst. Appl., 2021

CMFuzz: context-aware adaptive mutation for fuzzers.
Empir. Softw. Eng., 2021

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021

2020
Identification and addressing of internet of things based on distributed ID.
Int. J. Embed. Syst., 2020

MSYM: A multichannel communication system for android devices.
Comput. Networks, 2020

LAFuzz: Neural Network for Efficient Fuzzing.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

DepTaint: A Static Taint Analysis Method Based on Program Dependence.
Proceedings of the ICMSS 2020: 2020 4th International Conference on Management Engineering, 2020

VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
KEcruiser: A novel control flow protection for kernel extensions.
Future Gener. Comput. Syst., 2019

E-WBM: An Effort-Based Vulnerability Discovery Model.
IEEE Access, 2019

A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning.
IEEE Access, 2019

Segmental Symbolic Execution Based on Clustering.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries.
Secur. Commun. Networks, 2018

2017
SulleyEX: A Fuzzer for Stateful Network Protocol.
Proceedings of the Network and System Security - 11th International Conference, 2017

Defenses Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

2015
An Improved WiFi Indoor Positioning Algorithm by Weighted Fusion.
Sensors, 2015

Research on Identification and Addressing of the Internet of Things.
Proceedings of the 10th International Conference on P2P, 2015

2013
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2011
Memory errors prevention technology for C/C++ program based on probability.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

2009
Metamorphic malware detection technology based on aggregating emerging patterns.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2006
Embedded Intelligence: Enabling In-Situ Power Management for Wireless Sensor Networks.
Proceedings of the Smart Sensing and Context, First European Conference, EuroSSC 2006, 2006


  Loading...