Shichao Lv

Orcid: 0000-0002-0549-0999

According to our database1, Shichao Lv authored at least 24 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution.
IEEE Trans. Dependable Secur. Comput., 2023

SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2023

2022
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control.
J. Syst. Archit., 2022

Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Finding Vulnerabilities in Internal-binary of Firmware with Clues.
Proceedings of the IEEE International Conference on Communications, 2022

IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems.
Proceedings of the ICC 2021, 2021

2020
Exploring Shodan From the Perspective of Industrial Control Systems.
IEEE Access, 2020

A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data.
IEEE Access, 2019

Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Remote Fingerprinting on Internet-Wide Printers Based on Neural Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Physical layer spoofing detection based on sparse signal processing and fuzzy recognition.
IET Signal Process., 2017

Physical-layer security in Internet of Things based on compressed sensing and frequency selection.
IET Commun., 2017

Physical-Layer Authentication Based on Extreme Learning Machine.
IEEE Commun. Lett., 2017

Defense Against Advanced Persistent Threats with Expert System for Internet of Things.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Wireless Physical Layer Characteristics Based Random Number Generator: Hijack Attackers.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

On eavesdropping attacks and countermeasures for MU-MIMO systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
A novel physical layer spoofing detection based on sparse signal processing.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015


  Loading...