Weiyu Dong

Orcid: 0000-0001-6137-7782

According to our database1, Weiyu Dong authored at least 32 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Rator: detecting fine-grained semantic code clones using tree encoding based on node degrees of freedom.
Cybersecur., December, 2026

PMF-UAV:A lightweight and robust PUF-enabled multi-factor authentication and key agreement protocol for UAV-assisted secure communication.
Veh. Commun., 2026

SABLM-VD: Vulnerability detection with a semantic-aware binary language model.
Inf. Softw. Technol., 2026

2025
Deep neural network modeling attacks on arbiter-PUF-based designs.
Cybersecur., December, 2025

ADHS-EL: Dynamic ensemble learning with adversarial augmentation for accurate and robust network intrusion detection.
J. King Saud Univ. Comput. Inf. Sci., 2025

MLAF-VD: A vulnerability detection model based on multi-level abstract features.
J. Inf. Secur. Appl., 2025

Devmp: A Virtual Instruction Extraction Method for Commercial Code Virtualization Obfuscators.
Proceedings of the 16th International Conference on Internetware, 2025

SyzForge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025

CP2GS: Cross-Platform Provenance Generation System.
Proceedings of the 2025 4th International Conference on Big Data, 2025

Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
FCNN: Simple neural networks for complex code tasks.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024

2023
DUEN: Dynamic ensemble handling class imbalance in network intrusion detection.
Expert Syst. Appl., November, 2023

Improvements to code2vec: Generating path vectors using RNN.
Comput. Secur., September, 2023

BHMDC: A byte and hex n-gram based malware detection and classification method.
Comput. Secur., May, 2023

Dynamic Resampling Based Boosting Random Forest for Network Anomaly Traffic Detection.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Applications, 2023

2022
WYSIWYG: IoT Device Identification Based on WebUI Login Pages.
Sensors, 2022

Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware.
Concurr. Comput. Pract. Exp., 2022

CaDeCFF: Compiler-Agnostic Deobfuscator of Control Flow Flattening.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

2021
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

A Partial-Lifting-Based Compiling Concolic Execution Approach.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

Dynamic Instrumentation Framework Based on Entity Equipment.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

Identify IoT Devices through Web Interface Characteristics.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
A Novel Concolic Execution Approach on Embedded Device.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
A Dynamic Taint Analysis Framework Based on Entity Equipment.
IEEE Access, 2019

A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving.
IEEE Access, 2019

2018
Association Analysis of Firmware Based on NoSQL Database.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An Effective Authentication for Client Application Using ARM TrustZone.
Proceedings of the Information Security Practice and Experience, 2017

Implementing a ARM-Based Secure Boot Scheme for the Isolated Execution Environment.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
基于热例程的动态二进制翻译优化 (Hot-routine Based Optimization of Dynamic Binary Translation).
计算机科学, 2016

A Fine-Granular Programming Scheme for Irregular Scientific Applications.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

2015
译码制导的动态二进制翻译优化 (Decoding-directed Dynamic Binary Translation Optimization).
计算机科学, 2015


  Loading...