Zhejun Fang

According to our database1, Zhejun Fang authored at least 7 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Tests.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018

2017
A static technique for detecting input validation vulnerabilities in Android apps.
Sci. China Inf. Sci., 2017

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2015
Motion Control of a Wheeled Inverted Pendulum Using Equivalent-Input-Disturbance Approach.
J. Adv. Comput. Intell. Intell. Informatics, 2015

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015

2012
Static Detection of Logic Vulnerabilities in Java Web Applications.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2008
A Secure Network Admission and Routing Model Based on Trust Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...