Zhejun Fang

According to our database1, Zhejun Fang authored at least 7 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Generic Architecture to Detect Vulnerability Leaks at Crowdsourced Tests.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018

2017
A static technique for detecting input validation vulnerabilities in Android apps.
Sci. China Inf. Sci., 2017

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2015
Motion Control of a Wheeled Inverted Pendulum Using Equivalent-Input-Disturbance Approach.
J. Adv. Comput. Intell. Intell. Informatics, 2015

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015

2014
Static detection of logic vulnerabilities in Java web applications.
Secur. Commun. Networks, 2014

2008
A Secure Network Admission and Routing Model Based on Trust Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...