Software Backdoor Analysis Based on Sensitive Flow Tracking and Concolic Execution
Xu, Xin, Wang, Jiajie, Cheng, Shaoyin, Zhang, Tao, Jiang, Fan
Published in Wuhan University journal of natural sciences (01.10.2016)
Published in Wuhan University journal of natural sciences (01.10.2016)
Get full text
Journal Article
An Asynchronous Entanglement Distribution Protocol for Quantum Networks
Wang, Zhaoying, Li, Jian, Xue, Kaiping, Cheng, Shaoyin, Yu, Nenghai, Sun, Qibin, Lu, Jun
Published in IEEE network (01.09.2022)
Published in IEEE network (01.09.2022)
Get full text
Journal Article
InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog
Wenlong Chen, Shaoyin Cheng, Xing He, Fan Jiang
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Get full text
Conference Proceeding
Strengthen Software-Defined Network in Cloud
Guoyou Sun, Shaoyin Cheng, Fan Jiang
Published in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (01.12.2016)
Published in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (01.12.2016)
Get full text
Conference Proceeding
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference
Xiong, Jiaqi, Chen, Guoqiang, Chen, Kejiang, Gao, Han, Cheng, Shaoyin, Zhang, Weiming
Published in 2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE) (11.09.2023)
Published in 2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE) (11.09.2023)
Get full text
Conference Proceeding
Find Referral Social Networks
Hao Guo, Feng Wei, Shaoyin Cheng, Fan Jiang
Published in 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) (01.11.2015)
Published in 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) (01.11.2015)
Get full text
Conference Proceeding
An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets
Xin Ye, Feng Wei, Fan Jiang, Shaoyin Cheng
Published in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (01.10.2015)
Published in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (01.10.2015)
Get full text
Conference Proceeding
AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks
Guangyu Yin, Fan Jiang, Shaoyin Cheng, Xiang Li, Xing He
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Get full text
Conference Proceeding
Awareness and Control of Personal Data Based on the Cyber-I Privacy Model
Li Tang, Jianhua Ma, Runhe Huang, Apduhan, Bernady O., He Li, Shaoyin Cheng
Published in 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (01.12.2014)
Published in 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (01.12.2014)
Get full text
Conference Proceeding
Effective Method for Promoting Viral Marketing in Microblog
Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang
Published in 2013 International Conference on Social Computing (01.09.2013)
Published in 2013 International Conference on Social Computing (01.09.2013)
Get full text
Conference Proceeding
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code
Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang
Published in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (01.11.2011)
Published in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (01.11.2011)
Get full text
Conference Proceeding
ADKAM: A-Diversity K-Anonymity Model via Microaggregation
Cheng, Liang, Cheng, Shaoyin, Jiang, Fan
Published in Information Security Practice and Experience (2015)
Published in Information Security Practice and Experience (2015)
Get full text
Book Chapter
Software vulnerability analysis framework based on uniform intermediate representation
Jun Xu, Shaoyin Cheng, Jiajie Wang, Zifeng Li, Fan Jiang
Published in 2010 2nd International Conference on Software Technology and Engineering (01.10.2010)
Published in 2010 2nd International Conference on Software Technology and Engineering (01.10.2010)
Get full text
Conference Proceeding
PDVDS: A Pattern-Driven Software Vulnerability Detection System
Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01.12.2010)
Published in 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01.12.2010)
Get full text
Conference Proceeding
Combined Symbolic and Concrete Execution of TTCN-3 for Automated Testing
Xuezhi Xing, Lei Zhang, Fan Jiang, Shaoyin Cheng, Xing Jiang
Published in 2008 International Symposium on Information Science and Engineering (01.12.2008)
Published in 2008 International Symposium on Information Science and Engineering (01.12.2008)
Get full text
Conference Proceeding
DBTG: Demand-Driven Backtracking Test Generation
Shaoyin Cheng, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing
Published in 2008 The 9th International Conference for Young Computer Scientists (01.11.2008)
Published in 2008 The 9th International Conference for Young Computer Scientists (01.11.2008)
Get full text
Conference Proceeding
TFDroid: Android Malware Detection by Topics and Sensitive Data Flows Using Machine Learning Techniques
Lou, Songhao, Cheng, Shaoyin, Huang, Jingjing, Jiang, Fan
Published in 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (01.03.2019)
Published in 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (01.03.2019)
Get full text
Conference Proceeding