关注
Hongliang Liang
Hongliang Liang
在 bupt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fuzzing: State of the art
H Liang, X Pei, X Jia, W Shen, J Zhang
IEEE Transactions on Reliability 67 (3), 1199-1218, 2018
2692018
Seml: A semantic LSTM model for software defect prediction
H Liang, Y Yu, L Jiang, Z Xie
IEEE Access 7, 83812-83824, 2019
1152019
Deep learning with customized abstract syntax tree for bug localization
H Liang, L Sun, M Wang, Y Yang
IEEE Access 7, 116309-116320, 2019
672019
Sequence coverage directed greybox fuzzing
H Liang, Y Zhang, Y Yu, Z Xie, L Jiang
2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC …, 2019
352019
Sequence directed hybrid fuzzing
H Liang, L Jiang, L Ai, J Wei
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
332020
Establishing trusted i/o paths for sgx client systems with aurora
H Liang, M Li, Y Chen, L Jiang, Z Xie, T Yang
IEEE Transactions on Information Forensics and Security 15, 1589-1600, 2019
282019
An end-to-end model for android malware detection
H Liang, Y Song, D Xiao
2017 IEEE International Conference on Intelligence and Security Informatics …, 2017
272017
MLSA: a static bugs analysis tool based on LLVM IR
H Liang, L Wang, D Wu, J Xu
2016 17th IEEE/ACIS International Conference on Software Engineering …, 2016
202016
Bring the missing jigsaw back: Trustedclock for SGX enclaves
H Liang, M Li
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
172018
FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching
H Liang, Z Xie, Y Chen, H Ning, J Wang
Computers & Security 99, 102032, 2020
162020
Jsac: A novel framework to detect malicious javascript via cnns over ast and cfg
H Liang, Y Yang, L Sun, L Jiang
2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019
162019
Fog-cloud task scheduling of energy consumption optimisation with deadline consideration
J Xu, X Sun, R Zhang, H Liang, Q Duan
International Journal of Internet Manufacturing and Services 7 (4), 375-392, 2020
152020
Survey on privacy protection of android devices
H Liang, D Wu, J Xu, H Ma
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
152015
Enforcing multiple security policies for android system
T Guo, P Zhang, H Liang, S Shao
2nd International Symposium on Computer, Communication, Control and …, 2013
152013
Design and implementation of a security label common framework
梁洪亮, 孙玉芳, 赵庆松, 张相锋, 孙波
Journal of Software 14 (3), 547-552, 2003
142003
AST-path based compare-aggregate network for code clone detection
H Liang, L Ai
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
132021
Aurora: Providing trusted system services for enclaves on an untrusted system
H Liang, M Li, Q Zhang, Y Yu, L Jiang, Y Chen
arXiv preprint arXiv:1802.03530, 2018
132018
Understanding and detecting performance and security bugs in IoT oses
H Liang, Q Zhao, Y Wang, H Liu
2016 17th IEEE/ACIS International Conference on Software Engineering …, 2016
132016
A multi-level security model with least privilege support for trusted subject
武延军, 梁洪亮, 赵琛
Journal of software 18 (3), 730-738, 2007
112007
Enforcing mandatory integrity protection in operating system
H Liang, Y Sun
Proceedings 2001 International Conference on Computer Networks and Mobile …, 2001
112001
系统目前无法执行此操作,请稍后再试。
文章 1–20