Fuzzing: State of the art H Liang, X Pei, X Jia, W Shen, J Zhang IEEE Transactions on Reliability 67 (3), 1199-1218, 2018 | 269 | 2018 |
Seml: A semantic LSTM model for software defect prediction H Liang, Y Yu, L Jiang, Z Xie IEEE Access 7, 83812-83824, 2019 | 115 | 2019 |
Deep learning with customized abstract syntax tree for bug localization H Liang, L Sun, M Wang, Y Yang IEEE Access 7, 116309-116320, 2019 | 67 | 2019 |
Sequence coverage directed greybox fuzzing H Liang, Y Zhang, Y Yu, Z Xie, L Jiang 2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC …, 2019 | 35 | 2019 |
Sequence directed hybrid fuzzing H Liang, L Jiang, L Ai, J Wei 2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020 | 33 | 2020 |
Establishing trusted i/o paths for sgx client systems with aurora H Liang, M Li, Y Chen, L Jiang, Z Xie, T Yang IEEE Transactions on Information Forensics and Security 15, 1589-1600, 2019 | 28 | 2019 |
An end-to-end model for android malware detection H Liang, Y Song, D Xiao 2017 IEEE International Conference on Intelligence and Security Informatics …, 2017 | 27 | 2017 |
MLSA: a static bugs analysis tool based on LLVM IR H Liang, L Wang, D Wu, J Xu 2016 17th IEEE/ACIS International Conference on Software Engineering …, 2016 | 20 | 2016 |
Bring the missing jigsaw back: Trustedclock for SGX enclaves H Liang, M Li Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018 | 17 | 2018 |
FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching H Liang, Z Xie, Y Chen, H Ning, J Wang Computers & Security 99, 102032, 2020 | 16 | 2020 |
Jsac: A novel framework to detect malicious javascript via cnns over ast and cfg H Liang, Y Yang, L Sun, L Jiang 2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019 | 16 | 2019 |
Fog-cloud task scheduling of energy consumption optimisation with deadline consideration J Xu, X Sun, R Zhang, H Liang, Q Duan International Journal of Internet Manufacturing and Services 7 (4), 375-392, 2020 | 15 | 2020 |
Survey on privacy protection of android devices H Liang, D Wu, J Xu, H Ma 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 15 | 2015 |
Enforcing multiple security policies for android system T Guo, P Zhang, H Liang, S Shao 2nd International Symposium on Computer, Communication, Control and …, 2013 | 15 | 2013 |
Design and implementation of a security label common framework 梁洪亮, 孙玉芳, 赵庆松, 张相锋, 孙波 Journal of Software 14 (3), 547-552, 2003 | 14 | 2003 |
AST-path based compare-aggregate network for code clone detection H Liang, L Ai 2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021 | 13 | 2021 |
Aurora: Providing trusted system services for enclaves on an untrusted system H Liang, M Li, Q Zhang, Y Yu, L Jiang, Y Chen arXiv preprint arXiv:1802.03530, 2018 | 13 | 2018 |
Understanding and detecting performance and security bugs in IoT oses H Liang, Q Zhao, Y Wang, H Liu 2016 17th IEEE/ACIS International Conference on Software Engineering …, 2016 | 13 | 2016 |
A multi-level security model with least privilege support for trusted subject 武延军, 梁洪亮, 赵琛 Journal of software 18 (3), 730-738, 2007 | 11 | 2007 |
Enforcing mandatory integrity protection in operating system H Liang, Y Sun Proceedings 2001 International Conference on Computer Networks and Mobile …, 2001 | 11 | 2001 |