IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment X Ban, M Ding, S Liu, C Chen, J Zhang IEEE Internet of Things Journal, 2023 | | 2023 |
A Fuzzing Method for Security Testing of Sensors X Zhu, S Liu, A Jolfaei IEEE Sensors Journal, 2023 | | 2023 |
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs Z Liu, Z Zhang, S Ma, D Liu, J Zhang, C Chen, S Liu, ME Ahmed, Y Xiang arXiv preprint arXiv:2308.01463, 2023 | | 2023 |
A Survey on IoT Vulnerability Discovery X Ban, M Ding, S Liu, C Chen, J Zhang International Conference on Network and System Security, 267-282, 2022 | 3 | 2022 |
No-Label User-Level Membership Inference for ASR Model Auditing Y Miao, C Chen, L Pan, S Liu, S Camtepe, J Zhang, Y Xiang European Symposium on Research in Computer Security, 610-628, 2022 | | 2022 |
DeCoP: Deep Learning for COVID-19 Prediction of Survival Y Deng, S Liu, A Jolfaei, H Cheng, Z Wang, X Zheng IEEE Transactions on Molecular, Biological and Multi-Scale Communications 8 …, 2022 | 2 | 2022 |
TAESim: A Testbed for IoT security analysis of trigger-action environment X Ban, M Ding, S Liu, C Chen, J Zhang, Y Xiang European Symposium on Research in Computer Security, 218-237, 2021 | 4 | 2021 |
Attacks and defences on intelligent connected vehicles: A survey M Dibaei, X Zheng, K Jiang, R Abbas, S Liu, Y Zhang, Y Xiang, S Yu Digital Communications and Networks 6 (4), 399-421, 2020 | 135 | 2020 |
Defuzz: Deep learning guided directed fuzzing X Zhu, S Liu, X Li, S Wen, J Zhang, C Seyit, Y Xiang arXiv preprint arXiv:2010.12149, 2020 | 13 | 2020 |
Decision-based evasion attacks on tree ensemble classifiers F Zhang, Y Wang, S Liu, H Wang World Wide Web 23, 2957-2977, 2020 | 66 | 2020 |
CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation S Liu, G Lin, L Qu, J Zhang, O De Vel, P Montague, Y Xiang IEEE Transactions on Dependable and Secure Computing 19 (1), 438-451, 2020 | 68 | 2020 |
A study of data pre-processing techniques for imbalanced biomedical data classification S Liu, J Zhang, Y Xiang, W Zhou, D Xiang International Journal of Bioinformatics Research and Applications 16 (3 …, 2020 | 22 | 2020 |
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019 | 104 | 2019 |
Cyber vulnerability intelligence for internet of things binary S Liu, M Dibaei, Y Tai, C Chen, J Zhang, Y Xiang IEEE Transactions on Industrial Informatics 16 (3), 2154-2163, 2019 | 46 | 2019 |
A performance evaluation of deep‐learnt features for software vulnerability detection X Ban, S Liu, C Chen, C Chua Concurrency and Computation: Practice and Experience 31 (19), e5103, 2019 | 49 | 2019 |
An overview of attacks and defences on intelligent connected vehicles M Dibaei, X Zheng, K Jiang, S Maric, R Abbas, S Liu, Y Zhang, Y Deng, ... arXiv preprint arXiv:1907.07455, 2019 | 49 | 2019 |
ArtChain: Blockchain-enabled platform for art marketplace Z Wang, L Yang, Q Wang, D Liu, Z Xu, S Liu 2019 IEEE international conference on blockchain (blockchain), 447-454, 2019 | 79 | 2019 |
Exponential stability of big data in networked control systems for a class of uncertain time-delay and packet dropout H Zheng, S Liu, F Sun International Journal of Embedded Systems 11 (6), 788-795, 2019 | | 2019 |
Exploit in smart devices: A case study Z Liu, C Chen, S Liu, D Liu, Y Wang Security and Privacy in Social Networks and Big Data: 5th International …, 2019 | | 2019 |
Deep-learnt features for Twitter spam detection X Ban, C Chen, S Liu, Y Wang, J Zhang 2018 International symposium on security and privacy in social networks and …, 2018 | 29 | 2018 |