default search action
Bin Liang 0002
Person information
- affiliation: Renmin University of China, School of Information, Key Laboratory of Data Engineering and Knowledge Engineering, Beijing, China
Other persons with the same name
- Bin Liang — disambiguation page
- Bin Liang 0001 — Tsinghua University, Department of Automation, Beijing, China (and 4 more)
- Bin Liang 0003 — CSIRO, Data61, Australia (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j17]Yuan Song, Wenchang Shi, Bo Qin, Bin Liang:
A collective attestation scheme towards cloud system. Clust. Comput. 26(5): 2467-2478 (2023) - [j16]Chu Wang, Manfeng Dou, Jian-Zhong Li, Rachid Outbib, Dongdong Zhao, Jian Zuo, Yuanlin Wang, Bin Liang, Peng Wang:
Data-driven prognostics based on time-frequency analysis and symbolic recurrent neural network for fuel cells under dynamic load. Reliab. Eng. Syst. Saf. 233: 109123 (2023) - [j15]Jianjun Huang, Bo Xue, Jiasheng Jiang, Wei You, Bin Liang, Jingzheng Wu, Yanjun Wu:
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering. IEEE Trans. Software Eng. 49(4): 2272-2284 (2023) - 2022
- [j14]Leilei Qu, Ruojin Xiao, Wenchang Shi, Keman Huang, Bo Qin, Bin Liang:
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges. Comput. Secur. 122: 102891 (2022) - [j13]Jianjun Huang, Jiasheng Jiang, Wei You, Bin Liang:
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts. IEEE Trans. Computers 71(7): 1551-1563 (2022) - 2021
- [j12]Shilei Bai, Bin Liang, Jianjun Huang, Wei You, Jiachun Li, Yaping Li, Wenchang Shi:
Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness. IEEE Trans. Computers 70(9): 1374-1387 (2021) - [j11]Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang:
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction. IEEE Trans. Dependable Secur. Comput. 18(1): 72-85 (2021) - [j10]Jianjun Huang, Songming Han, Wei You, Wenchang Shi, Bin Liang, Jingzheng Wu, Yanjun Wu:
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching. IEEE Trans. Inf. Forensics Secur. 16: 2144-2156 (2021) - 2020
- [j9]Jianwei Hou, Minjian Zhang, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
On the fine-grained fingerprinting threat to software-defined networks. Future Gener. Comput. Syst. 107: 485-497 (2020) - [j8]Bo Qin, Jikun Huang, Qin Wang, Xizhao Luo, Bin Liang, Wenchang Shi:
Cecoin: A decentralized PKI mitigating MitM attacks. Future Gener. Comput. Syst. 107: 805-815 (2020) - [j7]Hongcheng Li, Jianjun Huang, Bin Liang, Wenchang Shi, Yifang Wu, Shilei Bai:
Identifying parasitic malware as outliers by code clustering. J. Comput. Secur. 28(2): 157-189 (2020) - [j6]Yifang Wu, Jianjun Huang, Bin Liang, Wenchang Shi:
Do not jail my app: Detecting the Android plugin environments by time lag contradiction. J. Comput. Secur. 28(2): 269-293 (2020) - [j5]Wei You, Bin Liang, Wenchang Shi, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. IEEE Trans. Dependable Secur. Comput. 17(1): 209-222 (2020) - [j4]Pan Bian, Bin Liang, Yan Zhang, Chaoqun Yang, Wenchang Shi, Yan Cai:
Corrections to "Detecting Bugs by Discovering Expectations and Their Violations". IEEE Trans. Software Eng. 46(1): 113 (2020) - 2019
- [j3]Pan Bian, Bin Liang, Yan Zhang, Chaoqun Yang, Wenchang Shi, Yan Cai:
Detecting Bugs by Discovering Expectations and Their Violations. IEEE Trans. Software Eng. 45(10): 984-1001 (2019) - 2017
- [j2]Weigang Gong, Wei You, Zan Li, Wenchang Shi, Bin Liang:
一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation). 计算机科学 44(11): 22-26 (2017) - 2016
- [j1]Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks. Concurr. Comput. Pract. Exp. 28(10): 2920-2939 (2016)
Conference and Workshop Papers
- 2024
- [c38]Jianjun Huang, Jianglei Nie, Yuanjun Gong, Wei You, Bin Liang, Pan Bian:
Raisin: Identifying Rare Sensitive Functions for Bug Detection. ICSE 2024: 175:1-175:12 - [c37]Dongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang, Jianjun Huang, Wenchang Shi, Zhuo Zhang, Xiangyu Zhang:
Define-Use Guided Path Exploration for Better Forced Execution. ISSTA 2024: 287-299 - [c36]Yuanjun Gong, Jianglei Nie, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang, Jian Zhang:
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection. ICPC 2024: 304-315 - 2023
- [c35]Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang:
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. CCS 2023: 2486-2500 - [c34]Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang, Jian Zhang:
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers. ICSE 2023: 95-107 - 2022
- [c33]Xiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang, Wei You, Wenchang Shi, Jian Zhang:
Hunting bugs with accelerated optimal graph vertex matching. ISSTA 2022: 64-76 - 2020
- [c32]Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang:
Experimental Comparisons of Verifiable Delay Functions. ICICS 2020: 510-527 - [c31]Jiwei Yan, Hao Liu, Linjie Pan, Jun Yan, Jian Zhang, Bin Liang:
Multiple-entry testing of Android applications by constructing activity launching contexts. ICSE 2020: 457-468 - [c30]Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang:
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. ESEC/SIGSOFT FSE 2020: 1101-1113 - 2019
- [c29]Yue Yuan, Wenchang Shi, Bin Liang, Bo Qin:
An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack. CLOUD 2019: 124-131 - [c28]Leilei Qu, Cheng Wang, Ruojin Xiao, Jianwei Hou, Wenchang Shi, Bin Liang:
Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity. CHI Extended Abstracts 2019 - [c27]Yue Yuan, Han Anu, Wenchang Shi, Bin Liang, Bo Qin:
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components. COMPSAC (1) 2019: 66-71 - [c26]Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN. ICICS 2019: 503-520 - [c25]Wei You, Xuwei Liu, Shiqing Ma, David Mitchel Perry, Xiangyu Zhang, Bin Liang:
SLF: fuzzing without valid seed inputs. ICSE 2019: 712-723 - [c24]Han Anu, Jie Chen, Wenchang Shi, Jianwei Hou, Bin Liang, Bo Qin:
An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention. ICSME 2019: 125-134 - [c23]Yan Cai, Biyun Zhu, Ruijie Meng, Hao Yun, Liang He, Purui Su, Bin Liang:
Detecting concurrency memory corruption vulnerabilities. ESEC/SIGSOFT FSE 2019: 706-717 - [c22]Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786 - 2018
- [c21]Bin Liang, Hongcheng Li, Miaoqiang Su, Pan Bian, Xirong Li, Wenchang Shi:
Deep Text Classification Can be Fooled. IJCAI 2018: 4208-4215 - [c20]Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai:
NAR-miner: discovering negative association rules from code for bug detection. ESEC/SIGSOFT FSE 2018: 411-422 - 2017
- [c19]Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang:
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. CCS 2017: 2139-2154 - [c18]Minjian Zhang, Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
Fine-Grained Fingerprinting Threats to Software-Defined Networks. TrustCom/BigDataSE/ICESS 2017: 128-135 - 2016
- [c17]Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai:
AntMiner: mining more bugs by reducing noise interference. ICSE 2016: 333-344 - [c16]Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang:
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices. ICSE 2016: 959-970 - [c15]Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang:
Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection. SpaCCS 2016: 478-490 - [c14]Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang:
A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation. TSA 2016: 8-16 - [c13]Bin Liang, Miaoqiang Su, Wei You, Wenchang Shi, Gang Yang:
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter. WWW 2016: 345-356 - 2015
- [c12]Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang:
Android Implicit Information Flow Demystified. AsiaCCS 2015: 585-590 - [c11]Chenglong Wei, Wenchang Shi, Bo Qin, Bin Liang:
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement. ISPEC 2015: 18-32 - 2014
- [c10]Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich:
Scriptless Timing Attacks on Web Browser Privacy. DSN 2014: 112-123 - [c9]Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang:
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. ICSE 2014: 1036-1046 - [c8]Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang:
HDROP: Detecting ROP Attacks Using Performance Monitoring Counters. ISPEC 2014: 172-186 - [c7]Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. NSS 2014: 448-461 - 2011
- [c6]Bin Liang, Wei You, Wenchang Shi, Zhaohui Liang:
Detecting stealthy malware with inter-structure and imported signatures. AsiaCCS 2011: 217-227 - [c5]Hui Feng, Wenchang Shi, Zhaohui Liang, Bin Liang:
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study. CMC 2011: 65-70 - 2009
- [c4]Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan:
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. MASS 2009: 783-789 - 2005
- [c3]Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu:
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. ISPEC 2005: 109-120 - [c2]Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang:
Security On-demand Architecture with Multiple Modules Support. ISPEC 2005: 121-131 - [c1]Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He:
A Formal Description of SECIMOS Operating System. MMM-ACNS 2005: 286-297
Informal and Other Publications
- 2023
- [i5]Chu Wang, Manfeng Dou, Zhongliang Li, Rachid Outbib, Dongdong Zhao, Jian Zuo, Yuanlin Wang, Bin Liang, Peng Wang:
Data-driven prognostics based on time-frequency analysis and symbolic recurrent neural network for fuel cells under dynamic load. CoRR abs/2302.10771 (2023) - [i4]Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. CoRR abs/2311.06122 (2023) - 2021
- [i3]Bin Liang, Jiachun Li, Jianjun Huang:
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature. CoRR abs/2106.05261 (2021) - 2017
- [i2]Bin Liang, Hongcheng Li, Miaoqiang Su, Pan Bian, Xirong Li, Wenchang Shi:
Deep Text Classification Can be Fooled. CoRR abs/1704.08006 (2017) - [i1]Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang:
Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction. CoRR abs/1705.08378 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint