default search action
Binbin Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Bijing Jin, Taorui Zeng, Tengfei Wang, Zhan Zhang, Lei Gui, Kunlong Yin, Binbin Zhao:
Advanced risk assessment framework for land subsidence impacts on transmission towers in salt lake region. Environ. Model. Softw. 177: 106058 (2024) - [j18]Binbin Zhao, Rim Razzouk:
The Growth of Contemporary Music Subject and the Reform of Music Teaching in Universities. Int. J. Web Based Learn. Teach. Technol. 19(1): 1-15 (2024) - [j17]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. IEEE Trans. Dependable Secur. Comput. 21(3): 1372-1389 (2024) - [c13]Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen:
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. NDSS 2024 - [c12]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. SP 2024: 2310-2387 - 2023
- [j16]Bijing Jin, Taorui Zeng, Taohui Yang, Lei Gui, Kunlong Yin, Baorui Guo, Binbin Zhao, Qiuyang Li:
The Prediction of Transmission Towers' Foundation Ground Subsidence in the Salt Lake Area Based on Multi-Temporal Interferometric Synthetic Aperture Radar and Deep Learning. Remote. Sens. 15(19): 4805 (2023) - [j15]Binbin Zhao, Junjian Tang, Lin Li, Ying Liu, Yueyang Zhai:
Precise Measurement of Magnetic Shielding Residual Field and Light Shift Based on 87Rb Atomic Magnetometer. IEEE Trans. Instrum. Meas. 72: 1-7 (2023) - [c11]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. USENIX Security Symposium 2023: 3421-3438 - [c10]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Cheng, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. USENIX Security Symposium 2023: 4517-4534 - [i5]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. CoRR abs/2303.02545 (2023) - [i4]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. CoRR abs/2306.11206 (2023) - [i3]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. CoRR abs/2309.14742 (2023) - 2022
- [j14]Bijing Jin, Kunlong Yin, Qiuyang Li, Lei Gui, Taohui Yang, Binbin Zhao, Baorui Guo, Taorui Zeng, Zhiqing Ma:
Susceptibility Analysis of Land Subsidence along the Transmission Line in the Salt Lake Area Based on Remote Sensing Interpretation. Remote. Sens. 14(13): 3229 (2022) - [j13]Yuhan Su, Honglei Yang, Junhuan Peng, Youfeng Liu, Binbin Zhao, Mengyao Shi:
A Novel Near-Real-Time GB-InSAR Slope Deformation Monitoring Method. Remote. Sens. 14(21): 5585 (2022) - [j12]Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang, Raheem Beyah:
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Trans. Dependable Secur. Comput. 19(3): 1826-1840 (2022) - [c9]Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, Raheem Beyah:
SLIME: program-sensitive energy allocation for fuzzing. ISSTA 2022: 365-377 - [c8]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. ISSTA 2022: 442-454 - [c7]Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, Raheem Beyah:
EMS: History-Driven Mutation for Coverage-based Fuzzing. NDSS 2022 - [i2]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. CoRR abs/2208.08751 (2022) - [i1]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. CoRR abs/2212.13716 (2022) - 2021
- [j11]Binbin Zhao, Shihong Liu:
Basketball shooting technology based on acceleration sensor fusion motion capture technology. EURASIP J. Adv. Signal Process. 2021(1): 21 (2021) - [j10]Mu Zhang, Si-Si Li, Binbin Zhao:
A 2-order additive fuzzy measure identification method based on intuitionistic fuzzy sets and its application in credit evaluation. J. Intell. Fuzzy Syst. 40(6): 10589-10601 (2021) - [j9]Shuhao Liu, Kunlong Yin, Chao Zhou, Lei Gui, Xin Liang, Wei Lin, Binbin Zhao:
Susceptibility Assessment for Landslide Initiated along Power Transmission Lines. Remote. Sens. 13(24): 5068 (2021) - [j8]Zetian Yang, Zhongtai Zhu, Zixuan Chen, Mingjia Liu, Binbin Zhao, Yansong Liu, Zefei Cheng, Shuo Wang, Weidong Yang, Tao Yu:
Recent Advances in Self-Powered Piezoelectric and Triboelectric Sensors: From Material and Structure Design to Frontier Applications of Artificial Intelligence. Sensors 21(24): 8422 (2021) - [c6]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. USENIX Security Symposium 2021: 4205-4222
2010 – 2019
- 2019
- [j7]Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah:
Towards understanding the security of modern image captchas and underground captcha-solving services. Big Data Min. Anal. 2(2): 118-144 (2019) - [j6]Qingchao Sun, Binbin Zhao, Xin Liu, Xiaokai Mu, Yuanliang Zhang:
Assembling deviation estimation based on the real mating status of assembly. Comput. Aided Des. 115: 244-255 (2019) - [j5]Chaoyong Shen, Zhongke Feng, Chou Xie, Haoran Fang, Binbin Zhao, Wenhao Ou, Yu Zhu, Kai Wang, Hongwei Li, Honglin Bai, Abdul Mannan, Panpan Chen:
Refinement of Landslide Susceptibility Map Using Persistent Scatterer Interferometry in Areas of Intense Mining Activities in the Karst Region of Southwest China. Remote. Sens. 11(23): 2821 (2019) - [j4]Yunfeng Ge, Huiming Tang, Xulong Gong, Binbin Zhao, Yi Lu, Yong Chen, Zishan Lin, Hongzhi Chen, Yashi Qiu:
Deformation Monitoring of Earth Fissure Hazards Using Terrestrial Laser Scanning. Sensors 19(6): 1463 (2019) - 2018
- [c5]Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Reheem Beyah:
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs. AISec@CCS 2018: 85-96 - 2016
- [j3]Lixia Xie, Fukuan Bo, Binbin Zhao:
虚拟分组撤销策略的云存储访问控制模型 (Virtual Group Revocation Policy-based Cloud Storage Access Control Model). 计算机科学 43(5): 122-126 (2016) - 2015
- [c4]Binbin Zhao, Dongliang Peng, Shixiong Hu, Shanshan Liu:
A practical technique to solve settlements overlapping roads problem in map generalization. Geoinformatics 2015: 1-5 - 2014
- [c3]Binbin Zhao, Min Deng, Xiaomi Wang, Dongliang Peng:
Research on change classification description and identification of corresponding area objects in multi-scale maps. Geoinformatics 2014: 1-11 - 2012
- [j2]Zhenzhen Jian, Binbin Zhao, Yongqing Chen:
Application of Bi-Dimensional Empirical Mode Decomposition (BEMD) in Extraction of platinum and palladium Anomalies Features. Adv. Data Sci. Adapt. Anal. 4(1-2) (2012) - 2011
- [c2]Yongqing Chen, Binbin Zhao:
Application of BEMD in extraction of regional and local gravity anomalies associated with Au mineralization within Western Shandong Uplift Block, Eastern China. FSKD 2011: 1509-1517 - 2010
- [j1]Jingning Huang, Binbin Zhao, Yongqing Chen, Pengda Zhao:
Bidimensional empirical mode decomposition (BEMD) for extraction of gravity anomalies associated with gold mineralization in the Tongshi gold field, Western Shandong Uplifted Block, Eastern China. Comput. Geosci. 36(7): 987-995 (2010)
2000 – 2009
- 2009
- [c1]Binbin Zhao, Yongqing Chen:
Application of Scale Invariant Generator in Quantitative Extraction of Ore-forming Information from Gravitational Data: A Case Study from Tongshi Gold Field, Eastern China. FSKD (5) 2009: 485-490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint