Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chaojing Tang
@inproceedings{DBLP:conf/iccns/ZhaoLLT23, author = {Wei Zhao and Zhiwei Li and Ruilin Li and Chaojing Tang}, title = {CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior}, booktitle = {Proceedings of the 2023 13th International Conference on Communication and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023}, pages = {6--11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3638782.3638784}, doi = {10.1145/3638782.3638784}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhaoLLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiZCLFT23, author = {Runhao Li and Bin Zhang and Jiongyi Chen and Wenfeng Lin and Chao Feng and Chaojing Tang}, title = {Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/towards-automatic-and-precise-heap-layout-manipulation-for-general-purpose-programs/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiZCLFT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangCLFLT23, author = {Bin Zhang and Jiongyi Chen and Runhao Li and Chao Feng and Ruilin Li and Chaojing Tang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4499--4515}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-bin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangCLFLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangYLFST22, author = {Bin Zhang and Jiaxi Ye and Ruilin Li and Chao Feng and Yunfei Su and Chaojing Tang}, title = {Pusher: an augmented fuzzer based on the connection between input and comparison operand}, journal = {Frontiers Comput. Sci.}, volume = {16}, number = {4}, pages = {164206}, year = {2022}, url = {https://doi.org/10.1007/s11704-021-0075-8}, doi = {10.1007/S11704-021-0075-8}, timestamp = {Fri, 17 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangYLFST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/YangTL22, author = {Gang Yang and Chaojing Tang and Xingtong Liu}, title = {DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective}, journal = {Symmetry}, volume = {14}, number = {10}, pages = {2138}, year = {2022}, url = {https://doi.org/10.3390/sym14102138}, doi = {10.3390/SYM14102138}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/YangTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangGHTRTEZP22, author = {Zhiyuan Jiang and Shuitao Gan and Adrian Herrera and Flavio Toffalini and Lucio Romerio and Chaojing Tang and Manuel Egele and Chao Zhang and Mathias Payer}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Evocatio: Conjuring Bug Capabilities from a Single PoC}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1599--1613}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560575}, doi = {10.1145/3548606.3560575}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiangGHTRTEZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhangCFLDZ0T22, author = {Xing Zhang and Jiongyi Chen and Chao Feng and Ruilin Li and Wenrui Diao and Kehuan Zhang and Jing Lei and Chaojing Tang}, title = {Default: Mutual Information-based Crash Triage for Massive Crashes}, booktitle = {44th {IEEE/ACM} 44th International Conference on Software Engineering, {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022}, pages = {635--646}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510003.3512760}, doi = {10.1145/3510003.3512760}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ZhangCFLDZ0T22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/PanLWTW21, author = {Zhipeng Pan and Jing Lei and Lei Wen and Chaojing Tang and Zhongfeng Wang}, title = {Low-complexity sphere decoding for {MIMO-SCMA} systems}, journal = {{IET} Commun.}, volume = {15}, number = {4}, pages = {537--545}, year = {2021}, url = {https://doi.org/10.1049/cmu2.12085}, doi = {10.1049/CMU2.12085}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/PanLWTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangJHTZP21, author = {Zhiyuan Jiang and Xiyue Jiang and Ahmad Hazimeh and Chaojing Tang and Chao Zhang and Mathias Payer}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Igor: Crash Deduplication Through Root-Cause Clustering}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {3318--3336}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485364}, doi = {10.1145/3460120.3485364}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiangJHTZP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangCFLSZLT21, author = {Xing Zhang and Jiongyi Chen and Chao Feng and Ruilin Li and Yunfei Su and Bin Zhang and Jing Lei and Chaojing Tang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Reducing Test Cases with Attention Mechanism of Neural Networks}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2075--2092}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-xing}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangCFLSZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ShiT20, author = {Weixu Shi and Chaojing Tang}, title = {Number of quantum measurement outcomes as a resource}, journal = {Quantum Inf. Process.}, volume = {19}, number = {10}, pages = {393}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02899-9}, doi = {10.1007/S11128-020-02899-9}, timestamp = {Mon, 09 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/ShiT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenLZT19, author = {Xiayang Chen and Xingtong Liu and Lei Zhang and Chaojing Tang}, title = {Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game}, journal = {{IEEE} Access}, volume = {7}, pages = {19907--19921}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2897724}, doi = {10.1109/ACCESS.2019.2897724}, timestamp = {Mon, 23 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChenLZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YeZLFT19, author = {Jiaxi Ye and Bin Zhang and Ruilin Li and Chao Feng and Chaojing Tang}, title = {Program State Sensitive Parallel Fuzzing for Real World Software}, journal = {{IEEE} Access}, volume = {7}, pages = {42557--42564}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905744}, doi = {10.1109/ACCESS.2019.2905744}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YeZLFT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangFLLT19, author = {Xing Zhang and Chao Feng and Runhao Li and Jing Lei and Chaojing Tang}, title = {NeuralTaint: {A} Key Segment Marking Tool Based on Neural Network}, journal = {{IEEE} Access}, volume = {7}, pages = {68786--68798}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2915681}, doi = {10.1109/ACCESS.2019.2915681}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangFLLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiFZT19, author = {Runhao Li and Chao Feng and Xing Zhang and Chaojing Tang}, title = {A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {80079--80092}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2923227}, doi = {10.1109/ACCESS.2019.2923227}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiFZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiZFZT19, author = {Runhao Li and Chen Zhang and Chao Feng and Xing Zhang and Chaojing Tang}, title = {Locating Vulnerability in Binaries Using Deep Neural Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {134660--134676}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2942043}, doi = {10.1109/ACCESS.2019.2942043}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiZFZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PanL0LT19, author = {Zhipeng Pan and Jing Lei and Wei Liu and Junshan Luo and Chaojing Tang}, title = {Grant-Free Rateless {SCMA} for Cellular Internet of Things Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {147954--147961}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2946605}, doi = {10.1109/ACCESS.2019.2946605}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PanL0LT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangFLLT19a, author = {Xing Zhang and Chao Feng and Runhao Li and Jing Lei and Chaojing Tang}, title = {Marking Key Segment of Program Input via Attention Mechanism}, journal = {{IEEE} Access}, volume = {7}, pages = {183877--183891}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2960522}, doi = {10.1109/ACCESS.2019.2960522}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangFLLT19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/PanLLWT19, author = {Zhipeng Pan and Junshan Luo and Jing Lei and Lei Wen and Chaojing Tang}, title = {Uplink Spatial Modulation {SCMA} System}, journal = {{IEEE} Commun. Lett.}, volume = {23}, number = {1}, pages = {184--187}, year = {2019}, url = {https://doi.org/10.1109/LCOMM.2018.2882813}, doi = {10.1109/LCOMM.2018.2882813}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/PanLLWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/PanLLLWT19, author = {Zhipeng Pan and Wei Liu and Jing Lei and Junshan Luo and Lei Wen and Chaojing Tang}, title = {Multi-Dimensional Space-Time Block Coding Aided Downlink {MIMO-SCMA}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {7}, pages = {6657--6669}, year = {2019}, url = {https://doi.org/10.1109/TVT.2019.2915351}, doi = {10.1109/TVT.2019.2915351}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/PanLLLWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuLTWZ18, author = {Yi Liu and Xingtong Liu and Chaojing Tang and Jian Wang and Lei Zhang}, title = {Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin}, journal = {{IEEE} Access}, volume = {6}, pages = {23261--23270}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2827163}, doi = {10.1109/ACCESS.2018.2827163}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuLTWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PanLZLT18, author = {Zhipeng Pan and Erbao Li and Lei Zhang and Jing Lei and Chaojing Tang}, title = {Design and Optimization of Joint Iterative Detection and Decoding Receiver for Uplink Polar Coded {SCMA} System}, journal = {{IEEE} Access}, volume = {6}, pages = {52014--52026}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2869906}, doi = {10.1109/ACCESS.2018.2869906}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PanLZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuLT18, author = {Jiao Hu and Ruilin Li and Chaojing Tang}, title = {A real-time inversion attack on the {GMR-2} cipher used in the satellite phones}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {032113:1--032113:18}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9230-8}, doi = {10.1007/S11432-017-9230-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChenTWZM18, author = {Xiayang Chen and Chaojing Tang and Jian Wang and Lei Zhang and Qingkun Meng}, title = {Improved Wolf Pack Algorithm Based on Differential Evolution Elite Set}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {7}, pages = {1946--1949}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017EDL8201}, doi = {10.1587/TRANSINF.2017EDL8201}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ChenTWZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiuMLWZT18, author = {Yi Liu and Qingkun Meng and Xingtong Liu and Jian Wang and Lei Zhang and Chaojing Tang}, title = {Formal Method for Security Analysis of Electronic Payment Protocols}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {9}, pages = {2291--2297}, year = {2018}, url = {https://doi.org/10.1587/transinf.2018EDP7108}, doi = {10.1587/TRANSINF.2018EDP7108}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiuMLWZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-sen/ZhangFHCCT18, author = {Bin Zhang and Chao Feng and Adrian Herrera and Vitaly Chipounov and George Candea and Chaojing Tang}, title = {Discover deeper bugs with dynamic symbolic execution and coverage-based fuzz testing}, journal = {{IET} Softw.}, volume = {12}, number = {6}, pages = {507--519}, year = {2018}, url = {https://doi.org/10.1049/iet-sen.2017.0200}, doi = {10.1049/IET-SEN.2017.0200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-sen/ZhangFHCCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangFT18, author = {Zhiyuan Jiang and Chao Feng and Chaojing Tang}, title = {An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {4610320:1--4610320:21}, year = {2018}, url = {https://doi.org/10.1155/2018/4610320}, doi = {10.1155/2018/4610320}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiangFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaci/ChenTZL18, author = {Xiayang Chen and Chaojing Tang and Lei Zhang and Yi Liu}, title = {Improved wolf pack algorithm with differential evolution for global numerical optimization}, booktitle = {Tenth International Conference on Advanced Computational Intelligence, {ICACI} 2018, Xiamen, China, March 29-31, 2018}, pages = {116--121}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICACI.2018.8377591}, doi = {10.1109/ICACI.2018.8377591}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icaci/ChenTZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaip/XiaFZLT18, author = {Yuan Xia and Chao Feng and Xing Zhang and Runhao Li and Chaojing Tang}, title = {Parallelization of Extracting Binary Program Execution Trace Offline}, booktitle = {Proceedings of the 2nd International Conference on Advances in Image Processing, {ICAIP} 2018, Chengdu, China, June 16-18, 2018}, pages = {184--188}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3239576.3239603}, doi = {10.1145/3239576.3239603}, timestamp = {Thu, 23 Mar 2023 11:00:28 +0100}, biburl = {https://dblp.org/rec/conf/icaip/XiaFZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaip/LiFT18, author = {Yang Li and Chao Feng and Chaojing Tang}, title = {A Large-scale Parallel Fuzzing System}, booktitle = {Proceedings of the 2nd International Conference on Advances in Image Processing, {ICAIP} 2018, Chengdu, China, June 16-18, 2018}, pages = {194--197}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3239576.3239615}, doi = {10.1145/3239576.3239615}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaip/LiFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PanLWLT18, author = {Zhipeng Pan and Erbao Li and Lei Wen and Jing Lei and Chaojing Tang}, title = {Joint Iterative Detection and Decoding Receiver for Polar Coded {SCMA} System}, booktitle = {2018 {IEEE} International Conference on Communications Workshops, {ICC} Workshops 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCW.2018.8403620}, doi = {10.1109/ICCW.2018.8403620}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/PanLWLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiWTL17, author = {Ran Ji and Jian Wang and Chaojing Tang and Ruilin Li}, title = {Automatic Reverse Engineering of Private Flight Control Protocols of UAVs}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {1308045:1--1308045:9}, year = {2017}, url = {https://doi.org/10.1155/2017/1308045}, doi = {10.1155/2017/1308045}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiWTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuLLWTK17, author = {Yi Liu and Ruilin Li and Xingtong Liu and Jian Wang and Chaojing Tang and Hongyan Kang}, title = {Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm}, booktitle = {13th International Conference on Computational Intelligence and Security, {CIS} 2017, Hong Kong, China, December 15-18, 2017}, pages = {317--321}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIS.2017.00075}, doi = {10.1109/CIS.2017.00075}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuLLWTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YeZYFT17, author = {Jiaxi Ye and Bin Zhang and Ziqing Ye and Chao Feng and Chaojing Tang}, title = {Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing}, booktitle = {13th International Conference on Computational Intelligence and Security, {CIS} 2017, Hong Kong, China, December 15-18, 2017}, pages = {543--547}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIS.2017.00126}, doi = {10.1109/CIS.2017.00126}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YeZYFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangYFT17, author = {Bin Zhang and Jiaxi Ye and Chao Feng and Chaojing Tang}, title = {{S2F:} Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing}, booktitle = {13th International Conference on Computational Intelligence and Security, {CIS} 2017, Hong Kong, China, December 15-18, 2017}, pages = {548--552}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIS.2017.00127}, doi = {10.1109/CIS.2017.00127}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangYFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsai/LiuLZTK17, author = {Yi Liu and Xingtong Liu and Lei Zhang and Chaojing Tang and Hongyan Kang}, title = {An efficient strategy to eliminate malleability of bitcoin transaction}, booktitle = {4th International Conference on Systems and Informatics, {ICSAI} 2017, Hangzhou, China, November 11-13, 2017}, pages = {960--964}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICSAI.2017.8248424}, doi = {10.1109/ICSAI.2017.8248424}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/icsai/LiuLZTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscid/ChenTWZL17, author = {Xiayang Chen and Chaojing Tang and Jian Wang and Lei Zhang and Yi Liu}, title = {A Novel Hybrid Based on Wolf Pack Algorithm and Differential Evolution Algorithm}, booktitle = {10th International Symposium on Computational Intelligence and Design, {ISCID} 2017, Hangzhou, China, December 9-10, 2017, Volume 1}, pages = {69--74}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISCID.2017.63}, doi = {10.1109/ISCID.2017.63}, timestamp = {Mon, 23 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscid/ChenTWZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscid/LiuCZTK17, author = {Yi Liu and Xiayang Chen and Lei Zhang and Chaojing Tang and Hongyan Kang}, title = {An Intelligent Strategy to Gain Profit for Bitcoin Mining Pools}, booktitle = {10th International Symposium on Computational Intelligence and Design, {ISCID} 2017, Hangzhou, China, December 9-10, 2017 - Volume 2}, pages = {427--430}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISCID.2017.184}, doi = {10.1109/ISCID.2017.184}, timestamp = {Mon, 23 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscid/LiuCZTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TanTZW17, author = {Huiting Tan and Chaojing Tang and Chen Zhang and Shaolei Wang}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Area-Dividing Route Mutation in Moving Target Defense Based on {SDN}}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {565--574}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_43}, doi = {10.1007/978-3-319-64701-2\_43}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/TanTZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiuLZWT17, author = {Yi Liu and Xingtong Liu and Lei Zhang and Jian Wang and Chaojing Tang}, title = {Novel Logical Method for Security Analysis of Electronic Payment Protocols}, journal = {CoRR}, volume = {abs/1706.10078}, year = {2017}, url = {http://arxiv.org/abs/1706.10078}, eprinttype = {arXiv}, eprint = {1706.10078}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiuLZWT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuLT17, author = {Jiao Hu and Ruilin Li and Chaojing Tang}, title = {A Real-time Inversion Attack on the {GMR-2} Cipher Used in the Satellite Phones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2017}, url = {http://eprint.iacr.org/2017/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/MengWFT16, author = {Qingkun Meng and Shameng Wen and Chao Feng and Chaojing Tang}, editor = {Yaoli Wang and Jiancheng An and Lipo Wang and Qingli Li and Gaowei Van and Qing Chang}, title = {Predicting buffer overflow using semi-supervised learning}, booktitle = {9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2016, Datong, China, October 15-17, 2016}, pages = {1959--1963}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CISP-BMEI.2016.7853039}, doi = {10.1109/CISP-BMEI.2016.7853039}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/MengWFT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiLT16, author = {Ran Ji and Haifeng Li and Chaojing Tang}, title = {Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning}, booktitle = {12th International Conference on Computational Intelligence and Security, {CIS} 2016, Wuxi, China, December 16-19, 2016}, pages = {309--313}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIS.2016.0076}, doi = {10.1109/CIS.2016.0076}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WenFMZWT16, author = {Shameng Wen and Chao Feng and Qingkun Meng and Bin Zhang and Ligeng Wu and Chaojing Tang}, title = {Testing Network Protocol Binary Software with Selective Symbolic Execution}, booktitle = {12th International Conference on Computational Intelligence and Security, {CIS} 2016, Wuxi, China, December 16-19, 2016}, pages = {318--322}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIS.2016.0078}, doi = {10.1109/CIS.2016.0078}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WenFMZWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edutainment/LiuZT16, author = {Jian Liu and Quan Zhang and Chaojing Tang}, editor = {Abdennour El Rhalibi and Feng Tian and Zhigeng Pan and Baoquan Liu}, title = {Nose Tip Detection and Face Localization from Face Range Image Based on Multi-angle Energy}, booktitle = {E-Learning and Games - 10th International Conference, Edutainment 2016, Hangzhou, China, April 14-16, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9654}, pages = {136--147}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40259-8\_12}, doi = {10.1007/978-3-319-40259-8\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/edutainment/LiuZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsai/WenFMZWT16, author = {Shameng Wen and Chao Feng and Qingkun Meng and Bin Zhang and Ligeng Wu and Chaojing Tang}, editor = {Xiang Fei and Lipo Wang and Chunlei Ji and Qiang Sun and Niansheng Chen and Xiaoyong Song and Xin Wang}, title = {Analyzing network protocol binary software with joint symbolic execution}, booktitle = {3rd International Conference on Systems and Informatics, {ICSAI} 2016, Shanghai, China, November 19-21, 2016}, pages = {738--742}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICSAI.2016.7811050}, doi = {10.1109/ICSAI.2016.7811050}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/icsai/WenFMZWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/ZhangFWT16, author = {Bin Zhang and Chao Feng and Bo Wu and Chaojing Tang}, editor = {Yihai Chen}, title = {Detecting integer overflow in Windows binary executables based on symbolic execution}, booktitle = {17th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016}, pages = {385--390}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SNPD.2016.7515929}, doi = {10.1109/SNPD.2016.7515929}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/ZhangFWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/LiuLIT15, author = {Wei Liu and Jing Lei and Muhammad Ali Imran and Chaojing Tang}, title = {Diversity gain of lattice constellation-based joint orthogonal space-time block coding}, journal = {{IET} Commun.}, volume = {9}, number = {18}, pages = {2274--2280}, year = {2015}, url = {https://doi.org/10.1049/iet-com.2015.0737}, doi = {10.1049/IET-COM.2015.0737}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/LiuLIT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangLWT15, author = {Bo Zhang and Xingtong Liu and Jian Wang and Chaojing Tang}, title = {Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party}, journal = {Quantum Inf. Process.}, volume = {14}, number = {12}, pages = {4593--4600}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-1145-3}, doi = {10.1007/S11128-015-1145-3}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangLWT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiSWT15, author = {Haifeng Li and Bo Shuai and Jian Wang and Chaojing Tang}, title = {Protocol Reverse Engineering Using {LDA} and Association Analysis}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {312--316}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.83}, doi = {10.1109/CIS.2015.83}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiSWT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShuaiLZZT15, author = {Bo Shuai and Haifeng Li and Lei Zhang and Quan Zhang and Chaojing Tang}, title = {Software Vulnerability Detection Based on Code Coverage and Test Cost}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {317--321}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.84}, doi = {10.1109/CIS.2015.84}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShuaiLZZT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3d/LiuZZT15, author = {Jian Liu and Quan Zhang and Chen Zhang and Chaojing Tang}, title = {Robust nose tip detection for face range images based on local features in scale-space}, booktitle = {2015 International Conference on 3D Imaging, {IC3D} 2015, Li{\`{e}}ge, Belgium, December 14-15, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IC3D.2015.7391814}, doi = {10.1109/IC3D.2015.7391814}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ic3d/LiuZZT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XieXZWXZT14, author = {Wei Xie and Lei Xie and Chen Zhang and Qiang Wang and Jian Xu and Quan Zhang and Chaojing Tang}, title = {{RFID} seeking: Finding a lost tag rather than only detecting its missing}, journal = {J. Netw. Comput. Appl.}, volume = {42}, pages = {135--142}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2014.01.006}, doi = {10.1016/J.JNCA.2014.01.006}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/XieXZWXZT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiuZWTZ14, author = {Xingtong Liu and Bo Zhang and Jian Wang and Chaojing Tang and Jingjing Zhao}, title = {Differential phase shift quantum private comparison}, journal = {Quantum Inf. Process.}, volume = {13}, number = {1}, pages = {71--84}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0708-4}, doi = {10.1007/S11128-013-0708-4}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiuZWTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XieXZWWT14, author = {Wei Xie and Lei Xie and Chen Zhang and Qiang Wang and Chao Wang and Chaojing Tang}, title = {{TOA:} a tag-owner-assisting {RFID} authentication protocol toward access control and ownership transfer}, journal = {Secur. Commun. Networks}, volume = {7}, number = {5}, pages = {934--944}, year = {2014}, url = {https://doi.org/10.1002/sec.965}, doi = {10.1002/SEC.965}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/XieXZWWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/LiuZT14, author = {Jian Liu and Quan Zhang and Chaojing Tang}, editor = {Linqiang Pan and Gheorghe Paun and Mario J. P{\'{e}}rez{-}Jim{\'{e}}nez and Tao Song}, title = {Find Dense Correspondence between High Resolution Non-rigid 3D Human Faces}, booktitle = {Bio-Inspired Computing - Theories and Applications - 9th International Conference, {BIC-TA} 2014, Wuhan, China, October 16-19, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {472}, pages = {259--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45049-9\_43}, doi = {10.1007/978-3-662-45049-9\_43}, timestamp = {Wed, 17 May 2017 14:24:48 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/LiuZT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/XuTJC14, author = {Shiyou Xu and Chaojing Tang and Peiliang Jing and Zengping Chen}, title = {Efficient centralized track initiation method for multistatic radar}, booktitle = {17th International Conference on Information Fusion, {FUSION} 2014, Salamanca, Spain, July 7-10, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6915996/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/XuTJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShuaiLLZT13, author = {Bo Shuai and Haifeng Li and Mengjun Li and Quan Zhang and Chaojing Tang}, title = {Software Defect Prediction Using Dynamic Support Vector Machine}, booktitle = {Ninth International Conference on Computational Intelligence and Security, {CIS} 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013}, pages = {260--263}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CIS.2013.61}, doi = {10.1109/CIS.2013.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ShuaiLLZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinfa/ShuaiLLZT13, author = {Bo Shuai and Haifeng Li and Mengjun Li and Quan Zhang and Chaojing Tang}, title = {Automatic classification for vulnerability based on machine learning}, booktitle = {{IEEE} International Conference on Information and Automation, {ICIA} 2013, Yinchuan, China, August 26-28, 2013}, pages = {312--318}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICInfA.2013.6720316}, doi = {10.1109/ICINFA.2013.6720316}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icinfa/ShuaiLLZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/HuangZT13, author = {Anqi Huang and Chen Zhang and Chaojing Tang}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Another Improvement of {LMAP++:} An {RFID} Authentication Protocol}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {100--106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_13}, doi = {10.1007/978-3-662-43908-1\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/HuangZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangWLZT12, author = {Xi Zhang and Xiaofei Wang and Anna Liu and Quan Zhang and Chaojing Tang}, title = {{PRI:} {A} Practical Reputation-based Incentive Scheme for Delay Tolerant Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {4}, pages = {973--988}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.04.001}, doi = {10.3837/TIIS.2012.04.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangWLZT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/LiuSLWT12, author = {Wei Liu and Mathini Sellathurai and Jing Lei and Jibo Wei and Chaojing Tang}, title = {Completely decoupled space-time block codes with low-rate feedback}, booktitle = {Proceedings of the 2012 {IEEE} International Symposium on Information Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012}, pages = {2929--2933}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISIT.2012.6284062}, doi = {10.1109/ISIT.2012.6284062}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/LiuSLWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangQZT11, author = {Qiang Wang and Xue Qiu and Quan Zhang and Chaojing Tang}, title = {Key Privacy in McEliece Public Key Cryptosystem}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {824--828}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.109}, doi = {10.1109/TRUSTCOM.2011.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangQZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiuSTW10, author = {Wei Liu and Mathini Sellathurai and Chaojing Tang and Jibo Wei}, title = {Achieving space and time diversity by using lattice constellation based joint Alamouti coding}, journal = {{IEEE} Commun. Lett.}, volume = {14}, number = {1}, pages = {33--35}, year = {2010}, url = {https://doi.org/10.1109/LCOMM.2010.01.091503}, doi = {10.1109/LCOMM.2010.01.091503}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiuSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/ZhangAZT10, author = {Lei Zhang and Chengjin An and Quan Zhang and Chaojing Tang}, title = {Misbehavior Detection Algorithm in {CCSDS} Space Telecommand System}, journal = {{IEEE} Commun. Lett.}, volume = {14}, number = {8}, pages = {746--748}, year = {2010}, url = {https://doi.org/10.1109/LCOMM.2010.08.091893}, doi = {10.1109/LCOMM.2010.08.091893}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/ZhangAZT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/LiuSWT10, author = {Wei Liu and Mathini Sellathurai and Jibo Wei and Chaojing Tang}, title = {A Cyclotomic Lattice Based Quasi-Orthogonal {STBC} for Eight Transmit Antennas}, journal = {{IEEE} Signal Process. Lett.}, volume = {17}, number = {4}, pages = {394--397}, year = {2010}, url = {https://doi.org/10.1109/LSP.2009.2039951}, doi = {10.1109/LSP.2009.2039951}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/LiuSWT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/ZhangSTG09, author = {Lei Zhang and Susanna Spinsante and Chaojing Tang and Ennio Gambi}, title = {Application and performance analysis of various {AEAD} techniques for space telecommand authentication}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {8}, number = {1}, pages = {308--319}, year = {2009}, url = {https://doi.org/10.1109/T-WC.2009.071297}, doi = {10.1109/T-WC.2009.071297}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/ZhangSTG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LiuSXTW09, author = {Wei Liu and Mathini Sellathurai and Pei Xiao and Chaojing Tang and Jibo Wei}, title = {Improved design of two and four-group decodable STBCs with larger diversity product for eight transmit antennas}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2009, 19-24 April 2009, Taipei, Taiwan}, pages = {2737--2740}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICASSP.2009.4960189}, doi = {10.1109/ICASSP.2009.4960189}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/LiuSXTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/XiongWZWT09, author = {Chun{-}lin Xiong and Hua Wang and Xiaoying Zhang and Ji{-}Bo Wei and Chaojing Tang}, title = {Low Complexity Variational Bayes Iterative Receiver for {MIMO-OFDM} Systems}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199155}, doi = {10.1109/ICC.2009.5199155}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/XiongWZWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/XiongWZWT09, author = {Chun{-}lin Xiong and De{-}Gang Wang and Xiaoying Zhang and Ji{-}Bo Wei and Chaojing Tang}, title = {Recursive channel estimation algorithms for iterative receiver in {MIMO-OFDM} systems}, booktitle = {2009 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2009, Proceedings, Budapest, Hungary, 5-8 April 2009}, pages = {785--789}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WCNC.2009.4917936}, doi = {10.1109/WCNC.2009.4917936}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/XiongWZWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isip/LiuZTZL08, author = {Xingtong Liu and Quan Zhang and Chaojing Tang and Jingjing Zhao and Jian Liu}, editor = {Fei Yu and Qi Luo}, title = {A Steganographic Algorithm for Hiding Data in {PDF} Files Based on Equivalent Transformation}, booktitle = {International Symposium on Information Processing, {ISIP} 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, {WMWA} 2008, Moscow, Russia, 23-25 May 2008}, pages = {417--421}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISIP.2008.35}, doi = {10.1109/ISIP.2008.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isip/LiuZTZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GuoZT05, author = {Xingyang Guo and Quan Zhang and Chaojing Tang}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Security of Two Key-Updating Signature Schemes}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {506--517}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_42}, doi = {10.1007/11506157\_42}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GuoZT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.