BibTeX records: Chaojing Tang

download as .bib file

@inproceedings{DBLP:conf/iccns/ZhaoLLT23,
  author       = {Wei Zhao and
                  Zhiwei Li and
                  Ruilin Li and
                  Chaojing Tang},
  title        = {CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {6--11},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638784},
  doi          = {10.1145/3638782.3638784},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhaoLLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiZCLFT23,
  author       = {Runhao Li and
                  Bin Zhang and
                  Jiongyi Chen and
                  Wenfeng Lin and
                  Chao Feng and
                  Chaojing Tang},
  title        = {Towards Automatic and Precise Heap Layout Manipulation for General-Purpose
                  Programs},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/towards-automatic-and-precise-heap-layout-manipulation-for-general-purpose-programs/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiZCLFT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangCLFLT23,
  author       = {Bin Zhang and
                  Jiongyi Chen and
                  Runhao Li and
                  Chao Feng and
                  Ruilin Li and
                  Chaojing Tang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Automated Exploitable Heap Layout Generation for Heap Overflows Through
                  Manipulation Distance-Guided Fuzzing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4499--4515},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-bin},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangCLFLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangYLFST22,
  author       = {Bin Zhang and
                  Jiaxi Ye and
                  Ruilin Li and
                  Chao Feng and
                  Yunfei Su and
                  Chaojing Tang},
  title        = {Pusher: an augmented fuzzer based on the connection between input
                  and comparison operand},
  journal      = {Frontiers Comput. Sci.},
  volume       = {16},
  number       = {4},
  pages        = {164206},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-021-0075-8},
  doi          = {10.1007/S11704-021-0075-8},
  timestamp    = {Fri, 17 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangYLFST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/YangTL22,
  author       = {Gang Yang and
                  Chaojing Tang and
                  Xingtong Liu},
  title        = {DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection
                  Perspective},
  journal      = {Symmetry},
  volume       = {14},
  number       = {10},
  pages        = {2138},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14102138},
  doi          = {10.3390/SYM14102138},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/YangTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangGHTRTEZP22,
  author       = {Zhiyuan Jiang and
                  Shuitao Gan and
                  Adrian Herrera and
                  Flavio Toffalini and
                  Lucio Romerio and
                  Chaojing Tang and
                  Manuel Egele and
                  Chao Zhang and
                  Mathias Payer},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Evocatio: Conjuring Bug Capabilities from a Single PoC},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1599--1613},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560575},
  doi          = {10.1145/3548606.3560575},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangGHTRTEZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhangCFLDZ0T22,
  author       = {Xing Zhang and
                  Jiongyi Chen and
                  Chao Feng and
                  Ruilin Li and
                  Wenrui Diao and
                  Kehuan Zhang and
                  Jing Lei and
                  Chaojing Tang},
  title        = {Default: Mutual Information-based Crash Triage for Massive Crashes},
  booktitle    = {44th {IEEE/ACM} 44th International Conference on Software Engineering,
                  {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022},
  pages        = {635--646},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510003.3512760},
  doi          = {10.1145/3510003.3512760},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ZhangCFLDZ0T22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/PanLWTW21,
  author       = {Zhipeng Pan and
                  Jing Lei and
                  Lei Wen and
                  Chaojing Tang and
                  Zhongfeng Wang},
  title        = {Low-complexity sphere decoding for {MIMO-SCMA} systems},
  journal      = {{IET} Commun.},
  volume       = {15},
  number       = {4},
  pages        = {537--545},
  year         = {2021},
  url          = {https://doi.org/10.1049/cmu2.12085},
  doi          = {10.1049/CMU2.12085},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/PanLWTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangJHTZP21,
  author       = {Zhiyuan Jiang and
                  Xiyue Jiang and
                  Ahmad Hazimeh and
                  Chaojing Tang and
                  Chao Zhang and
                  Mathias Payer},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Igor: Crash Deduplication Through Root-Cause Clustering},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {3318--3336},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485364},
  doi          = {10.1145/3460120.3485364},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangJHTZP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangCFLSZLT21,
  author       = {Xing Zhang and
                  Jiongyi Chen and
                  Chao Feng and
                  Ruilin Li and
                  Yunfei Su and
                  Bin Zhang and
                  Jing Lei and
                  Chaojing Tang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Reducing Test Cases with Attention Mechanism of Neural Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2075--2092},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-xing},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangCFLSZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ShiT20,
  author       = {Weixu Shi and
                  Chaojing Tang},
  title        = {Number of quantum measurement outcomes as a resource},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {10},
  pages        = {393},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02899-9},
  doi          = {10.1007/S11128-020-02899-9},
  timestamp    = {Mon, 09 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/ShiT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenLZT19,
  author       = {Xiayang Chen and
                  Xingtong Liu and
                  Lei Zhang and
                  Chaojing Tang},
  title        = {Optimal Defense Strategy Selection for Spear-Phishing Attack Based
                  on a Multistage Signaling Game},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {19907--19921},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2897724},
  doi          = {10.1109/ACCESS.2019.2897724},
  timestamp    = {Mon, 23 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChenLZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YeZLFT19,
  author       = {Jiaxi Ye and
                  Bin Zhang and
                  Ruilin Li and
                  Chao Feng and
                  Chaojing Tang},
  title        = {Program State Sensitive Parallel Fuzzing for Real World Software},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {42557--42564},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2905744},
  doi          = {10.1109/ACCESS.2019.2905744},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YeZLFT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangFLLT19,
  author       = {Xing Zhang and
                  Chao Feng and
                  Runhao Li and
                  Jing Lei and
                  Chaojing Tang},
  title        = {NeuralTaint: {A} Key Segment Marking Tool Based on Neural Network},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {68786--68798},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2915681},
  doi          = {10.1109/ACCESS.2019.2915681},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangFLLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiFZT19,
  author       = {Runhao Li and
                  Chao Feng and
                  Xing Zhang and
                  Chaojing Tang},
  title        = {A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural
                  Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {80079--80092},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2923227},
  doi          = {10.1109/ACCESS.2019.2923227},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiFZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiZFZT19,
  author       = {Runhao Li and
                  Chen Zhang and
                  Chao Feng and
                  Xing Zhang and
                  Chaojing Tang},
  title        = {Locating Vulnerability in Binaries Using Deep Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {134660--134676},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2942043},
  doi          = {10.1109/ACCESS.2019.2942043},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiZFZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PanL0LT19,
  author       = {Zhipeng Pan and
                  Jing Lei and
                  Wei Liu and
                  Junshan Luo and
                  Chaojing Tang},
  title        = {Grant-Free Rateless {SCMA} for Cellular Internet of Things Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {147954--147961},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2946605},
  doi          = {10.1109/ACCESS.2019.2946605},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PanL0LT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangFLLT19a,
  author       = {Xing Zhang and
                  Chao Feng and
                  Runhao Li and
                  Jing Lei and
                  Chaojing Tang},
  title        = {Marking Key Segment of Program Input via Attention Mechanism},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {183877--183891},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2960522},
  doi          = {10.1109/ACCESS.2019.2960522},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangFLLT19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/PanLLWT19,
  author       = {Zhipeng Pan and
                  Junshan Luo and
                  Jing Lei and
                  Lei Wen and
                  Chaojing Tang},
  title        = {Uplink Spatial Modulation {SCMA} System},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {23},
  number       = {1},
  pages        = {184--187},
  year         = {2019},
  url          = {https://doi.org/10.1109/LCOMM.2018.2882813},
  doi          = {10.1109/LCOMM.2018.2882813},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/PanLLWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/PanLLLWT19,
  author       = {Zhipeng Pan and
                  Wei Liu and
                  Jing Lei and
                  Junshan Luo and
                  Lei Wen and
                  Chaojing Tang},
  title        = {Multi-Dimensional Space-Time Block Coding Aided Downlink {MIMO-SCMA}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {7},
  pages        = {6657--6669},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2019.2915351},
  doi          = {10.1109/TVT.2019.2915351},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/PanLLLWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuLTWZ18,
  author       = {Yi Liu and
                  Xingtong Liu and
                  Chaojing Tang and
                  Jian Wang and
                  Lei Zhang},
  title        = {Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement
                  of Bitcoin},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {23261--23270},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2827163},
  doi          = {10.1109/ACCESS.2018.2827163},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuLTWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PanLZLT18,
  author       = {Zhipeng Pan and
                  Erbao Li and
                  Lei Zhang and
                  Jing Lei and
                  Chaojing Tang},
  title        = {Design and Optimization of Joint Iterative Detection and Decoding
                  Receiver for Uplink Polar Coded {SCMA} System},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {52014--52026},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2869906},
  doi          = {10.1109/ACCESS.2018.2869906},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PanLZLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuLT18,
  author       = {Jiao Hu and
                  Ruilin Li and
                  Chaojing Tang},
  title        = {A real-time inversion attack on the {GMR-2} cipher used in the satellite
                  phones},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {032113:1--032113:18},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9230-8},
  doi          = {10.1007/S11432-017-9230-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChenTWZM18,
  author       = {Xiayang Chen and
                  Chaojing Tang and
                  Jian Wang and
                  Lei Zhang and
                  Qingkun Meng},
  title        = {Improved Wolf Pack Algorithm Based on Differential Evolution Elite
                  Set},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {7},
  pages        = {1946--1949},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017EDL8201},
  doi          = {10.1587/TRANSINF.2017EDL8201},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChenTWZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiuMLWZT18,
  author       = {Yi Liu and
                  Qingkun Meng and
                  Xingtong Liu and
                  Jian Wang and
                  Lei Zhang and
                  Chaojing Tang},
  title        = {Formal Method for Security Analysis of Electronic Payment Protocols},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {9},
  pages        = {2291--2297},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2018EDP7108},
  doi          = {10.1587/TRANSINF.2018EDP7108},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiuMLWZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-sen/ZhangFHCCT18,
  author       = {Bin Zhang and
                  Chao Feng and
                  Adrian Herrera and
                  Vitaly Chipounov and
                  George Candea and
                  Chaojing Tang},
  title        = {Discover deeper bugs with dynamic symbolic execution and coverage-based
                  fuzz testing},
  journal      = {{IET} Softw.},
  volume       = {12},
  number       = {6},
  pages        = {507--519},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-sen.2017.0200},
  doi          = {10.1049/IET-SEN.2017.0200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-sen/ZhangFHCCT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiangFT18,
  author       = {Zhiyuan Jiang and
                  Chao Feng and
                  Chaojing Tang},
  title        = {An Exploitability Analysis Technique for Binary Vulnerability Based
                  on Automatic Exception Suppression},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {4610320:1--4610320:21},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/4610320},
  doi          = {10.1155/2018/4610320},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiangFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaci/ChenTZL18,
  author       = {Xiayang Chen and
                  Chaojing Tang and
                  Lei Zhang and
                  Yi Liu},
  title        = {Improved wolf pack algorithm with differential evolution for global
                  numerical optimization},
  booktitle    = {Tenth International Conference on Advanced Computational Intelligence,
                  {ICACI} 2018, Xiamen, China, March 29-31, 2018},
  pages        = {116--121},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICACI.2018.8377591},
  doi          = {10.1109/ICACI.2018.8377591},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icaci/ChenTZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaip/XiaFZLT18,
  author       = {Yuan Xia and
                  Chao Feng and
                  Xing Zhang and
                  Runhao Li and
                  Chaojing Tang},
  title        = {Parallelization of Extracting Binary Program Execution Trace Offline},
  booktitle    = {Proceedings of the 2nd International Conference on Advances in Image
                  Processing, {ICAIP} 2018, Chengdu, China, June 16-18, 2018},
  pages        = {184--188},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3239576.3239603},
  doi          = {10.1145/3239576.3239603},
  timestamp    = {Thu, 23 Mar 2023 11:00:28 +0100},
  biburl       = {https://dblp.org/rec/conf/icaip/XiaFZLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaip/LiFT18,
  author       = {Yang Li and
                  Chao Feng and
                  Chaojing Tang},
  title        = {A Large-scale Parallel Fuzzing System},
  booktitle    = {Proceedings of the 2nd International Conference on Advances in Image
                  Processing, {ICAIP} 2018, Chengdu, China, June 16-18, 2018},
  pages        = {194--197},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3239576.3239615},
  doi          = {10.1145/3239576.3239615},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaip/LiFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PanLWLT18,
  author       = {Zhipeng Pan and
                  Erbao Li and
                  Lei Wen and
                  Jing Lei and
                  Chaojing Tang},
  title        = {Joint Iterative Detection and Decoding Receiver for Polar Coded {SCMA}
                  System},
  booktitle    = {2018 {IEEE} International Conference on Communications Workshops,
                  {ICC} Workshops 2018, Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCW.2018.8403620},
  doi          = {10.1109/ICCW.2018.8403620},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/PanLWLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiWTL17,
  author       = {Ran Ji and
                  Jian Wang and
                  Chaojing Tang and
                  Ruilin Li},
  title        = {Automatic Reverse Engineering of Private Flight Control Protocols
                  of UAVs},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {1308045:1--1308045:9},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/1308045},
  doi          = {10.1155/2017/1308045},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiWTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiuLLWTK17,
  author       = {Yi Liu and
                  Ruilin Li and
                  Xingtong Liu and
                  Jian Wang and
                  Chaojing Tang and
                  Hongyan Kang},
  title        = {Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm},
  booktitle    = {13th International Conference on Computational Intelligence and Security,
                  {CIS} 2017, Hong Kong, China, December 15-18, 2017},
  pages        = {317--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIS.2017.00075},
  doi          = {10.1109/CIS.2017.00075},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiuLLWTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YeZYFT17,
  author       = {Jiaxi Ye and
                  Bin Zhang and
                  Ziqing Ye and
                  Chao Feng and
                  Chaojing Tang},
  title        = {Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases
                  Prioritizing},
  booktitle    = {13th International Conference on Computational Intelligence and Security,
                  {CIS} 2017, Hong Kong, China, December 15-18, 2017},
  pages        = {543--547},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIS.2017.00126},
  doi          = {10.1109/CIS.2017.00126},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YeZYFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangYFT17,
  author       = {Bin Zhang and
                  Jiaxi Ye and
                  Chao Feng and
                  Chaojing Tang},
  title        = {{S2F:} Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz
                  Testing},
  booktitle    = {13th International Conference on Computational Intelligence and Security,
                  {CIS} 2017, Hong Kong, China, December 15-18, 2017},
  pages        = {548--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIS.2017.00127},
  doi          = {10.1109/CIS.2017.00127},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangYFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/LiuLZTK17,
  author       = {Yi Liu and
                  Xingtong Liu and
                  Lei Zhang and
                  Chaojing Tang and
                  Hongyan Kang},
  title        = {An efficient strategy to eliminate malleability of bitcoin transaction},
  booktitle    = {4th International Conference on Systems and Informatics, {ICSAI} 2017,
                  Hangzhou, China, November 11-13, 2017},
  pages        = {960--964},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICSAI.2017.8248424},
  doi          = {10.1109/ICSAI.2017.8248424},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icsai/LiuLZTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscid/ChenTWZL17,
  author       = {Xiayang Chen and
                  Chaojing Tang and
                  Jian Wang and
                  Lei Zhang and
                  Yi Liu},
  title        = {A Novel Hybrid Based on Wolf Pack Algorithm and Differential Evolution
                  Algorithm},
  booktitle    = {10th International Symposium on Computational Intelligence and Design,
                  {ISCID} 2017, Hangzhou, China, December 9-10, 2017, Volume 1},
  pages        = {69--74},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISCID.2017.63},
  doi          = {10.1109/ISCID.2017.63},
  timestamp    = {Mon, 23 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscid/ChenTWZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscid/LiuCZTK17,
  author       = {Yi Liu and
                  Xiayang Chen and
                  Lei Zhang and
                  Chaojing Tang and
                  Hongyan Kang},
  title        = {An Intelligent Strategy to Gain Profit for Bitcoin Mining Pools},
  booktitle    = {10th International Symposium on Computational Intelligence and Design,
                  {ISCID} 2017, Hangzhou, China, December 9-10, 2017 - Volume 2},
  pages        = {427--430},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISCID.2017.184},
  doi          = {10.1109/ISCID.2017.184},
  timestamp    = {Mon, 23 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscid/LiuCZTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/TanTZW17,
  author       = {Huiting Tan and
                  Chaojing Tang and
                  Chen Zhang and
                  Shaolei Wang},
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Area-Dividing Route Mutation in Moving Target Defense Based on {SDN}},
  booktitle    = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  pages        = {565--574},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2\_43},
  doi          = {10.1007/978-3-319-64701-2\_43},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/TanTZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiuLZWT17,
  author       = {Yi Liu and
                  Xingtong Liu and
                  Lei Zhang and
                  Jian Wang and
                  Chaojing Tang},
  title        = {Novel Logical Method for Security Analysis of Electronic Payment Protocols},
  journal      = {CoRR},
  volume       = {abs/1706.10078},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.10078},
  eprinttype    = {arXiv},
  eprint       = {1706.10078},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiuLZWT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuLT17,
  author       = {Jiao Hu and
                  Ruilin Li and
                  Chaojing Tang},
  title        = {A Real-time Inversion Attack on the {GMR-2} Cipher Used in the Satellite
                  Phones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/MengWFT16,
  author       = {Qingkun Meng and
                  Shameng Wen and
                  Chao Feng and
                  Chaojing Tang},
  editor       = {Yaoli Wang and
                  Jiancheng An and
                  Lipo Wang and
                  Qingli Li and
                  Gaowei Van and
                  Qing Chang},
  title        = {Predicting buffer overflow using semi-supervised learning},
  booktitle    = {9th International Congress on Image and Signal Processing, BioMedical
                  Engineering and Informatics, {CISP-BMEI} 2016, Datong, China, October
                  15-17, 2016},
  pages        = {1959--1963},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISP-BMEI.2016.7853039},
  doi          = {10.1109/CISP-BMEI.2016.7853039},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/MengWFT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiLT16,
  author       = {Ran Ji and
                  Haifeng Li and
                  Chaojing Tang},
  title        = {Extracting Keywords of UAVs Wireless Communication Protocols Based
                  on Association Rules Learning},
  booktitle    = {12th International Conference on Computational Intelligence and Security,
                  {CIS} 2016, Wuxi, China, December 16-19, 2016},
  pages        = {309--313},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIS.2016.0076},
  doi          = {10.1109/CIS.2016.0076},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenFMZWT16,
  author       = {Shameng Wen and
                  Chao Feng and
                  Qingkun Meng and
                  Bin Zhang and
                  Ligeng Wu and
                  Chaojing Tang},
  title        = {Testing Network Protocol Binary Software with Selective Symbolic Execution},
  booktitle    = {12th International Conference on Computational Intelligence and Security,
                  {CIS} 2016, Wuxi, China, December 16-19, 2016},
  pages        = {318--322},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIS.2016.0078},
  doi          = {10.1109/CIS.2016.0078},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenFMZWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edutainment/LiuZT16,
  author       = {Jian Liu and
                  Quan Zhang and
                  Chaojing Tang},
  editor       = {Abdennour El Rhalibi and
                  Feng Tian and
                  Zhigeng Pan and
                  Baoquan Liu},
  title        = {Nose Tip Detection and Face Localization from Face Range Image Based
                  on Multi-angle Energy},
  booktitle    = {E-Learning and Games - 10th International Conference, Edutainment
                  2016, Hangzhou, China, April 14-16, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9654},
  pages        = {136--147},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40259-8\_12},
  doi          = {10.1007/978-3-319-40259-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/edutainment/LiuZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/WenFMZWT16,
  author       = {Shameng Wen and
                  Chao Feng and
                  Qingkun Meng and
                  Bin Zhang and
                  Ligeng Wu and
                  Chaojing Tang},
  editor       = {Xiang Fei and
                  Lipo Wang and
                  Chunlei Ji and
                  Qiang Sun and
                  Niansheng Chen and
                  Xiaoyong Song and
                  Xin Wang},
  title        = {Analyzing network protocol binary software with joint symbolic execution},
  booktitle    = {3rd International Conference on Systems and Informatics, {ICSAI} 2016,
                  Shanghai, China, November 19-21, 2016},
  pages        = {738--742},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICSAI.2016.7811050},
  doi          = {10.1109/ICSAI.2016.7811050},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icsai/WenFMZWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/ZhangFWT16,
  author       = {Bin Zhang and
                  Chao Feng and
                  Bo Wu and
                  Chaojing Tang},
  editor       = {Yihai Chen},
  title        = {Detecting integer overflow in Windows binary executables based on
                  symbolic execution},
  booktitle    = {17th {IEEE/ACIS} International Conference on Software Engineering,
                  Artificial Intelligence, Networking and Parallel/Distributed Computing,
                  {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016},
  pages        = {385--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SNPD.2016.7515929},
  doi          = {10.1109/SNPD.2016.7515929},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/ZhangFWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LiuLIT15,
  author       = {Wei Liu and
                  Jing Lei and
                  Muhammad Ali Imran and
                  Chaojing Tang},
  title        = {Diversity gain of lattice constellation-based joint orthogonal space-time
                  block coding},
  journal      = {{IET} Commun.},
  volume       = {9},
  number       = {18},
  pages        = {2274--2280},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-com.2015.0737},
  doi          = {10.1049/IET-COM.2015.0737},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/LiuLIT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangLWT15,
  author       = {Bo Zhang and
                  Xingtong Liu and
                  Jian Wang and
                  Chaojing Tang},
  title        = {Cryptanalysis and improvement of quantum private comparison of equality
                  protocol without a third party},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {12},
  pages        = {4593--4600},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-1145-3},
  doi          = {10.1007/S11128-015-1145-3},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangLWT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiSWT15,
  author       = {Haifeng Li and
                  Bo Shuai and
                  Jian Wang and
                  Chaojing Tang},
  title        = {Protocol Reverse Engineering Using {LDA} and Association Analysis},
  booktitle    = {11th International Conference on Computational Intelligence and Security,
                  {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages        = {312--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIS.2015.83},
  doi          = {10.1109/CIS.2015.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiSWT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShuaiLZZT15,
  author       = {Bo Shuai and
                  Haifeng Li and
                  Lei Zhang and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {Software Vulnerability Detection Based on Code Coverage and Test Cost},
  booktitle    = {11th International Conference on Computational Intelligence and Security,
                  {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages        = {317--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIS.2015.84},
  doi          = {10.1109/CIS.2015.84},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShuaiLZZT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3d/LiuZZT15,
  author       = {Jian Liu and
                  Quan Zhang and
                  Chen Zhang and
                  Chaojing Tang},
  title        = {Robust nose tip detection for face range images based on local features
                  in scale-space},
  booktitle    = {2015 International Conference on 3D Imaging, {IC3D} 2015, Li{\`{e}}ge,
                  Belgium, December 14-15, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IC3D.2015.7391814},
  doi          = {10.1109/IC3D.2015.7391814},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3d/LiuZZT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/XieXZWXZT14,
  author       = {Wei Xie and
                  Lei Xie and
                  Chen Zhang and
                  Qiang Wang and
                  Jian Xu and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {{RFID} seeking: Finding a lost tag rather than only detecting its
                  missing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {42},
  pages        = {135--142},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2014.01.006},
  doi          = {10.1016/J.JNCA.2014.01.006},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/XieXZWXZT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiuZWTZ14,
  author       = {Xingtong Liu and
                  Bo Zhang and
                  Jian Wang and
                  Chaojing Tang and
                  Jingjing Zhao},
  title        = {Differential phase shift quantum private comparison},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {1},
  pages        = {71--84},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0708-4},
  doi          = {10.1007/S11128-013-0708-4},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiuZWTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XieXZWWT14,
  author       = {Wei Xie and
                  Lei Xie and
                  Chen Zhang and
                  Qiang Wang and
                  Chao Wang and
                  Chaojing Tang},
  title        = {{TOA:} a tag-owner-assisting {RFID} authentication protocol toward
                  access control and ownership transfer},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {5},
  pages        = {934--944},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.965},
  doi          = {10.1002/SEC.965},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/XieXZWWT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bic-ta/LiuZT14,
  author       = {Jian Liu and
                  Quan Zhang and
                  Chaojing Tang},
  editor       = {Linqiang Pan and
                  Gheorghe Paun and
                  Mario J. P{\'{e}}rez{-}Jim{\'{e}}nez and
                  Tao Song},
  title        = {Find Dense Correspondence between High Resolution Non-rigid 3D Human
                  Faces},
  booktitle    = {Bio-Inspired Computing - Theories and Applications - 9th International
                  Conference, {BIC-TA} 2014, Wuhan, China, October 16-19, 2014. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {472},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45049-9\_43},
  doi          = {10.1007/978-3-662-45049-9\_43},
  timestamp    = {Wed, 17 May 2017 14:24:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bic-ta/LiuZT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/XuTJC14,
  author       = {Shiyou Xu and
                  Chaojing Tang and
                  Peiliang Jing and
                  Zengping Chen},
  title        = {Efficient centralized track initiation method for multistatic radar},
  booktitle    = {17th International Conference on Information Fusion, {FUSION} 2014,
                  Salamanca, Spain, July 7-10, 2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/6915996/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/XuTJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShuaiLLZT13,
  author       = {Bo Shuai and
                  Haifeng Li and
                  Mengjun Li and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {Software Defect Prediction Using Dynamic Support Vector Machine},
  booktitle    = {Ninth International Conference on Computational Intelligence and Security,
                  {CIS} 2013, Emei Mountain, Sichan Province, China, December 14-15,
                  2013},
  pages        = {260--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CIS.2013.61},
  doi          = {10.1109/CIS.2013.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ShuaiLLZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinfa/ShuaiLLZT13,
  author       = {Bo Shuai and
                  Haifeng Li and
                  Mengjun Li and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {Automatic classification for vulnerability based on machine learning},
  booktitle    = {{IEEE} International Conference on Information and Automation, {ICIA}
                  2013, Yinchuan, China, August 26-28, 2013},
  pages        = {312--318},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICInfA.2013.6720316},
  doi          = {10.1109/ICINFA.2013.6720316},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icinfa/ShuaiLLZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/HuangZT13,
  author       = {Anqi Huang and
                  Chen Zhang and
                  Chaojing Tang},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Another Improvement of {LMAP++:} An {RFID} Authentication Protocol},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {100--106},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_13},
  doi          = {10.1007/978-3-662-43908-1\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/HuangZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhangWLZT12,
  author       = {Xi Zhang and
                  Xiaofei Wang and
                  Anna Liu and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {{PRI:} {A} Practical Reputation-based Incentive Scheme for Delay Tolerant
                  Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {4},
  pages        = {973--988},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.04.001},
  doi          = {10.3837/TIIS.2012.04.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhangWLZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LiuSLWT12,
  author       = {Wei Liu and
                  Mathini Sellathurai and
                  Jing Lei and
                  Jibo Wei and
                  Chaojing Tang},
  title        = {Completely decoupled space-time block codes with low-rate feedback},
  booktitle    = {Proceedings of the 2012 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012},
  pages        = {2929--2933},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISIT.2012.6284062},
  doi          = {10.1109/ISIT.2012.6284062},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LiuSLWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangQZT11,
  author       = {Qiang Wang and
                  Xue Qiu and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {Key Privacy in McEliece Public Key Cryptosystem},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {824--828},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.109},
  doi          = {10.1109/TRUSTCOM.2011.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangQZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiuSTW10,
  author       = {Wei Liu and
                  Mathini Sellathurai and
                  Chaojing Tang and
                  Jibo Wei},
  title        = {Achieving space and time diversity by using lattice constellation
                  based joint Alamouti coding},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {14},
  number       = {1},
  pages        = {33--35},
  year         = {2010},
  url          = {https://doi.org/10.1109/LCOMM.2010.01.091503},
  doi          = {10.1109/LCOMM.2010.01.091503},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiuSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/ZhangAZT10,
  author       = {Lei Zhang and
                  Chengjin An and
                  Quan Zhang and
                  Chaojing Tang},
  title        = {Misbehavior Detection Algorithm in {CCSDS} Space Telecommand System},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {14},
  number       = {8},
  pages        = {746--748},
  year         = {2010},
  url          = {https://doi.org/10.1109/LCOMM.2010.08.091893},
  doi          = {10.1109/LCOMM.2010.08.091893},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/ZhangAZT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/LiuSWT10,
  author       = {Wei Liu and
                  Mathini Sellathurai and
                  Jibo Wei and
                  Chaojing Tang},
  title        = {A Cyclotomic Lattice Based Quasi-Orthogonal {STBC} for Eight Transmit
                  Antennas},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {17},
  number       = {4},
  pages        = {394--397},
  year         = {2010},
  url          = {https://doi.org/10.1109/LSP.2009.2039951},
  doi          = {10.1109/LSP.2009.2039951},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/LiuSWT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ZhangSTG09,
  author       = {Lei Zhang and
                  Susanna Spinsante and
                  Chaojing Tang and
                  Ennio Gambi},
  title        = {Application and performance analysis of various {AEAD} techniques
                  for space telecommand authentication},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {8},
  number       = {1},
  pages        = {308--319},
  year         = {2009},
  url          = {https://doi.org/10.1109/T-WC.2009.071297},
  doi          = {10.1109/T-WC.2009.071297},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/ZhangSTG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/LiuSXTW09,
  author       = {Wei Liu and
                  Mathini Sellathurai and
                  Pei Xiao and
                  Chaojing Tang and
                  Jibo Wei},
  title        = {Improved design of two and four-group decodable STBCs with larger
                  diversity product for eight transmit antennas},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2009, 19-24 April 2009, Taipei, Taiwan},
  pages        = {2737--2740},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICASSP.2009.4960189},
  doi          = {10.1109/ICASSP.2009.4960189},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/LiuSXTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/XiongWZWT09,
  author       = {Chun{-}lin Xiong and
                  Hua Wang and
                  Xiaoying Zhang and
                  Ji{-}Bo Wei and
                  Chaojing Tang},
  title        = {Low Complexity Variational Bayes Iterative Receiver for {MIMO-OFDM}
                  Systems},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199155},
  doi          = {10.1109/ICC.2009.5199155},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/XiongWZWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/XiongWZWT09,
  author       = {Chun{-}lin Xiong and
                  De{-}Gang Wang and
                  Xiaoying Zhang and
                  Ji{-}Bo Wei and
                  Chaojing Tang},
  title        = {Recursive channel estimation algorithms for iterative receiver in
                  {MIMO-OFDM} systems},
  booktitle    = {2009 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2009, Proceedings, Budapest, Hungary, 5-8 April 2009},
  pages        = {785--789},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WCNC.2009.4917936},
  doi          = {10.1109/WCNC.2009.4917936},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/XiongWZWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isip/LiuZTZL08,
  author       = {Xingtong Liu and
                  Quan Zhang and
                  Chaojing Tang and
                  Jingjing Zhao and
                  Jian Liu},
  editor       = {Fei Yu and
                  Qi Luo},
  title        = {A Steganographic Algorithm for Hiding Data in {PDF} Files Based on
                  Equivalent Transformation},
  booktitle    = {International Symposium on Information Processing, {ISIP} 2008 / International
                  Pacific Workshop on Web Mining, and Web-Based Application, {WMWA}
                  2008, Moscow, Russia, 23-25 May 2008},
  pages        = {417--421},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIP.2008.35},
  doi          = {10.1109/ISIP.2008.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isip/LiuZTZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoZT05,
  author       = {Xingyang Guo and
                  Quan Zhang and
                  Chaojing Tang},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Security of Two Key-Updating Signature Schemes},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {506--517},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_42},
  doi          = {10.1007/11506157\_42},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuoZT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics