default search action
Shichao Lv
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Fei Lv, Hangyu Wang, Rongkang Sun, Zhiwen Pan, Shuaizong Si, Meng Zhang, Weidong Zhang, Shichao Lv, Limin Sun:
Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning. Comput. Secur. 148: 104152 (2025) - 2024
- [j13]Shichao Lv, Hongdan Li, Kai Peng, Huanshui Zhang, Xunmin Yin:
An approach to mismatched disturbance rejection control for uncontrollable systems. Autom. 170: 111876 (2024) - [j12]Zedong Li, Xin Chen, Yuqi Chen, Shijie Li, Hangyu Wang, Shichao Lv, Limin Sun:
Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach. IEEE Internet Things J. 11(10): 17602-17614 (2024) - [j11]Shijie Li, Yuqi Chen, Xin Chen, Zedong Li, Dongliang Fang, Kaixiang Liu, Shichao Lv, Limin Sun:
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS. IEEE Trans. Inf. Forensics Secur. 19: 8275-8290 (2024) - [j10]Weiwei Li, Guorong Chen, Xianming Zhang, Ning Wang, Shichao Lv, Jingjing Huang:
When Industrial Radio Security Meets AI: Opportunities and Challenges. IEEE Trans. Ind. Informatics 20(10): 11854-11865 (2024) - [c20]Yue Sun, Guowei Yang, Shichao Lv, Zhi Li, Limin Sun:
Concrete Constraint Guided Symbolic Execution. ICSE 2024: 122:1-122:12 - [c19]Zhe Lang, Zhengzi Xu, Xiaohui Chen, Shichao Lv, Zhanwei Song, Zhiqiang Shi, Limin Sun:
DeLink: Source File Information Recovery in Binaries. ISSTA 2024: 1009-1021 - [c18]Jintao Huang, Kai Yang, Gaosheng Wang, Zhiqiang Shi, Shichao Lv, Limin Sun:
TaiE: Function Identification for Monolithic Firmware. ICPC 2024: 403-414 - [i2]Ziyang Wang, Jianzhou You, Haining Wang, Tianwei Yuan, Shichao Lv, Yang Wang, Limin Sun:
HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model. CoRR abs/2406.01882 (2024) - [i1]Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun:
LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions. CoRR abs/2408.07321 (2024) - 2023
- [j9]Yue Sun, Zhi Li, Shichao Lv, Limin Sun:
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE Trans. Dependable Secur. Comput. 20(6): 4502-4518 (2023) - [c17]Jintao Huang, Gaosheng Wang, Zhiqiang Shi, Fei Lv, Weidong Zhang, Shichao Lv:
SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries. SETTA 2023: 92-111 - 2022
- [j8]Puzhuo Liu, Yaowen Zheng, Zhanwei Song, Dongliang Fang, Shichao Lv, Limin Sun:
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. J. Syst. Archit. 127: 102483 (2022) - [c16]Yue Sun, Shichao Lv, Jianzhou You, Yuyan Sun, Xin Chen, Yaowen Zheng, Limin Sun:
IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol. ACNS 2022: 356-375 - [c15]Puzhuo Liu, Dongliang Fang, Chuan Qin, Kai Cheng, Shichao Lv, Hongsong Zhu, Limin Sun:
Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022: 5397-5402 - [c14]Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun:
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement. WASA (1) 2022: 603-612 - 2021
- [c13]Jianzhou You, Shichao Lv, Yue Sun, Hui Wen, Limin Sun:
HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. ICC 2021: 1-6 - 2020
- [j7]Yongle Chen, Xiaowei Lian, Dan Yu, Shichao Lv, Shaochen Hao, Yao Ma:
Exploring Shodan From the Perspective of Industrial Control Systems. IEEE Access 8: 75359-75369 (2020) - [c12]Jianzhou You, Shichao Lv, Lian Zhao, Mengyao Niu, Zhiqiang Shi, Limin Sun:
A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller. VTC Fall 2020: 1-5
2010 – 2019
- 2019
- [j6]Guohua Wang, Shangda Xie, Xun Zhang, Jinggeng Gao, Feng Wei, Bo Zhao, Chunying Wang, Shichao Lv:
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data. IEEE Access 7: 166282-166291 (2019) - [c11]Zhaoteng Yan, Shichao Lv, Yueyang Zhang, Hongsong Zhu, Limin Sun:
Remote Fingerprinting on Internet-Wide Printers Based on Neural Network. GLOBECOM 2019: 1-6 - [c10]Ming Zhou, Shichao Lv, Libo Yin, Xin Chen, Hong Li, Limin Sun:
SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks. ICC 2019: 1-6 - [c9]Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun:
Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. ICICS 2019: 71-88 - 2018
- [c8]Junjiao Liu, Libo Yin, Yan Hu, Shichao Lv, Limin Sun:
A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. IPCCC 2018: 1-8 - 2017
- [j5]Ning Wang, Ting Jiang, Shichao Lv, Liang Xiao:
Physical-Layer Authentication Based on Extreme Learning Machine. IEEE Commun. Lett. 21(7): 1557-1560 (2017) - [j4]Ning Wang, Ting Jiang, Weiwei Li, Shichao Lv:
Physical-layer security in Internet of Things based on compressed sensing and frequency selection. IET Commun. 11(9): 1431-1437 (2017) - [j3]Ning Wang, Weiwei Li, Ting Jiang, Shichao Lv:
Physical layer spoofing detection based on sparse signal processing and fuzzy recognition. IET Signal Process. 11(5): 640-646 (2017) - [c7]Shichao Lv, Liang Xiao, Qing Hu, Xiaoshan Wang, Changzhen Hu, Limin Sun:
Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017: 1-6 - [c6]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
CovertMIMO: A covert uplink transmission scheme for MIMO systems. ICC 2017: 1-6 - [c5]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
On eavesdropping attacks and countermeasures for MU-MIMO systems. MILCOM 2017: 40-45 - [c4]Ning Gao, Xiaojun Jing, Shichao Lv, Junsheng Mu, Limin Sun:
Wireless Physical Layer Characteristics Based Random Number Generator: Hijack Attackers. VTC Fall 2017: 1-5 - [c3]Qing Hu, Shichao Lv, Zhiqiang Shi, Limin Sun, Liang Xiao:
Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WASA 2017: 326-337 - 2016
- [c2]Shichao Lv, Xiang Lu, Zhuo Lu, Xiaoshan Wang, Ning Wang, Limin Sun:
Zero reconciliation secret key extraction in MIMO backscatter wireless systems. ICC 2016: 1-6 - 2015
- [j2]Hong Wen, Jie Tang, Jinsong Wu, Huanhuan Song, Tingyong Wu, Bin Wu, Pin-Han Ho, Shichao Lv, Li-Min Sun:
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT). IEEE Trans. Emerg. Top. Comput. 3(1): 119-126 (2015) - [c1]Ning Wang, Shichao Lv, Ting Jiang, Ge Zhou:
A novel physical layer spoofing detection based on sparse signal processing. GlobalSIP 2015: 582-585 - 2013
- [j1]Hong Wen, Guang Gong, Shichao Lv, Pin-Han Ho:
Framework for MIMO cross-layer secure communication based on STBC. Telecommun. Syst. 52(4): 2177-2185 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint