default search action
Jingfeng Xue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yu-an Tan, Yuanzhang Li:
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module. Comput. Secur. 146: 104038 (2024) - [j32]Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, Yuanzhang Li:
Bypassing software-based remote attestation using debug registers. Connect. Sci. 36(1) (2024) - [j31]Minghui Li, Jingfeng Xue, Zhenyan Liu, Yiran Suo, Tianwei Lei, Yong Wang:
DAMFSD: A decentralized authorization model with flexible and secure delegation. Internet Things 27: 101317 (2024) - [j30]Lu Huang, Jingfeng Xue, Yong Wang, Junbao Chen, Tianwei Lei:
Strengthening LLM ecosystem security: Preventing mobile malware from manipulating LLM-based applications. Inf. Sci. 681: 120923 (2024) - [j29]Tianwei Lei, Jingfeng Xue, Yong Wang, Thar Baker, Zequn Niu:
An empirical study of problems and evaluation of IoT malware classification label sources. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101898 (2024) - [j28]Zheng Zhang, Jingfeng Xue, Tian Chen, Yuhang Zhao, Weizhi Meng:
Flash controller-based secure execution environment for protecting code confidentiality. J. Syst. Archit. 152: 103172 (2024) - [c22]Yifan Zhou, Zhenyan Liu, Jingfeng Xue, Yong Wang, Ji Zhang:
LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification. ACNS Workshops (1) 2024: 29-42 - [c21]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yuhang Zhao, Weizhi Meng:
FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT. PerCom Workshops 2024: 88-93 - 2023
- [j27]Zequn Niu, Wenjie Guo, Jingfeng Xue, Yong Wang, Zixiao Kong, Lu Huang:
A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA). Comput. Secur. 129: 103190 (2023) - [j26]Junbao Chen, Jingfeng Xue, Yong Wang, Lu Huang, Thar Baker, Zhixiong Zhou:
Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications. Expert Syst. Appl. 213(Part): 119036 (2023) - [j25]Xiaojin Fan, Mengmeng Liao, Jingfeng Xue, Hao Wu, Lei Jin, Jian Zhao, Liehuang Zhu:
Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition. Neurocomputing 522: 89-104 (2023) - [j24]Lu Huang, Jingfeng Xue, Yong Wang, Zhenyan Liu, Junbao Chen, Zixiao Kong:
WHGDroid: Effective android malware detection based on weighted heterogeneous graph. J. Inf. Secur. Appl. 77: 103556 (2023) - [j23]Hongchen Guo, Xiaolong Tao, Mingyang Zhao, Tong Wu, Chuan Zhang, Jingfeng Xue, Liehuang Zhu:
Decentralized Policy-Hidden Fine-Grained Redaction in Blockchain-Based IoT Systems. Sensors 23(16): 7105 (2023) - [c20]Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, Yuanzhang Li:
DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication. BlockTEA 2023: 23-40 - 2022
- [j22]Yuanzhang Li, Xinxin Wang, Zhiwei Shi, Ruyun Zhang, Jingfeng Xue, Zhi Wang:
Boosting training for PDF malware classifier via active learning. Int. J. Intell. Syst. 37(4): 2803-2821 (2022) - [j21]Zequn Niu, Jingfeng Xue, Dacheng Qu, Yong Wang, Jun Zheng, Hongfei Zhu:
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT. Inf. Sci. 601: 162-174 (2022) - [c19]Wenjie Guo, Jingfeng Xue, Yong Wang, Zhixiong Zhou:
Blockchain-based Reputation Evaluation Using Game Theory in Social Networking. BSCI 2022: 107-114 - [c18]Sanyuan Zhao, Zongji Zhao, Jingfeng Xue:
Online Teaching of Computer Fundamentals Course During the Pandemic. ICCSE (3) 2022: 410-422 - 2021
- [j20]Nan Zhang, Jingfeng Xue, Yuxi Ma, Ruyun Zhang, Tiancai Liang, Yu-an Tan:
Hybrid sequence-based Android malware detection using natural language processing. Int. J. Intell. Syst. 36(10): 5770-5784 (2021) - [j19]Weijie Han, Jingfeng Xue, Yong Wang, Fuquan Zhang, Xianwei Gao:
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework. Inf. Sci. 546: 633-664 (2021) - [j18]Yeyao Liu, Jingfeng Xue, Bo Yang, Min Zhu, Weizhen Guo, Feng Pan, Cong Ye, Wei Wang, Tao Liang, Xinguo Li, Linyuan Zhang:
The Acoustic System of the Fendouzhe HOV. Sensors 21(22): 7478 (2021) - [j17]Zixiao Kong, Jingfeng Xue, Yong Wang, Lu Huang, Zequn Niu, Feng Li:
A Survey on Adversarial Attack in the Age of Artificial Intelligence. Wirel. Commun. Mob. Comput. 2021: 4907754:1-4907754:22 (2021) - [c17]Weijie Han, Jingfeng Xue, Kechang Qian:
A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model. ICCT 2021: 339-343 - 2020
- [j16]Xiaolin Zhao, Yiman Zhang, Jingfeng Xue, Chun Shan, Zhen Liu:
Research on Network Risk Evaluation Method Based on a Differential Manifold. IEEE Access 8: 66315-66326 (2020) - [j15]Xiaolin Zhao, Hui Peng, Xiang Li, Yue Li, Jingfeng Xue, Yaoyuan Liang, Mingzhe Pei:
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope. Secur. Commun. Networks 2020: 6679304:1-6679304:11 (2020) - [c16]Weijie Han, Jingfeng Xue, Fuquan Zhang, Yingfeng Zhang:
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model. ML4CS (1) 2020: 26-34 - [c15]Weijie Han, Jingfeng Xue, Fuquan Zhang, Zhonghui Sun:
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System. ML4CS (2) 2020: 31-41 - [c14]Ziyu Wang, Weijie Han, Yue Lu, Jingfeng Xue:
A Malware Classification Method Based on the Capsule Network. ML4CS (1) 2020: 35-49 - [c13]Lu Huang, Jingfeng Xue, Weijie Han, Zixiao Kong, Zequn Niu:
Detection of Malicious Domains in APT via Mining Massive DNS Logs. ML4CS (1) 2020: 140-152 - [c12]Tianwei Lei, Jingfeng Xue, Weijie Han:
Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning. ML4CS (3) 2020: 363-371
2010 – 2019
- 2019
- [j14]Xiaolin Zhao, Quanbao Chen, Jingfeng Xue, Yiman Zhang, Jingjing Zhao:
A Method for Calculating Network System Security Risk Based on a Lie Group. IEEE Access 7: 70610-70623 (2019) - [j13]Weijie Han, Jingfeng Xue, Yong Wang, Shibing Zhu, Zixiao Kong:
Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly. IEEE Access 7: 143573-143596 (2019) - [j12]Weijie Han, Jingfeng Xue, Yong Wang, Lu Huang, Zixiao Kong, Limin Mao:
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. Comput. Secur. 83: 208-233 (2019) - [j11]Donghai Tian, Xiaoqi Jia, Zhaolong Zhang, Li Zhan, Changzhen Hu, Jingfeng Xue:
An online approach to defeating ROP attacks∗. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j10]Weijie Han, Jingfeng Xue, Hui Yan:
Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. IET Inf. Secur. 13(2): 109-116 (2019) - [j9]Weijie Han, Jingfeng Xue, Yong Wang, Zhenyan Liu, Zixiao Kong:
MalInsight: A systematic profiling based malware detection framework. J. Netw. Comput. Appl. 125: 236-250 (2019) - 2018
- [j8]Jianwen Fu, Jingfeng Xue, Yong Wang, Zhenyan Liu, Chun Shan:
Malware Visualization for Fine-Grained Classification. IEEE Access 6: 14510-14523 (2018) - [j7]Chun Shan, Benfu Jiang, Jingfeng Xue, Fang Guan, Na Xiao:
An Approach for Internal Network Security Metric Based on Attack Probability. Secur. Commun. Networks 2018: 3652170:1-3652170:11 (2018) - [j6]Zhenyan Liu, Yifei Zeng, Pengfei Zhang, Jingfeng Xue, Ji Zhang, Jiangtao Liu:
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis. Secur. Commun. Networks 2018: 6510381:1-6510381:7 (2018) - [c11]Xiaolin Zhao, Meijing Wu, Qi Zhang, Jingfeng Xue, Yiman Zhang:
A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation Domain. DSC 2018: 902-909 - 2017
- [c10]Donghai Tian, Xiaoqi Jia, Li Zhan, Changzhen Hu, Jingfeng Xue:
An Online Approach to Defeating Return-Oriented-Programming Attacks. CSS 2017: 236-247 - [c9]Xiaolin Zhao, Jingfeng Xue, Yiman Zhang, Qi Zhang:
Class Level Research on Modifying Information Transmission Path of the Cooperative Network Based on the Cohesion of Class. FSDM 2017: 494-510 - [c8]Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue:
A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. NSS 2017: 145-159 - [c7]Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu:
A Detecting Method of Array Bounds Defects Based on Symbolic Execution. NSS 2017: 373-385 - 2016
- [j5]Chun Shan, Zequn Yu, Changzhen Hu, Jingfeng Xue, Luxia Wu:
Optimization of program recursive function calls analysis method. Autom. Control. Comput. Sci. 50(4): 253-259 (2016) - [j4]Donghai Tian, Junhua Chen, Changzhen Hu, Jingfeng Xue:
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments. J. Inf. Sci. Eng. 32(5): 1131-1143 (2016) - 2015
- [j3]Rui Ma, Qiang Guo, Changzhen Hu, Jingfeng Xue:
An Improved WiFi Indoor Positioning Algorithm by Weighted Fusion. Sensors 15(9): 21824-21843 (2015) - [c6]Yong Wang, Ming Li, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu:
Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs. 3PGCIC 2015: 430-434 - 2014
- [j2]Donghai Tian, Jingfeng Xue, Changzhen Hu, Xuanya Li:
A Virtualization-Based Approach for Application Whitelisting. IEICE Trans. Inf. Syst. 97-D(6): 1648-1651 (2014) - [j1]Liehuang Zhu, Zhen Yang, Jingfeng Xue, Cong Guo:
An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c5]Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li:
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. INTRUST 2014: 137-150 - 2013
- [c4]Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao:
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis. DASC 2013: 52-57 - 2011
- [c3]Jingfeng Xue, Changzhen Hu, Hongyu Ren, Rui Ma, Jian Li:
Memory errors prevention technology for C/C++ program based on probability. NLPKE 2011: 233-237
2000 – 2009
- 2009
- [c2]Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, Jiaxin Zou:
Metamorphic malware detection technology based on aggregating emerging patterns. ICIS 2009: 1293-1296 - 2007
- [c1]Yong Wang, Ming Li, Jingfeng Xue, Jingjing Hu, Longfei Zhang, Lejian Liao:
A Context-Aware Trust Establishment and Mapping Framework for Web Applications. CIS 2007: 892-896
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint