default search action
Liehui Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Zicong Gao, Hao Xiong, Weiyu Dong, Rui Chang, Rui Yang, Yajin Zhou, Liehui Jiang:
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing. IEEE Trans. Software Eng. 50(1): 1-15 (2024) - [c14]Zicong Gao, Chao Zhang, Hangtian Liu, Wenhou Sun, Zhizhuo Tang, Liehui Jiang, Jianjun Chen, Yong Xie:
Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis. NDSS 2024 - 2023
- [j17]Huajuan Ren, Yonghe Tang, Weiyu Dong, Shuai Ren, Liehui Jiang:
DUEN: Dynamic ensemble handling class imbalance in network intrusion detection. Expert Syst. Appl. 229(Part A): 120420 (2023) - [j16]Xinliang Miao, Rui Chang, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. IEEE Trans. Dependable Secur. Comput. 20(1): 377-391 (2023) - 2022
- [j15]Yaobin Xie, Rui Chang, Liehui Jiang:
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j14]Ruimin Wang, Haitao Li, Jing Jing, Liehui Jiang, Weiyu Dong:
WYSIWYG: IoT Device Identification Based on WebUI Login Pages. Sensors 22(13): 4892 (2022) - [j13]Wei Liu, Ruiming Wang, Xuyan Qi, Liehui Jiang, Jing Jing:
Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs. IEEE Trans. Inf. Forensics Secur. 17: 924-937 (2022) - [c13]Xinliang Miao, Fanlang Zeng, Rui Chang, Chenyang Yu, Zijun Zhang, Liehui Jiang, Yongwang Zhao:
Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE. Internetware 2022: 252-261 - 2020
- [j12]Xiaodong Zhu, Yi Zhang, Liehui Jiang, Rui Chang:
Determining the base address of MIPS firmware based on absolute address statistics and string reference matching. Comput. Secur. 88 (2020) - [c12]Jian Lin, Liehui Jiang, Chengwei Ai, Shihong Chao:
A Shape-inference-based Approach to Enhance Constraint Independence Optimization. ICCSP 2020: 141-145
2010 – 2019
- 2019
- [j11]Jian Lin, Liehui Jiang, Yisen Wang, Weiyu Dong:
A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving. IEEE Access 7: 114593-114606 (2019) - [j10]Rui Chang, Liehui Jiang, Yaobin Xie, Hongqi He, Danmin Chen, Lu Ren:
Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j9]Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu:
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps. Int. J. Distributed Sens. Networks 15(4) (2019) - 2018
- [j8]Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang, Hang Jiang, Wei Liu, Yong Liu:
Towards a multilayered permission-based access control for extending Android security. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j7]Rui Lou, Liehui Jiang, Rui Chang, Yisen Wang:
A Multi-level Perception Security Model Using Virtualization. KSII Trans. Internet Inf. Syst. 12(11): 5588-5613 (2018) - [j6]Yan Zhao, Shiming Li, Liehui Jiang:
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment. Secur. Commun. Networks 2018: 9178941:1-9178941:13 (2018) - [j5]Wenjie Zhang, Liehui Jiang:
Algorithm Analysis for Big Data in Education Based on Depth Learning. Wirel. Pers. Commun. 102(4): 3111-3119 (2018) - 2017
- [j4]Rui Chang, Liehui Jiang, Wenzhi Chen, Yang Xiang, Yuxia Cheng, Abdulhameed Alelaiwi:
MIPE: a practical memory integrity protection method in a trusted execution environment. Clust. Comput. 20(2): 1075-1087 (2017) - [c11]Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang:
An Effective Authentication for Client Application Using ARM TrustZone. ISPEC 2017: 802-813 - 2016
- [j3]Weiyu Dong, Jinxin Liu, Xuyan Qi, Hongqi He, Liehui Jiang:
基于热例程的动态二进制翻译优化 (Hot-routine Based Optimization of Dynamic Binary Translation). 计算机科学 43(5): 27-33 (2016) - [c10]Rui Chang, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang:
Enhancement of Permission Management for an ARM-Android Platform. CIT 2016: 415-422 - [c9]Haowei Huang, Liehui Jiang, Weiyu Dong, Rui Chang, Yifan Hou, Michael Gerndt:
A Fine-Granular Programming Scheme for Irregular Scientific Applications. ACA 2016: 130-141 - [c8]Rui Chang, Liehui Jiang, Qing Yin, Wei Liu, Shengqiao Zhang:
A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment. CIS 2016: 254-258 - [c7]Rui Chang, Liehui Jiang, Qing Yin, Lu Ren, Qingfeng Liu:
An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment. ICCNS 2016: 6-10 - 2015
- [j2]Jing Jing, Liehui Jiang, Hongqi He, Yuanyuan Zhang:
基于存储访问模型的细粒度存储变量识别算法 (Fine-grained Variable Entity Identification Algorithm Based on Memory Access Model). 计算机科学 42(9): 171-176 (2015) - 2014
- [c6]Rui Chang, Liehui Jiang, Hui Shu, Hongqi He:
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition. CIS 2014: 499-504 - 2012
- [c5]Ji-zhong Li, Qing Yin, Liehui Jiang, Xin-Hai Jia:
Analysis of Cryptographic Algorithms' Characters in Binary File. PDCAT 2012: 219-223 - 2010
- [j1]Qing Yin, Fei Huang, Liehui Jiang:
ARM Static Library Identification Framework. J. Softw. 5(10): 1099-1106 (2010)
2000 – 2009
- 2009
- [c4]Yuliang Wang, Qiuxia Zhao, Liehui Jiang, Yi Shao:
Ultra High Throughput Implementations for MD5 Hash Algorithm on FPGA. HPCA (China) 2009: 433-441 - [c3]Yi Shao, Liehui Jiang, Qiuxia Zhao, Yuliang Wang:
High Performance and Parallel Model for LU Decomposition on FPGAs. FCST 2009: 75-79 - [c2]Xian Yu, Liehui Jiang, Hui Shu, Qing Yin, Tie-Ming Liu:
A Process Model for Forensic Analysis of Symbian Smart Phones. FGIT-ASEA 2009: 86-93 - [c1]Tie-Ming Liu, Liehui Jiang, Hongqi He, Ji-zhong Li, Xian Yu:
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code. FGIT-SecTech 2009: 140-147
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint