Seguir
Jian Liu
Jian Liu
Dirección de correo verificada de iie.ac.cn - Página principal
Título
Citado por
Citado por
Año
Libd: Scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1822017
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1512018
Porous carbon nitride thin strip: precise carbon doping regulating delocalized π‐electron induces elevated photocatalytic hydrogen evolution
Q Li, L Zhang, J Liu, J Zhou, Y Jiao, X Xiao, C Zhao, Y Zhou, S Ye, B Jiang, ...
Small 17 (11), 2006622, 2021
992021
Three-dimensional assemblies of carbon nitride tubes as nanoreactors for enhanced photocatalytic hydrogen production
C Zhao, Q Li, Y Xie, L Zhang, X Xiao, D Wang, Y Jiao, CAH Price, B Jiang, ...
Journal of materials chemistry A 8 (1), 305-312, 2020
872020
A session-packets-based encrypted traffic classification using capsule neural networks
S Cui, B Jiang, Z Cai, Z Lu, S Liu, J Liu
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
462019
Towards network anomaly detection using graph embedding
Q Xiao, J Liu, Q Wang, Z Jiang, X Wang, Y Yao
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
442020
Nitrogen vacancy-rich porous carbon nitride nanosheets for efficient photocatalytic H2O2 production
C Zhao, C Shi, Q Li, X Wang, G Zeng, S Ye, B Jiang, J Liu
Materials today energy 24, 100926, 2022
422022
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network
F Ren, Z Jiang, X Wang, J Liu
Cybersecurity 3 (1), 4, 2020
412020
Postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
2015 IEEE 8th International Conference on Software Testing, Verification and …, 2015
412015
A deployable sampling strategy for data race detection
Y Cai, J Zhang, L Cao, J Liu
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
392016
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
382017
Eliminating path redundancy via postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
IEEE Transactions on Software Engineering 44 (1), 25-43, 2017
352017
Nonmuscle myosin heavy chain IIA facilitates SARS-CoV-2 infection in human pulmonary cells
J Chen, J Fan, Z Chen, M Zhang, H Peng, J Liu, L Ding, M Liu, C Zhao, ...
Proceedings of the National Academy of Sciences 118 (50), e2111011118, 2021
292021
A synergistic analysis method for explaining failed regression tests
Q Yi, Z Yang, J Liu, C Zhao, C Wang
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
292015
Machine learning prediction analysis using IoT for smart farming
A Rehman, J Liu, L Keqiu, A Mateen, MQ Yasin
Int. J 8 (9), 1-6, 2020
232020
MAAC: Novel alert correlation method to detect multi-step attack
X Wang, X Gong, L Yu, J Liu
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
202021
A bi-directional lstm model with attention for malicious url detection
F Ren, Z Jiang, J Liu
2019 IEEE 4th Advanced Information Technology, Electronic and Automation …, 2019
202019
Large-scale third-party library detection in android markets
M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou
IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018
162018
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network
J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang, N Li
Cybersecurity 5 (1), 8, 2022
152022
Explaining software failures by cascade fault localization
Q Yi, Z Yang, J Liu, C Zhao, C Wang
ACM Transactions on Design Automation of Electronic Systems (TODAES) 20 (3 …, 2015
152015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20