default search action
Zhiqiang Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Xiaoling Zhang, Zhengzi Xu, Shouguo Yang, Zhi Li, Zhiqiang Shi, Limin Sun:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning. Proc. ACM Softw. Eng. 1(FSE): 1679-1702 (2024) - [j8]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Trans. Softw. Eng. Methodol. 33(1): 1:1-1:40 (2024) - [c35]Zhiyun Jiang, Zhiqiang Shi:
Differential Privacy Generative Adversarial Networks in Recommendation Systems. CAIBDA 2024: 327-331 - [c34]Zhe Lang, Zhengzi Xu, Xiaohui Chen, Shichao Lv, Zhanwei Song, Zhiqiang Shi, Limin Sun:
DeLink: Source File Information Recovery in Binaries. ISSTA 2024: 1009-1021 - [c33]Jintao Huang, Kai Yang, Gaosheng Wang, Zhiqiang Shi, Shichao Lv, Limin Sun:
TaiE: Function Identification for Monolithic Firmware. ICPC 2024: 403-414 - [c32]Qun Xiao, Shouguo Yang, Jiaqian Peng, Jingfei Bian, Shichao Lv, Limin Sun, Zhiqiang Shi:
Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph. WASA (2) 2024: 316-327 - [i5]Xiaoling Zhang, Zhengzi Xu, Shouguo Yang, Zhi Li, Zhiqiang Shi, Limin Sun:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning. CoRR abs/2405.09112 (2024) - [i4]Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun:
LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions. CoRR abs/2408.07321 (2024) - 2023
- [j7]Yiran Cheng, Shouguo Yang, Zhe Lang, Zhiqiang Shi, Limin Sun:
VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware. Comput. Secur. 126: 103068 (2023) - [j6]Shouguo Yang, Zhengzi Xu, Yang Xiao, Zhe Lang, Wei Tang, Yang Liu, Zhiqiang Shi, Hong Li, Limin Sun:
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. ACM Trans. Softw. Eng. Methodol. 32(6): 158:1-158:29 (2023) - [c31]Jintao Huang, Gaosheng Wang, Zhiqiang Shi, Fei Lv, Weidong Zhang, Shichao Lv:
SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries. SETTA 2023: 92-111 - [i3]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. CoRR abs/2301.00511 (2023) - [i2]Shouguo Yang, Zhiqiang Shi, Guodong Zhang, Mingxuan Li, Yuan Ma, Limin Sun:
Understand Code Style: Efficient CNN-based Compiler Optimization Recognition System. CoRR abs/2302.04666 (2023) - 2022
- [j5]Yi Zhang, Yunchuan Hu, Jiakai Lu, Zhiqiang Shi:
Research on Path Planning of Mobile Robot Based on Improved Theta* Algorithm. Algorithms 15(12): 477 (2022) - [j4]Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun:
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Trans. Dependable Secur. Comput. 19(3): 2054-2069 (2022) - [c30]Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun:
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement. WASA (1) 2022: 603-612 - 2021
- [c29]Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi:
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection. DSN 2021: 224-236 - [c28]Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun:
PMatch: Semantic-based Patch Detection for Binary Programs. IPCCC 2021: 1-10 - [c27]Xiaoling Zhang, Shouguo Yang, Luqian Duan, Zhe Lang, Zhiqiang Shi, Limin Sun:
Transformer-XL With Graph Neural Network for Source Code Summarization. SMC 2021: 3436-3441 - [c26]Xiao Hu, Hong Li, Zhiqiang Shi, Nan Yu, Hongsong Zhu, Limin Sun:
A Robust IoT Device Identification Method with Unknown Traffic Detection. WASA (1) 2021: 190-202 - [i1]Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi:
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection. CoRR abs/2108.06082 (2021) - 2020
- [c25]Xuan Wang, Zhiqiang Shi, Liya Jin:
Research on Test Method of C2 System's VMF interoperation function. CSAI 2020: 24-28 - [c24]Jianzhou You, Shichao Lv, Lian Zhao, Mengyao Niu, Zhiqiang Shi, Limin Sun:
A Scalable High-interaction Physical Honeypot Framework for Programmable Logic Controller. VTC Fall 2020: 1-5
2010 – 2019
- 2019
- [c23]Shouguo Yang, Zhiqiang Shi, Guodong Zhang, Mingxuan Li, Yuan Ma, Limin Sun:
Understand Code Style: Efficient CNN-Based Compiler Optimization Recognition System. ICC 2019: 1-6 - 2018
- [c22]An Yang, Xiaoshan Wang, Yuyan Sun, Yan Hu, Zhiqiang Shi, Limin Sun:
Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems. GLOBECOM 2018: 1-7 - [c21]An Yang, Limin Sun, Zhiqiang Shi, Weimin Zheng, Yuyan Sun, Yan Hu:
Sbsd: Detecting the Sequence Attack through Sensor Data in ICSs. ICC 2018: 1-7 - [c20]Yu Chen, Zhiqiang Shi, Hong Li, Weiwei Zhao, Yiliang Liu, Yuansong Qiao:
HIMALIA: Recovering Compiler Optimization Levels from Binaries by Deep Learning. IntelliSys (1) 2018: 35-47 - [c19]Yu Chen, Hong Li, Yuan Ma, Zhiqiang Shi, Limin Sun:
Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. WASA 2018: 53-65 - 2017
- [c18]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
CovertMIMO: A covert uplink transmission scheme for MIMO systems. ICC 2017: 1-6 - [c17]Yu Chen, Hong Li, Weiwei Zhao, Lin Zhang, Zhongjin Liu, Zhiqiang Shi:
IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares. IPCCC 2017: 1-8 - [c16]Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:
On eavesdropping attacks and countermeasures for MU-MIMO systems. MILCOM 2017: 40-45 - [c15]Lin Zhang, Hong Li, Limin Sun, Zhiqiang Shi, Yunhua He:
Poster: Towards Fully Distributed User Authentication with Blockchain. PAC 2017: 202-203 - [c14]Qing Hu, Shichao Lv, Zhiqiang Shi, Limin Sun, Liang Xiao:
Defense Against Advanced Persistent Threats with Expert System for Internet of Things. WASA 2017: 326-337 - 2015
- [c13]Xiaoshan Wang, Yao Liu, Zhiqiang Shi, Xiang Lu, Limin Sun:
A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. GLOBECOM 2015: 1-6 - [c12]Yongming Jin, Hongsong Zhu, Zhiqiang Shi, Xiang Lu, Limin Sun:
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. ICC 2015: 7234-7239 - 2014
- [c11]Yaowen Zheng, Hong Li, Zhiqiang Shi, Limin Sun:
Security of Cyber Physical System. CWSN 2014: 558-567 - [c10]Shiming Ge, Kaixuan Xie, Rui Yang, Zhiqiang Shi:
Image Completion Using Global Patch Matching and Optimal Seam Synthesis. ICPR 2014: 871-876 - [c9]Zhiqiang Shi, Jin Liu, Qiuxia Song, Jin Wang:
An Energy Efficient Data Transmission Mechanism for Middleware of Wireless Sensor Network. IIH-MSP 2014: 827-830 - 2013
- [c8]Zhiqiang Shi, Dan Ionescu, Dongli Zhang:
ST-XCP: A Stable XCP Protocol. ICCCN 2013: 1-7 - [c7]Wei Gan, Zhiqiang Shi, Chen Zhang, Limin Sun, Dan Ionescu:
MERPL: A more memory-efficient storing mode in RPL. ICON 2013: 1-5 - 2012
- [j3]Zhonghua Zhao, Wei Huangfu, Limin Sun, Zhiqiang Shi, Wei Gan:
An Open Conformance Test System towards the Standardization of Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - 2011
- [c6]Zhiqiang Shi, Dan Ionescu, Dongli Zhang:
Congestion Control in Networks with Mixed IP and P2P Traffic. ICCCN 2011: 1-6 - [c5]Zhiqiang Shi, Dan Ionescu, Dongli Zhang:
Smoothing the XCP sender. ICON 2011: 95-99 - 2010
- [j2]Yuansong Qiao, Enda Fallon, John Murphy, Liam Murphy, Zhiqiang Shi, Austin Hanley:
Transmission scheduling for multi-homed transport protocols with network failure tolerance. Telecommun. Syst. 43(1-2): 39-48 (2010)
2000 – 2009
- 2009
- [c4]Zhiqiang Shi, Yuansong Qiao, Adrian Matthews, Gregory Hayes, Anthony Cunningham, Enda Fallon:
Mobility support using the mobile port mapping. IWCMC 2009: 31-36 - 2005
- [c3]Yantao Sun, Zhiqiang Shi, Zhimei Wu:
A Discovery Algorithm for Physical Topology in Switched Ethernets. LCN 2005: 311-317 - 2003
- [j1]Vahid Emamian, Mostafa Kaveh, Ahmed H. Tewfik, Zhiqiang Shi, Laurence J. Jacobs, Jacek Jarzynski:
Robust Clustering of Acoustic Emission Signals Using Neural Networks and Signal Subspace Projections. EURASIP J. Adv. Signal Process. 2003(3): 276-286 (2003) - 2001
- [c2]Ya-Gang Wang, Wen-Jian Cai, Zhiqiang Shi:
PID autotuning for integrating processes with specifications on gain and phase margins. ACC 2001: 2181-2185 - [c1]Vahid Emamian, Zhiqiang Shi, Mostafa Kaveh, Ahmed H. Tewfik:
Acoustic emission classification using signal subspace projections. ICASSP 2001: 3321-3324
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint