default search action
Baojiang Cui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li:
EvilPromptFuzzer: generating inappropriate content based on text-to-image models. Cybersecur. 7(1): 70 (2024) - [j49]Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu:
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning. Cybersecur. 7(1): 71 (2024) - [j48]Renhai Dong, Baojiang Cui, Yi Sun, Jun Yang:
Ins Finder: A Practical CPU Undocumented Instruction Detection Framework. J. Circuits Syst. Comput. 33(3) (2024) - [j47]Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Jie Xu, Junsong Fu:
A formal security analysis of the fast authentication procedure based on the security context in 5G networks. Soft Comput. 28(3): 1865-1881 (2024) - [j46]Renhai Dong, Baojiang Cui, Yi Sun, Jun Yang:
BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 4515-4523 (2024) - [j45]Meiyi Jiang, Baojiang Cui, Junsong Fu, Tao Wang, Lu Yao, Bharat K. Bhargava:
RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic Algorithm. IEEE Trans. Inf. Forensics Secur. 19: 7794-7809 (2024) - [j44]Meiyi Jiang, Baojiang Cui, Junsong Fu, Tao Wang, Ziqi Wang:
KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement Learning. IEEE Trans. Netw. Serv. Manag. 21(3): 2944-2961 (2024) - [c120]Yiran Sun, Ziqi Wang, Kewei Liu, Baojiang Cui:
Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms. EIDWT 2024: 53-63 - [c119]Siyuan Wang, Zhiwei Cui, Jie Xu, Baojiang Cui:
An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing. EIDWT 2024: 64-74 - [c118]Qing Guo, Wenchuan Yang, Baojiang Cui:
Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features. EIDWT 2024: 75-86 - [c117]Wenxing Ma, Baojiang Cui:
Fuzzing IoT Devices via Android App Interfaces with Large Language Model. EIDWT 2024: 87-99 - [c116]Pengyuan Zhang, Baojiang Cui:
Network Scanning Detection Based on Spatiotemporal Behavior. EIDWT 2024: 110-117 - [c115]Huan Yu, Baojiang Cui:
IoTaint: An Optimized Static Taint Analysis Method in Embedded Firmware. EIDWT 2024: 118-129 - [c114]Naiguang Zhu, Jie Xu, Baojiang Cui:
Formal Analysis of 5G EAP-TLS 1.3. EIDWT 2024: 140-151 - [c113]Feng Tian, Baojiang Cui, Chen Chen:
Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding Network. EIDWT 2024: 206-218 - [c112]Yifan Luo, Baojiang Cui:
Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis. EIDWT 2024: 229-240 - [c111]Huipeng Liu, Baojiang Cui, Jie Xu, Lihua Niu:
An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing. EIDWT 2024: 297-306 - [c110]Rui Liu, Baojiang Cui, Chen Chen, Jinxin Ma:
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning. EIDWT 2024: 307-317 - [c109]Menglin Ma, Baojiang Cui:
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle. EIDWT 2024: 394-403 - [c108]Ziyang Chen, Baojiang Cui, Zishuai Cheng:
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model. EIDWT 2024: 404-414 - [c107]Yuqing Zhao, Baojiang Cui, Jun Yang, Meiyi Jiang:
A DPI-Based Network Traffic Feature Vector Optimization Model. EIDWT 2024: 522-531 - [c106]Peixin Cong, Baojiang Cui:
Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees Algorithm. EIDWT 2024: 555-566 - [c105]Xiaoyang Feng, Wei Tan, Tao Qiu, Wenxiao Yu, Zixuan Zhang, Baojiang Cui:
A PFCP Protocol Fuzz Testing Framework Integrating Data Mutation Strategies and State Transition Algorithms. IMIS 2024: 272-279 - [c104]Yitao Li, Baojiang Cui, Dongbin Wang, Yue Yu, Can Zhang:
An Efficient Smart Contracts Event Ordering Vulnerability Detection System Based on Symbolic Execution and Fuzz Testing. IMIS 2024: 280-287 - [c103]Zhehao Liang, Baojiang Cui, Dongbin Wang, Jie Xu, Huipeng Liu:
A Smart Contract Vulnerability Detection System Based on BERT Model and Fuzz Testing. IMIS 2024: 288-295 - 2023
- [j43]Wenchuan Yang, Haoran Yu, Baojiang Cui, Runqi Sui, Tianyu Gu:
Deep neural network pruning method based on sensitive layers and reinforcement learning. Artif. Intell. Rev. 56(S2): 1897-1917 (2023) - [j42]Yuan Cheng, Baojiang Cui, Chen Chen, Thar Baker, Tao Qi:
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network. Comput. Commun. 197: 267-275 (2023) - [j41]Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys:
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks. Proc. Priv. Enhancing Technol. 2023(2): 282-297 (2023) - [j40]Ya Tao, Haitao Du, Jie Xu, Li Su, Baojiang Cui:
On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks. Sensors 23(11): 5075 (2023) - [j39]Zhiwei Cui, Baojiang Cui, Junsong Fu, Bharat K. Bhargava:
An Attack to One-Tap Authentication Services in Cellular Networks. IEEE Trans. Inf. Forensics Secur. 18: 5082-5095 (2023) - [c102]Xiaofeng Chi, Bingquan Wang, Jingling Zhao, Baojiang Cui:
A Vulnerability Detection Method for SDN with Optimized Fuzzing. AINA (2) 2023: 525-536 - [c101]Pengju Liu, Baojiang Cui, Can Cui:
Traffic-Oriented Shellcode Detection Based on VSM. EIDWT 2023: 152-162 - [c100]Zhuorao Yang, Baojiang Cui, Can Cui:
IPT-CFI: Control Flow Integrity Vulnerability Detection Based on Intel Processor Trace. EIDWT 2023: 491-499 - [i2]Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys:
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks. CoRR abs/2301.02487 (2023) - [i1]Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu:
Attacks Against Security Context in 5G Network. CoRR abs/2303.10955 (2023) - 2022
- [j38]Qian Ma, Baojiang Cui, Cong Sun:
A novel privacy-aware model for nonparametric decentralized detection. Comput. Secur. 117: 102688 (2022) - [j37]Junsong Fu, Na Wang, Leyao Nie, Baojiang Cui, Bharat K. Bhargava:
Defending Trace-Back Attack in 3D Wireless Internet of Things. IEEE/ACM Trans. Netw. 30(4): 1765-1779 (2022) - [j36]Junsong Fu, Na Wang, Baojiang Cui, Bharat K. Bhargava:
A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems. IEEE Trans. Parallel Distributed Syst. 33(5): 1246-1261 (2022) - [c99]Fengjiao He, Wenchuan Yang, Baojiang Cui, Jia Cui:
Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined Rules. ICCCN 2022: 1-7 - [c98]Xinda Xu, Jingling Zhao, Baojiang Cui:
Software Control Flow Anomaly Detection Technology Based On Neural Network. ICCIR 2022: 561-566 - [c97]Zhihao Zhou, Jinxin Ma, Guangnian Wan, Li Su, Haitao Du, Baojiang Cui:
Research on 6G Satellite-Terrestrial Integrated Network Architecture. ICCSIE 2022: 1057-1062 - [c96]Zhiwei Cui, Baojiang Cui, Li Su, Haitao Du, Hongxin Wang, Junsong Fu:
Attacks Against Security Context in 5G Network. MobiSec 2022: 3-17 - 2021
- [j35]Qian Ma, Cong Sun, Baojiang Cui, Xiaohui Jin:
A novel model for anomaly detection in network traffic based on kernel support vector machine. Comput. Secur. 104: 102215 (2021) - [j34]Zishuai Cheng, Baojiang Cui, Tao Qi, Wenchuan Yang, Junsong Fu:
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure. Secur. Commun. Networks 2021: 6661124:1-6661124:11 (2021) - [j33]Xiaodan Yan, Baojiang Cui, Yang Xu, Peilin Shi, Ziqi Wang:
A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack. IEEE ACM Trans. Comput. Biol. Bioinform. 18(3): 871-881 (2021) - [j32]Chen Chen, Jinxin Ma, Tao Qi, Baojiang Cui, Weikong Qi, Zhaolei Zhang, Peng Sun:
Firmware code instrumentation technology for internet of things-based services. World Wide Web 24(3): 941-954 (2021) - [c95]Rongze Xia, Baojiang Cui:
Malware Classification Based on Graph Neural Network Using Control Flow Graph. BWCCA 2021: 129-138 - [c94]Yujuan Zhao, Baojiang Cui, Jie Xu:
A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain. CNCERT 2021: 27-36 - [c93]Yiping Liu, Jie Xu, Baojiang Cui:
Smart Contract Vulnerability Detection Based on Symbolic Execution Technology. CNCERT 2021: 193-207 - [c92]Jun Yang, Ruoyu He, Baojiang Cui:
A GPU memory leakage code defect detection method based on the API calling feature. CONF-CDS 2021: 44:1-44:13 - [c91]Hua Yang, Jingling Zhao, Baojiang Cui:
PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format. IMIS 2021: 67-75 - [c90]Yang Hu, Wenchuan Yang, Baojiang Cui, Xiaohui Zhou, Zhijie Mao, Ying Wang:
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol. IMIS 2021: 144-155 - [c89]Tao Guo, Baojiang Cui:
Web Page Classification Based on Graph Neural Network. IMIS 2021: 188-198 - [c88]Kunlin Li, Baojiang Cui:
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning. IMIS 2021: 199-208 - [c87]Han Xu, Baojiang Cui, Chen Chen:
Fuzzing with Multi-dimensional Control of Mutation Strategy. IMIS 2021: 276-284 - [c86]Zheng Wang, Baojiang Cui, Yang Zhang:
An ELF Recovery Method for Linux Malicious Process Detection. IMIS 2021: 285-294 - [c85]Jiatong Wu, Baojiang Cui, Chen Chen, Xiang Long:
A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and Classification. IMIS 2021: 295-303 - [c84]Fanglei Zhang, Baojiang Cui, Chen Chen, Yiqi Sun, Kairui Gong, Jinxin Ma:
Simulation-Based Fuzzing for Smart IoT Devices. IMIS 2021: 304-313 - 2020
- [j31]Chen Chen, Zhe Jing, Jinxin Ma, Baojiang Cui, Han Xu, Quanchen Zou:
IoTSIT: A Static Instrumentation Tool for IoT Devices. IEEE Access 8: 92153-92161 (2020) - [j30]Xinyao Liu, Baojiang Cui, Junsong Fu, Jinxin Ma:
HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations. Future Gener. Comput. Syst. 108: 390-400 (2020) - [j29]Jie Xu, Baojiang Cui, Ruisheng Shi, Qingling Feng:
Outsourced privacy-aware task allocation with flexible expressions in crowdsourcing. Future Gener. Comput. Syst. 112: 383-393 (2020) - [j28]Xiaodan Yan, Yang Xu, Xiaofei Xing, Baojiang Cui, Zihao Guo, Taibiao Guo:
Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT. IEEE Trans. Ind. Informatics 16(9): 6182-6192 (2020) - [j27]Xiaodan Yan, Yang Xu, Baojiang Cui, Shuhan Zhang, Taibiao Guo, Chaoliang Li:
Learning URL Embedding for Malicious Website Detection. IEEE Trans. Ind. Informatics 16(10): 6673-6681 (2020) - [c83]Bowen Sun, Bo Wang, Baojiang Cui, Yeqi Fu:
Greybox Fuzzing Based on Ant Colony Algorithm. AINA 2020: 1319-1329 - [c82]Shiyu Li, Baojiang Cui:
Research on Association Analysis Technology of Network Attack Trace Based on Web Log. IMIS 2020: 33-43 - [c81]Yuchao Wang, Baojiang Cui:
The Study and Realization of a Binary-Based Address Sanitizer Based on Code Injection. IMIS 2020: 125-134 - [c80]Zheng Zhang, Baojiang Cui, Chen Chen:
Reinforcement Learning-Based Fuzzing Technology. IMIS 2020: 244-253 - [c79]Min Yao, Baojiang Cui, Chen Chen:
Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis. IMIS 2020: 254-263 - [c78]Yuyue Wang, Chen Chen, Baojiang Cui:
A Targeted Fuzzing Technique Based on Neural Networks and Particle Swarm Optimization. IMIS 2020: 373-383 - [c77]Pengfei Xiong, Baojiang Cui, Zishuai Cheng:
Anomaly Network Traffic Detection Based on Deep Transfer Learning. IMIS 2020: 384-393 - [c76]Yiqi Sun, Baojiang Cui, Chen Chen, Yifei Wang:
A Static Instrumentation Method for IoT Firmware ELF Binary Emulation Patching. IMIS 2020: 586-596 - [c75]Xiaochen Wang, Baojiang Cui, Xinda Xu, Qian Ma:
Research on Vulnerability Site Location and Vulnerability Similarity Technology. IMIS 2020: 614-623 - [c74]Zishuai Cheng, Baojiang Cui, Junsong Fu:
A Novel Web Anomaly Detection Approach Based on Semantic Structure. SocialSec 2020: 20-33 - [c73]Jun Yang, Mengyu Zhou, Baojiang Cui:
MLAB-BiLSTM: Online Web Attack Detection Via Attention-Based Deep Neural Networks. SPDE 2020: 482-492
2010 – 2019
- 2019
- [j26]Wenchuan Yang, Wen Zuo, Baojiang Cui:
Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network. IEEE Access 7: 29891-29900 (2019) - [j25]Guobin Wang, Jingling Zhao, Baojiang Cui:
Fuzzing method based on field filter and packet repair for GTPv2 protocol. Internet Things 8 (2019) - [j24]Bingquan Wang, Baojiang Cui:
Ontology-based services for software vulnerability detection: a survey. Serv. Oriented Comput. Appl. 13(4): 333-339 (2019) - [j23]Junsong Fu, Baojiang Cui, Na Wang, Xinyao Liu:
A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things. IEEE Trans. Ind. Informatics 15(10): 5664-5673 (2019) - [c72]Xiaobing Liang, Bing Zhao, Qian Ma, Bang Sun, Baojiang Cui:
Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System. AINA 2019: 166-175 - [c71]Da Xiao, Shouying Bai, Qian Wu, Baojiang Cui:
Obfuscation Algorithms Based on Congruence Equation and Knapsack Problem. EIDWT 2019: 128-136 - [c70]Qian Ma, Bin Xu, Bang Sun, Feng Zhai, Baojiang Cui:
Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition System. EIDWT 2019: 137-147 - [c69]Wenchuan Yang, Zishuai Cheng, Baojiang Cui:
Recombining TCP sessions based on finite state machine to detect cyber attackers. ICCSP 2019: 138-142 - [c68]Yuchen Liang, Jiangdong Deng, Baojiang Cui:
Bidirectional LSTM: An Innovative Approach for Phishing URL Identification. IMIS 2019: 326-337 - [c67]Weiqi Li, Qian Wu, Baojiang Cui:
State-Based Fuzzing for S1AP. IMIS 2019: 362-372 - [c66]Wenchuan Yang, Yifei Wang, Baojiang Cui, Chen Chen:
A Static Instrumentation Method for ELF Binary. IMIS 2019: 393-403 - [c65]Ziqi Wang, Baojiang Cui, Shen Yao, Meiyi Jiang:
An SDN-Based Dynamic Security Architecture for Space Information Networks. SINC 2019: 99-111 - 2018
- [j22]Chen Chen, Baojiang Cui, Jinxin Ma, Runpu Wu, Jianchao Guo, Wenqian Liu:
A systematic review of fuzzing techniques. Comput. Secur. 75: 118-137 (2018) - [j21]Baojiang Cui, Shanshan He, Xi Yao, Peilin Shi:
Malicious URL detection with feature extraction based on machine learning. Int. J. High Perform. Comput. Netw. 12(2): 166-178 (2018) - [j20]Jun Yang, Shujuan Li, Xiaodan Yan, BaiHui Zhang, Baojiang Cui:
Searchable symmetric encryption based on the inner product for cloud storage. Int. J. Web Grid Serv. 14(1): 70-87 (2018) - [j19]Xiaohui Jin, Baojiang Cui, Dong Li, Zishuai Cheng, Congxian Yin:
An improved payload-based anomaly detector for web applications. J. Netw. Comput. Appl. 106: 111-116 (2018) - [c64]Zijian Li, Jun Yang, Baojiang Cui:
Study on Sensitive Data Protection Based on SEAndroid. AINA Workshops 2018: 502-507 - [c63]Ruiqing Liu, Jun Yang, Baojiang Cui:
Improved Secure ZigBee Light Link Touchlink Commissioning Protocol Design. AINA Workshops 2018: 521-526 - [c62]Xiaohui Jin, Baojiang Cui, Jun Yang, Zishuai Cheng:
An Adaptive Analysis Framework for Correlating Cyber-Security-Related Data. AINA 2018: 915-919 - [c61]Jingling Zhao, Zhan Su, Jinxin Ma, Baojiang Cui:
Fuzzing Test Method Based on Constraint-Conditions Priority for LTE-EPC Protocol. CISIS 2018: 465-475 - [c60]Siran Fu, Baojiang Cui, Tao Guo, Xuyan Song:
C++ Memory Detection Tool Based on Dynamic Instrumentation. EIDWT 2018: 663-674 - [c59]Jingling Zhao, Suoxing Zhang, Bohan Liu, Baojiang Cui:
Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features. ICCCN 2018: 1-6 - [c58]Wenchuan Yang, Bang Sun, Baojiang Cui:
A Webshell Detection Technology Based on HTTP Traffic Analysis. IMIS 2018: 336-342 - [c57]Jun Yang, Ruiqing Liu, Baojiang Cui:
Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism. IMIS 2018: 343-353 - [c56]Baojiang Cui, Pin Mao:
The Study and Realization of Vulnerability-Oriented Fuzzing Technology for ActiveX Plug-Ins. IMIS 2018: 922-931 - [c55]Xiaodan Yan, Baojiang Cui, Jianbin Li:
Malicious Domain Name Recognition Based on Deep Neural Networks. SpaCCS 2018: 497-505 - 2017
- [j18]Baojiang Cui, Peilin Shi, Weikong Qi, Ming Li:
Uploading multiply deferrable big data to the cloud platform using cost-effective online algorithms. Future Gener. Comput. Syst. 67: 276-285 (2017) - [j17]Jingling Zhao, Shilei Chen, Mengchen Cao, Baojiang Cui:
Malware algorithm classification method based on big data analysis. Int. J. Web Grid Serv. 13(1): 112-130 (2017) - [j16]Baojiang Cui, Xiaodan Yan:
A review of data management and protocols for vehicular networks. Int. J. Web Grid Serv. 13(2): 186-206 (2017) - [j15]Baojiang Cui, Fuwei Wang, Yongle Hao, Xiaofeng Chen:
WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework. Soft Comput. 21(12): 3401-3414 (2017) - [c54]Pengfei Li, Zhouguo Chen, Baojiang Cui:
Detecting Malware Based on Opcode N-Gram and Machine Learning. 3PGCIC 2017: 99-110 - [c53]Chen Chen, Zhouguo Chen, Yongle Hao, Baojiang Cui:
Mocov: Model Based Fuzzing Through Coverage Guided Technology. BWCCA 2017: 404-413 - [c52]Chong Wang, Jianwei Ding, Tao Guo, Baojiang Cui:
A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction. BWCCA 2017: 427-438 - [c51]Baojiang Cui, Xiangqian Zhang, Tianxin Zhang, Qin Zhang:
Embedded System Vulnerability Mining Technology Based on In-memory Fuzzing Test. BWCCA 2017: 439-449 - [c50]Baojiang Cui, Qin Zhang, Xiangqian Zhang, Tao Guo:
Research on UPnP Protocol Security of Gateway Device. BWCCA 2017: 450-458 - [c49]Xiaodan Yan, Tianxin Zhang, Baojiang Cui, Jiangdong Deng:
Hinge Classification Algorithm Based on Asynchronous Gradient Descent. BWCCA 2017: 459-468 - [c48]Xiaohui Jin, Baojiang Cui, Jun Yang, Zishuai Cheng:
Payload-Based Web Attack Detection Using Deep Neural Network. BWCCA 2017: 482-488 - [c47]Baojiang Cui, BaiHui Zhang, Kaiyue Wang:
A Data Masking Scheme for Sensitive Big Data Based on Format-Preserving Encryption. CSE/EUC (1) 2017: 518-524 - [c46]Baojiang Cui, Qi Zhao, Tianyu Liu:
Study on Android Native Layer Code Protection Based on Improved O-LLVM. IMIS 2017: 275-285 - [c45]Baojiang Cui, Yi Ren, Pin Mao:
The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse. IMIS 2017: 296-309 - [c44]Jingling Zhao, Guoxiao Huang, Tianyu Liu, Baojiang Cui:
Software Abnormal Behavior Detection Based on Hidden Markov Model. IMIS 2017: 929-940 - 2016
- [j14]Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaofeng Chen:
Design and analysis of secure mechanisms based on tripartite credibility for RFID systems. Comput. Stand. Interfaces 44: 110-116 (2016) - [j13]Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaobing Liang:
CG-Fuzzing: a comprehensive fuzzy algorithm for ZigBee. Int. J. Ad Hoc Ubiquitous Comput. 23(3/4): 203-215 (2016) - [j12]Baojiang Cui, Fuwei Wang, Yongle Hao, Lingyu Wang:
A taint based approach for automatic reverse engineering of gray-box file formats. Soft Comput. 20(9): 3563-3578 (2016) - [j11]Baojiang Cui, Zheli Liu, Lingyu Wang:
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage. IEEE Trans. Computers 65(8): 2374-2385 (2016) - [c43]Baojiang Cui, Chong Wang, Guowei Dong, Jinxin Ma:
A program behavior recognition algorithm based on assembly instruction sequence similarity. BWCCA 2016: 13-20 - [c42]Jun Yang, Haipeng Zhang, Lifang Han, Baojiang Cui, Guowei Dong:
Design and implementation of software consistency detection system based on Netty framework. BWCCA 2016: 343-351 - [c41]Baojiang Cui, Yang Wei, Songling Shan, Jinxin Ma:
The generation of XSS attacks developing in the detect detection. BWCCA 2016: 353-361 - [c40]Xiaohui Jin, Congxian Yin, Pengpeng Yang, Baojiang Cui:
An Attack Detection System for Multiple Web Applications Based on Big Data Platform. BWCCA 2016: 371-376 - [c39]Baojiang Cui, Shanshan He:
Anomaly Detection Model Based on Hadoop Platform and Weka Interface. IMIS 2016: 84-89 - [c38]Jingling Zhao, Junxin Qi, Liang Zhou, Baojiang Cui:
Dynamic Taint Tracking of Web Application Based on Static Code Analysis. IMIS 2016: 96-101 - [c37]Liang Zhou, Siran Fu, Tao Guo, Lifang Han, Baojiang Cui:
Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation. IMIS 2016: 149-153 - [c36]Jun Yang, Xiangping Du, Liang Zhou, Songling Shan, Baojiang Cui:
Research on the Identification of Software Behavior in Anomaly Detection. IMIS 2016: 295-298 - [c35]Xuan Tian, Baojiang Cui, Jiangdong Deng, Jun Yang:
The Performance Optimization of Hadoop during Mining Online Education Packets for Malware Detection. IMIS 2016: 305-309 - 2015
- [j10]Baojiang Cui, Fuwei Wang, Tao Guo, Guowei Dong:
A practical off-line taint analysis framework and its application in reverse engineering of file format. Comput. Secur. 51: 1-15 (2015) - [j9]Baojiang Cui, Haifeng Jin, Zheli Liu, Jiangdong Deng:
Improved collaborative filtering with intensity-based contraction. J. Ambient Intell. Humaniz. Comput. 6(5): 661-674 (2015) - [j8]Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaobing Liang, Yuemin Ding:
Enhanced Key Management Protocols for Wireless Sensor Networks. Mob. Inf. Syst. 2015: 627548:1-627548:10 (2015) - [j7]Baojiang Cui, Haifeng Jin, Giuliana Carullo, Zheli Liu:
Service-oriented mobile malware detection system based on mining strategies. Pervasive Mob. Comput. 24: 101-116 (2015) - [j6]Baojiang Cui, Tingting Hou, Baolian Long, Lingling Xu:
Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language. Trans. Comput. Collect. Intell. 19: 32-44 (2015) - [c34]Baojiang Cui, Peilin Shi, Jun Yang, Yongle Hao:
Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm. 3PGCIC 2015: 116-120 - [c33]Pengpeng Yang, Baojiang Cui, Ziyue Wang, Xiaobing Liang, Yilun Fu:
Study on Security Protocol Analysis and Design Technology for RFID System. 3PGCIC 2015: 416-419 - [c32]Baojiang Cui, Ziyue Wang, Jun Yang, Xiaofeng Chen:
Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems. AINA Workshops 2015: 17-21 - [c31]Baojiang Cui, Mengchen Cao, Shilei Chen, Weikong Qi:
A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature Extraction. BWCCA 2015: 64-68 - [c30]Baojiang Cui, Yunze Ni, Yilun Fu:
ADDFuzzer: A New Fuzzing Framework of Android Device Drivers. BWCCA 2015: 88-91 - [c29]Lifang Han, Tingting Hou, Songling Shan, Yikang Li, Baojiang Cui:
The Research of Aspect-Oriented Dynamic Analysis Based on Static Analysis. BWCCA 2015: 114-119 - [c28]Ling Li, Junxin Qi, Nan Liu, Lifang Han, Baojiang Cui:
Static-Based Test Case Dynamic Generation for SQLIVs Detection. BWCCA 2015: 173-177 - [c27]Jingling Zhao, Kunfeng Xia, Yilun Fu, Baojiang Cui:
An AST-based Code Plagiarism Detection Algorithm. BWCCA 2015: 178-182 - [c26]Baojiang Cui, Shengbo Feng, Qinshu Xiao, Ming Li:
Detection of LTE Protocol Based on Format Fuzz. BWCCA 2015: 187-192 - [c25]Jun Yang, Yong Guo, Zijing Cheng, Kai Lin, Baojiang Cui:
Space Time Protocol Based on IEEE1588. BWCCA 2015: 359-363 - [c24]Xiaobing Liang, Baojiang Cui, Yingjie Lv, Yilun Fu:
Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set. IMIS 2015: 260-264 - [c23]Baojiang Cui, Shanshan He, Haifeng Jin:
Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining. IMIS 2015: 277-282 - [c22]Baojiang Cui, Tao Xi:
Security Analysis of Openstack Keystone. IMIS 2015: 283-288 - [c21]Baojiang Cui, Peilin Shi, Haifeng Jin:
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively. IMIS 2015: 292-295 - [c20]Jun Yang, Jiangdong Deng, Baojiang Cui, Haifeng Jin:
Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM. IMIS 2015: 296-300 - 2014
- [j5]Baojiang Cui, Shurui Liang, Shilei Chen, Bing Zhao, Xiaobing Liang:
A Novel Fuzzing Method for Zigbee Based on Finite State Machine. Int. J. Distributed Sens. Networks 10 (2014) - [c19]Zijing Cheng, Lei He, Jingling Zhao, Kai Lin, Baojiang Cui:
A Security Enhanced IEEE1588 Protocol for Deep-Space Environment. 3PGCIC 2014: 9-13 - [c18]Qinshu Xiao, Wenan Zhou, Baojiang Cui, Lingrong Li:
An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters. 3PGCIC 2014: 256-261 - [c17]Li Qiang, Wenan Zhou, Baojiang Cui, Liu Na:
Security Analysis of TAU Procedure in LTE Network. 3PGCIC 2014: 372-376 - [c16]Bing Zhao, Ziyue Wang, Baojiang Cui, Xiaobing Liang:
An Enhanced Secure Mechanism of Low Level Reader Protocol (LLRP) V1.1. 3PGCIC 2014: 475-480 - [c15]Haifeng Jin, Baojiang Cui, Jianxin Wang:
Mining Mobile Internet Packets for Malware Detection. 3PGCIC 2014: 481-486 - [c14]Baojiang Cui, Baolian Long, Tingting Hou:
Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language. 3PGCIC 2014: 487-491 - [c13]Jingling Zhao, Huiyun Zhang, Baojiang Cui:
Sentence Similarity Based on Semantic Vector Model. 3PGCIC 2014: 499-503 - [c12]Yongle Hao, Hongliang Liang, Daijie Zhang, Qian Zhao, Baojiang Cui:
JavaScript Malicious Codes Analysis Based on Naive Bayes Classification. 3PGCIC 2014: 513-519 - [c11]Yongle Hao, Yizhen Jia, Baojiang Cui, Wei Xin, Dehu Meng:
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols. 3PGCIC 2014: 520-524 - [c10]Jun Yang, Zheli Liu, Jin Li, Chunfu Jia, Baojiang Cui:
Multi-key Searchable Encryption without Random Oracle. INCoS 2014: 79-84 - 2013
- [j4]Baojiang Cui, Wenhao Fan, Ce Bian, Tao Guo, Yongle Hao, Jianxin Wang:
Synthesis Algorithm of Homology Detection Based on AHP. Int. J. Comput. Intell. Syst. 6(6): 1143-1150 (2013) - [j3]Siwei Peng, Baojiang Cui, Ru Jia, Shurui Liang, Yiying Zhang:
A novel vulnerability detection method for ZigBee MAC layer. Int. J. Grid Util. Comput. 4(2/3): 134-143 (2013) - [c9]Jingling Zhao, Shilei Chen, Shurui Liang, Baojiang Cui, Xiaolong Song:
RFSM-Fuzzing a Smart Fuzzing Algorithm Based on Regression FSM. 3PGCIC 2013: 380-386 - [c8]Baojiang Cui, Ziyue Wang, Tao Guo, Guowei Dong, Bing Zhao:
UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks. EIDWT 2013: 267-272 - [c7]Jianglang Feng, Baojiang Cui, Kunfeng Xia:
A Code Comparison Algorithm Based on AST for Plagiarism Detection. EIDWT 2013: 393-397 - [c6]Baojiang Cui, Fuwei Wang, Tao Guo, Guowei Dong, Bing Zhao:
FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework. EIDWT 2013: 583-588 - [c5]Jianxin Wang, Fan Yang, Xiaoli Dong, Ben Xu, Baojiang Cui:
Improving Association Rules by Optimizing Discretization Based on a Hybrid GA: A Case Study of Data from Forest Ecology Stations in China. EIDWT 2013: 627-632 - [c4]Tao Guo, Guowei Dong, Hu Qin, Baojiang Cui:
Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree. EIDWT 2013: 714-719 - 2012
- [j2]Yiying Zhang, Xiangzhen Li, Jianming Liu, Jucheng Yang, Baojiang Cui:
A Secure Hierarchical Key Management Scheme in Wireless Sensor Network. Int. J. Distributed Sens. Networks 8 (2012) - 2011
- [j1]Baojiang Cui, Jun Guan, Tao Guo, Lifang Han, Jianxin Wang, Yupeng Ji:
Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification. J. Multim. 6(4): 320-328 (2011) - [c3]Baojiang Cui, Ce Bian, Tao Guo, Yongle Hao, Jianxin Wang:
Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process. CIS 2011: 826-830 - 2010
- [c2]Shizhong Wu, Yongle Hao, Xinyu Gao, Baojiang Cui, Ce Bian:
Homology Detection Based on Abstract Syntax Tree Combined Simple Semantics Analysis. Web Intelligence/IAT Workshops 2010: 410-414
2000 – 2009
- 2004
- [c1]Baojiang Cui, Jun Liu, Gang Wang, Jing Liu:
Study on Performance of IP-SWAN Based on Distributed NS-RAID. COMPSAC 2004: 566-571
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint