


default search action
Jianmin Pang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Wenfu Liu
, Jianmin Pang, Nan Li, Feng Yue, Guangming Liu:
Few-shot short-text classification with language representations and centroid similarity. Appl. Intell. 53(7): 8061-8072 (2023) - [j23]Bing Xia, Wenbo Liu
, Qudong He, Fudong Liu, Jianmin Pang, Ruinan Yang, Jiabin Yin, Yunxiang Ge:
Binary Vulnerability Similarity Detection Based on Function Parameter Dependency. Int. J. Semantic Web Inf. Syst. 19(1): 1-16 (2023) - [c37]Jiangwei Hao, Yuanyuan Xia, Fei Li, Hongru Yang, Zongjiang Yi, Bei Zhou, Jianmin Pang:
AMPT: Automatic Mixed-Precision Tuning Based on Accuracy Gain. APSEC 2023: 329-338 - [c36]Bing Xia, Yunxiang Ge, Ruinan Yang, Jiabin Yin, Jianmin Pang, Chongjun Tang:
BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks. CSCloud/EdgeCom 2023: 167-172 - 2022
- [j22]Jie Tan, Jianmin Pang, Cong Liu
:
What Factors Affect the Performance of Software after Migration: A Case Study on Sunway TaihuLight Supercomputer. IEICE Trans. Inf. Syst. 105-D(1): 26-30 (2022) - [j21]Junchao Wang, Jin Wei, Jianmin Pang, Fan Zhang, Shunbin Li:
Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning. Int. J. Digit. Crime Forensics 14(2): 1-18 (2022) - [j20]Wenfu Liu
, Jianmin Pang, Qiming Du, Nan Li, Shudan Yang:
A Method of Short Text Representation Fusion with Weighted Word Embeddings and Extended Topic Information. Sensors 22(3): 1066 (2022) - [j19]Yingying Li, Huihui Sun, Jianmin Pang:
Revisiting split tiling for stencil computations in polyhedral compilation. J. Supercomput. 78(1): 440-470 (2022) - [c35]Xiaohan Tao, Yu Zhu, Boyang Wang, Jinlong Xu, Jianmin Pang, Jie Zhao:
Automatically Generating High-performance Matrix Multiplication Kernels on the Latest Sunway Processor. ICPP 2022: 52:1-52:12 - 2021
- [j18]Xiaochuan Zhang, Xipeng Qiu
, Jianmin Pang, Fudong Liu, Xingwei Li:
Dual-axial self-attention network for text classification. Sci. China Inf. Sci. 64(12) (2021) - [j17]Wenfu Liu
, Jianmin Pang, Nan Li, Xin Zhou, Feng Yue:
Research on Multi-label Text Classification Method Based on tALBERT-CNN. Int. J. Comput. Intell. Syst. 14(1): 201 (2021) - [j16]Xiaohan Tao, Jianmin Pang
, Jinlong Xu, Yu Zhu:
Compiler-directed scratchpad memory data transfer optimization for multithreaded applications on a heterogeneous many-core architecture. J. Supercomput. 77(12): 14502-14524 (2021) - [j15]Mingliang Li
, Jianmin Pang
, Feng Yue
, Fudong Liu
, Jun Wang
, Jie Tan
:
Enhancing Dynamic Binary Translation in Mobile Computing by Leveraging Polyhedral Optimization. Wirel. Commun. Mob. Comput. 2021: 6611867:1-6611867:12 (2021) - [c34]Bing Xia, Jianmin Pang, Jun Wang, Fudong Liu, Feng Yue:
Study on Binary Code Evolution with Concrete Semantic Analysis. ICPCSEE (2) 2021: 30-43 - [c33]Junchao Wang, Jianmin Pang, Jin Wei:
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud. ICPCSEE (2) 2021: 129-138 - [c32]Kai Nie
, Qinglei Zhou
, Hong Qian
, Jianmin Pang
, Jinlong Xu
, Yapeng Li
:
Parallel Region Reconstruction Technique for Sunway High-Performance Multi-core Processors. ICPCSEE (1) 2021: 163-179 - 2020
- [j14]Chaofeng Hou
, Chenglong Zhang, Wei Ge, Lei Wang, Lin Han, Jianmin Pang:
Record Atomistic Simulation of Crystalline Silicon: Bridging Microscale Structures and Macroscale Properties. J. Comput. Chem. 41(7): 731-738 (2020)
2010 – 2019
- 2019
- [j13]Jun Wang
, Jianmin Pang, Xiaonan Liu, Feng Yue, Jie Tan, Liguo Fu:
Dynamic Translation Optimization Method Based on Static Pre-Translation. IEEE Access 7: 21491-21501 (2019) - [j12]Xin Zhou, Jianmin Pang:
Expdf: Exploits Detection System Based on Machine-Learning. Int. J. Comput. Intell. Syst. 12(2): 1019-1028 (2019) - [j11]Xiaohan Tao, Jianmin Pang, Wei Gao, Qi Wang, Jinyang Yao:
基于SW26010处理器的FT程序的性能优化 (Performance Optimization of FT Program Based on SW26010 Processor). 计算机科学 46(4): 321-328 (2019) - [j10]Jiexin Zhang, Jianmin Pang, Zheng Zhang, Ming Tai, Hao Liu:
拟态构造Web服务器的服务质量量化方法 (QoS Quantification Method for Web Server with Mimic Construction). 计算机科学 46(11): 109-118 (2019) - [c31]Jianyun Zheng, Jianmin Pang, Xiaochuan Zhang, Xin Zhou, Mingliang Li, Jun Wang:
Recurrent Neural Network Based Binary Code Vulnerability Detection. ACAI 2019: 160-165 - [c30]Xiyue Chen, Jianmin Pang:
A Novelty Network Attack Detection Model based on Immunology. DSIT 2019: 187-196 - 2018
- [j9]Xiaochuan Zhang
, Jianmin Pang, Xiaonan Liu:
Common Program Similarity Metric Method for Anti-Obfuscation. IEEE Access 6: 47557-47565 (2018) - [j8]Yujia Zhang, Jianmin Pang, Zheng Zhang, Jiangxing Wu:
基于软件多样化的拟态安全防御策略 (Mimic Security Defence Strategy Based on Software Diversity). 计算机科学 45(2): 215-221 (2018) - [j7]Guanghui Liang
, Jianmin Pang
, Zheng Shan, Runqing Yang, Yihang Chen:
Automatic Benchmark Generation Framework for Malware Detection. Secur. Commun. Networks 2018: 4947695:1-4947695:8 (2018) - 2017
- [j6]Junchao Wang, Arie Taal, Paul Martin, Yang Hu, Huan Zhou, Jianmin Pang, Cees de Laat, Zhiming Zhao
:
Planning virtual infrastructures for time critical applications with multiple deadline constraints. Future Gener. Comput. Syst. 75: 365-375 (2017) - [j5]Jin Yang, Jianmin Pang, Ning Qi, Rui Liu:
一种面向云多层应用的费用高效的资源管理方法 (Cost-efficient Resource Management for Cloud Multi-tier Applications). 计算机科学 44(3): 73-78 (2017) - [c29]Jun Wang, Jianmin Pang, Liguo Fu, Zheng Shan, Feng Yue, Jiahao Zhang:
A Binary Translation Backend Registers Allocation Algorithm Based on Priority. GSKI (2) 2017: 414-425 - 2016
- [j4]Hong Bai, Jianmin Pang, Chao Dai, Feng Yue:
基于小波变换的木马心跳行为检测方法 (Trojans Keep-alive Behavior Detection Approach Based on Wavelet Transform). 计算机科学 43(4): 150-154 (2016) - [c28]Yujia Zhang, Jianmin Pang:
A New Compile-Time Obfuscation Scheme for Software Protection. CyberC 2016: 1-5 - 2015
- [j3]Jin Yang, Jianmin Pang, Junchao Wang, Jintao Yu, Rui Liu:
一种基于主动认知决策的高效能模型 (High-productivity Model Based on Proactive Cognition and Decision). 计算机科学 42(11): 68-72 (2015) - [c27]Jin Yang, Jianmin Pang, Jintao Yu, Wei Cao:
Ameba: A High-Performance and Energy-Efficient Online Video Retrieval System. BigMM 2015: 200-203 - [c26]Jin Yang, Jianmin Pang, Ning Qi, Tao Qi:
On-Demand Self-Adaptivity of Service Availability for Cloud Multi-tier Applications. CCGRID 2015: 1237-1240 - [c25]Xiaochuan Zhang, Jianmin Pang, Yujia Zhang, Guanghui Liang:
A Program Threat Judgement Model Based on Fuzzy Set Theory. ITITS (2) 2015: 221-233 - 2014
- [c24]Nan Li, Jianmin Pang, Zheng Shan:
Migration of CUDA Program Based on a Divide-and-Conquer Method. CSE 2014: 1685-1691 - 2013
- [c23]Xiaonan Liu, Rongcai Zhao, Jianmin Pang, Meijuan Yin, Zhenfang Wei:
Data recovery of user-defined procedures in binary translation. BMEI 2013: 634-638 - [c22]Feng Yue, Jianmin Pang, Jiuzhen Jin, Chao Dai:
Convergence and Scalarization in Whole Function Vectorization. DASC 2013: 536-539 - [c21]Xiaonan Liu, Rongcai Zhao, Jianmin Pang, Meijuan Yin, Lili Bai, Wuping Chen:
A flag simulation strategy based on fusion of semantic trees in binary translation. FSKD 2013: 1070-1074 - [c20]Feng Yue, Jianmin Pang, Rongcai Zhao, Chao Dai:
The Synchronization Treatment in Implementing Data-Parallel Programming Languages on CPUs. HPCC/EUC 2013: 1916-1921 - 2012
- [j2]Haoran Guo, Jianmin Pang, Jintao Yu, Zheng Shan:
MEGA: a real-time visualisation framework for large-scale terrain. Int. J. Simul. Process. Model. 7(1/2): 33-41 (2012) - [c19]Zheng Shan, Haoran Guo, Jianmin Pang:
BTMD: A Framework of Binary Translation Based Malcode Detector. CyberC 2012: 39-43 - [c18]Feng Yue, Jianmin Pang, Zheng Shan, Xiaonan Liu:
Variable optimization in code migration from GPU to multi-core. GrC 2012: 1-4 - 2011
- [c17]Jinxian Cui, Jianmin Pang, Zheng Shan, Xiaonan Liu:
The multi-threaded optimization of dynamic binary translation. FSKD 2011: 2432-2436
2000 – 2009
- 2009
- [c16]Qiang Wang, Jianmin Pang, Wen Fu, Feng Yue:
Graphical Annotation of Suspicious Behaviors. IFITA (3) 2009: 504-506 - [c15]Yichi Zhang, Jianmin Pang, Lili Bai, Wen Fu:
Static Analysis of Malware to Detect Exception Return. IFITA (3) 2009: 690-693 - 2008
- [c14]Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma:
Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. ACIS-ICIS 2008: 525-530 - [c13]Miao Wang, Rongcai Zhao, Jianmin Pang, Guoming Cai:
Reconstructing Control Flow in Modulo Scheduled Loops. ACIS-ICIS 2008: 539-544 - [c12]Wen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang:
Recovering Variable-Argument Functions from Binary Executables. ACIS-ICIS 2008: 545-550 - [c11]Jiuzhen Jin, Jianmin Pang, Zheng Shan, Rongcai Zhao:
Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPS. ACIS-ICIS 2008: 589-594 - [c10]Lin Han, Rongcai Zhao, Jianmin Pang:
A Consistency Combination Algorithm for Global Dynamic Computation and Data Decomposition. CISIS 2008: 148-154 - [c9]Jingbo Zhang, Wen Fu, Jianmin Pang, Rongcai Zhao:
Using Propositional Calculas to Accurately Structure Control-Flow from Binary Executables. CSSE (2) 2008: 338-341 - [c8]Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu:
Formal Abstraction of Semantics for Detecting Malicious Code. CSSE (2) 2008: 350-353 - [c7]Jianmin Pang, Jiuzhen Jin, Rongcai Zhao, Zheng Shan, Zheng Zhang:
Using Queuing Network to Evaluate IXP2400 Based VoIP SPS. ICNS 2008: 266-271 - 2007
- [c6]Jingbo Zhang, Rongcai Zhao, Jianmin Pang:
Parameter and Return-value Analysis of Binary Executables. COMPSAC (1) 2007: 501-508 - [c5]Wen Tu, Rongcai Zhao, Jianmin Pang, Bo Wei:
Research on the Recovery Technology of Floating-point Parameters in Binary Translation. IMECS 2007: 1163-1168 - [c4]Lin Han, Rongcai Zhao, Jianmin Pang:
Dynamic decomposition algorithm merging control flow analysis. PDPTA 2007: 245-249 - 2006
- [b1]Jianmin Pang:
LFTOP : An LF based approach to domain specific reasoning. Durham University, UK, 2006 - [c3]Yanan Shen, Rongcai Zhao, Jianmin Pang:
Automatic code generation of data decomposition. Infoscale 2006: 12 - [c2]Shanshan Wang, Rongcai Zhao, Jianmin Pang:
Improvement and Implementation of Accurate Array Data-Flow Analysis. PDPTA 2006: 620-629 - [c1]Xuemeng Zhang, Rongcai Zhao, Jianmin Pang:
Semantic Abstraction of IA-64 Multimedia Instructions. SKG 2006: 91 - 2005
- [j1]Jianmin Pang, Paul Callaghan, Zhaohui Luo:
LFTOP: An LF-Based Approach to Domain-Specific Reasoning. J. Comput. Sci. Technol. 20(4): 526-535 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint