default search action
Hongliang Liang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Dongyu Ma, Zeyu Liang, Luming Yin, Hongliang Liang:
Symbolic testing of floating-point bugs and exceptions. J. Syst. Softw. 219: 112226 (2025) - 2024
- [j15]Hongliang Liang, Xiangyu Li, Da Xiao, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. IEEE Trans. Dependable Secur. Comput. 21(1): 309-324 (2024) - [j14]Hongliang Liang, Xinglin Yu, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. IEEE Trans. Dependable Secur. Comput. 21(1): 325-339 (2024) - [c38]Xinglin Yu, Hongliang Liang, Chunlin Wang:
Multiple Targets Directed Greybox Fuzzing: From Reachable to Exploited. SANER 2024: 907-917 - 2023
- [c37]Chunlin Wang, Hongliang Liang:
Value Peripheral Register Values for Fuzzing MCU Firmware. ISSRE 2023: 718-729 - 2022
- [j13]Da Xiao, Dengji Hang, Lu Ai, Shengping Li, Hongliang Liang:
Path context augmented statement and network for learning programs. Empir. Softw. Eng. 27(2): 37 (2022) - [j12]Hongliang Liang, Dengji Hang, Xiangyu Li:
Modeling function-level interactions for file-level bug localization. Empir. Softw. Eng. 27(7): 186 (2022) - [c36]Jie Liu, Hang An, Jin Li, Hongliang Liang:
DEPA: Determining Exploit Primitives Automatically for Interactive Programs. EITCE 2022: 690-694 - [c35]Xiantong Hao, Dandan Ma, Hongliang Liang:
Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps. SecureComm 2022: 569-587 - [i3]Hongliang Liang, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. CoRR abs/2206.14977 (2022) - [i2]Jie Liu, Hang An, Jin Li, Hongliang Liang:
Detecting Exploit Primitives Automatically for Heap Vulnerabilities on Binary Programs. CoRR abs/2212.13990 (2022) - 2021
- [j11]Zhen Li, Yao-Lin Jiang, Hongliang Liang:
Parametric model order reduction based on parallel tensor compression. Int. J. Syst. Sci. 52(11): 2201-2216 (2021) - [j10]Hongliang Liang, Mingyu Li, Yixiu Chen, Tianqi Yang, Zhuosi Xie, Lin Jiang:
Architectural Protection of Trusted System Services for SGX Enclaves in Cloud Computing. IEEE Trans. Cloud Comput. 9(3): 910-922 (2021) - [c34]Xiao Liang, Weiying Hou, Hongzheng Li, Hongliang Liang:
An Undergraduate Course for FOSS and with FOSS. ICEEL 2021: 161-167 - [c33]Hongliang Liang, Lu Ai:
AST-path Based Compare-Aggregate Network for Code Clone Detection. IJCNN 2021: 1-8 - 2020
- [j9]Hongliang Liang, Zhuosi Xie, Yixiu Chen, Hua Ning, Jianli Wang:
FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching. Comput. Secur. 99: 102032 (2020) - [j8]Hongliang Liang, Mingyu Li, Yixiu Chen, Lin Jiang, Zhuosi Xie, Tianqi Yang:
Establishing Trusted I/O Paths for SGX Client Systems With Aurora. IEEE Trans. Inf. Forensics Secur. 15: 1589-1600 (2020) - [c32]Hongliang Liang, Wenqing Yu, Lu Ai, Lin Jiang:
A Practical Concolic Execution Technique for Large Scale Software Systems. EASE 2020: 312-317 - [c31]Hongliang Liang, Yixiu Chen, Zhuosi Xie, Zhiyi Liang:
X-AFL: a kernel fuzzer combining passive and active fuzzing. EuroSec@EuroSys 2020: 13-18 - [c30]Hongliang Liang, Mingyue Li, Jianli Wang:
Automated data race bugs addition. EuroSec@EuroSys 2020: 37-42 - [c29]Rundong Li, Hongliang Liang, Liming Liu, Xutong Ma, Rong Qu, Jun Yan, Jian Zhang:
GTFuzz: Guard Token Directed Grey-Box Fuzzing. PRDC 2020: 160-170 - [c28]Hongliang Liang, Lin Jiang, Lu Ai, Jinyi Wei:
Sequence Directed Hybrid Fuzzing. SANER 2020: 127-137
2010 – 2019
- 2019
- [j7]Hongliang Liang, Yue Yu, Lin Jiang, Zhuosi Xie:
Seml: A Semantic LSTM Model for Software Defect Prediction. IEEE Access 7: 83812-83824 (2019) - [j6]Hongliang Liang, Lu Sun, Meilin Wang, Yuxing Yang:
Deep Learning With Customized Abstract Syntax Tree for Bug Localization. IEEE Access 7: 116309-116320 (2019) - [c27]Hongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie:
Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably. APSEC 2019: 434-441 - [c26]Hongliang Liang, Yuxing Yang, Lu Sun, Lin Jiang:
JSAC: A Novel Framework to Detect Malicious JavaScript via CNNs over AST and CFG. IJCNN 2019: 1-8 - [c25]Hongliang Liang, Qiong Zhang, Mingyu Li, Jianqiang Li:
Toward Migration of SGX-Enabled Containers. ISCC 2019: 1-6 - [c24]Hongliang Liang, Yini Zhang, Yue Yu, Zhuosi Xie, Lin Jiang:
Sequence coverage directed greybox fuzzing. ICPC 2019: 249-259 - 2018
- [j5]Jiuyun Xu, Shuang Liu, Xiaoxuan Lu, Li Li, Hongliang Liang, Qiang Duan, Runjie Liu:
A Temporal Adaptive Access Mechanism for Data Fusion in an IoT Environment. Sensors 18(12): 4205 (2018) - [j4]Hongliang Liang, Xiaoxiao Pei, Xiaodong Jia, Wuwei Shen, Jian Zhang:
Fuzzing: State of the Art. IEEE Trans. Reliab. 67(3): 1199-1218 (2018) - [c23]Hongliang Liang, Mingyu Li:
Bring the Missing Jigsaw Back: TrustedClock for SGX Enclaves. EuroSec@EuroSys 2018: 8:1-8:6 - [c22]Hongliang Liang, Wenying Hu, Yini Zhang, Lin Jiang, Wuwei Shen:
USE: unified and split execution for exposing divergences between versions. ICSE (Companion Volume) 2018: 386-387 - [c21]Hongliang Liang, Yudong Wang, Tianqi Yang, Yue Yu:
AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications. NordSec 2018: 54-70 - [i1]Hongliang Liang, Mingyu Li, Qiong Zhang, Yue Yu, Lin Jiang, Yixiu Chen:
Aurora: Providing Trusted System Services for Enclaves On an Untrusted System. CoRR abs/1802.03530 (2018) - 2017
- [j3]Hongliang Liang, Mingyu Li, Jian Xu, Wenying Hu, Xiaoxiao Pei, Xiaodong Jia, Yan Song:
vmOS: A virtualization-based, secure desktop system. Comput. Secur. 65: 329-343 (2017) - [c20]Hongliang Liang, Yuying Wang, Huayang Cao, Jiajie Wang:
Fuzzing the Font Parser of Compound Documents. CSCloud 2017: 237-242 - [c19]Hongliang Liang, Zhengyu Li, Minhuan Huang, Xiaoxiao Pei:
A Novel Method Makes Concolic System More Effective. CSCloud 2017: 243-248 - [c18]Hongliang Liang, Yan Song, Da Xiao:
An end-to-end model for Android malware detection. ISI 2017: 140-142 - [c17]Hongliang Liang, Shirun Liu, Yini Zhang, Meilin Wang:
Improving the precision of static analysis: Symbolic execution based on GCC abstract syntax tree. SNPD 2017: 395-400 - [c16]Wuwei Shen, Guangyuan Li, Chung-Ling Lin, Hongliang Liang:
Foundation of a Framework to Support Compliance Checking in Construction Industry. SOFL+MSVL 2017: 111-122 - 2016
- [j2]Hongliang Liang, Dongyang Wu, Shirun Liu, Hao Dai, Haifeng Liu:
Providing Privacy Protection and Personalization Awareness for Android Devices. Int. J. Distributed Sens. Networks 12(9): 4645256 (2016) - [j1]Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu:
MLSA: a static bugs analysis tool based on LLVM IR. Int. J. Networked Distributed Comput. 4(3): 137-144 (2016) - [c15]Hongliang Liang, Daijie Zhang, Xiaoxiao Pei, Xiaodong Jia, Guangyuan Li, Jiuyun Xu:
A Correctness Verification Method for C Programs Based on VCC. CSCloud 2016: 172-177 - [c14]Hongliang Liang, Hao Dai, Xiaoxiao Pei, Qiong Zhang:
A New Pre-copy Strategy for Live Migration of Virtual Machines. IIKI 2016: 54-59 - [c13]Hongliang Liang, Qichen Hao, Mingyu Li, Yini Zhang:
Semantics-Based Anomaly Detection of Processes in Linux Containers. IIKI 2016: 60-63 - [c12]Hongliang Liang, Daijie Zhang, Xiaodong Jia, Xiaoxiao Pei, Guangyuan Li:
Verifying RTuinOS using VCC: From approach to practice. SNPD 2016: 373-378 - [c11]Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu:
MLSA: A static bugs analysis tool based on LLVM IR. SNPD 2016: 407-412 - [c10]Hongliang Liang, Qian Zhao, Yuying Wang, Haifeng Liu:
Understanding and detecting performance and security bugs in IOT OSes. SNPD 2016: 413-418 - 2015
- [c9]Xuefei Wang, Hengtai Ma, Ke Yang, Hongliang Liang:
An Uneven Distributed System for Dynamic Taint Analysis Framework. CSCloud 2015: 237-240 - [c8]Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma:
Survey on Privacy Protection of Android Devices. CSCloud 2015: 241-246 - [c7]Hongliang Liang, Hongyan Cui:
The Relation of Energy-Consumption and the Population of People. CyberC 2015: 169-175 - [c6]Hongliang Liang, Dongyang Wu, Yan Song, Daijie Zhang, Lingqing Xia:
PAPDroid: Personalization Awareness Privacy Protection in Android. IIKI 2015: 122-125 - 2014
- [c5]Yongle Hao, Hongliang Liang, Daijie Zhang, Qian Zhao, Baojiang Cui:
JavaScript Malicious Codes Analysis Based on Naive Bayes Classification. 3PGCIC 2014: 513-519 - [c4]Hongliang Liang, Changyao Han, Daijie Zhang, Dongyang Wu:
A Lightweight Security Isolation Approach for Virtual Machines Deployment. Inscrypt 2014: 516-529 - 2013
- [c3]Hongliang Liang, Yu Dong, Bin Wang, Shuchang Liu:
EAdroid: Providing Environment Adaptive Security for Android System. Inscrypt 2013: 118-131
2000 – 2009
- 2009
- [c2]Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang:
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. ISPEC 2009: 83-92 - 2005
- [c1]Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang:
Security On-demand Architecture with Multiple Modules Support. ISPEC 2005: 121-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint