Calculated based on number of publications stored in Pure and citations from Scopus
20092025

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Directed Fuzzing Based on Bottleneck Detection

    Wan, Y., Wang, W., Sun, J. & Tian, D., 24 May 2024, CNIOT 2024 - Conference Proceeding, 2024 5th International Conference on Computing, Networks and Internet of Things. Association for Computing Machinery, p. 32-37 6 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    MOAFL: Potential Seed Selection with Multi-Objective Particle Swarm Optimization

    Jiang, J., Ma, R., Wang, X., He, J., Tian, D. & Li, J., 16 Dec 2021, 2021 7th International Conference on Communication and Information Processing, ICCIP 2021. Association for Computing Machinery, p. 26-31 6 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2020

    VCPEC: Vulnerability correlation analysis based on privilege escalation and coritivity theory

    Wang, X., Ma, R., Tian, D. & Wang, X., 27 Nov 2020, ICCNS 2020 - 2020 10th International Conference on Communication and Network Security. Association for Computing Machinery, p. 99-108 10 p. 3442526. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2018

    Binary Obfuscation Based Reassemble

    Wang, C., Zhang, Z., Jia, X. & Tian, D., 2 Jul 2018, MALWARE 2018 - Proceedings of the 2018 13th International Conference on Malicious and Unwanted Software. Institute of Electrical and Electronics Engineers Inc., p. 153-160 8 p. 8659363. (MALWARE 2018 - Proceedings of the 2018 13th International Conference on Malicious and Unwanted Software).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • FindEvasion: An effective environment-sensitive malware detection system for the cloud

    Jia, X., Zhou, G., Huang, Q., Zhang, W. & Tian, D., 2018, Digital Forensics and Cyber Crime - 9th International Conference, ICDF2C 2017, Proceedings. Schmiedecker, M. & Matousek, P. (eds.). Springer Verlag, p. 3-17 15 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • 2017

    An online approach to defeating return-oriented-programming attacks

    Tian, D., Jia, X., Zhan, L., Hu, C. & Xue, J., 2017, Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Proceedings. Wu, W., Castiglione, A. & Wen, S. (eds.). Springer Verlag, p. 236-247 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10581 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • A practical method to confine sensitive API invocations on commodity hardware

    Tian, D., Qi, D., Zhan, L., Yin, Y., Hu, C. & Xue, J., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 145-159 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2016

    Dynamic tracking reinforcement based on simplified control flow

    Li, J., Tian, D. & Hu, C., 1 Feb 2016, Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 358-362 5 p. 7397107. (Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    SA3: Automatic semantic aware attribution analysis of remote exploits

    Kong, D., Tian, D., Liu, P. & Wu, D., 2012, Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, Revised Selected Papers. p. 190-208 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 96 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2011

    Integrating offline analysis and online protection to defeat buffer overflow attacks

    Tian, D., Xiong, X., Hu, C. & Liu, P., 2011, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Springer Verlag, p. 409-415 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6531 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Policy-centric protection of OS kernel from vulnerable loadable kernel modules

    Tian, D., Xiong, X., Hu, C. & Liu, P., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 317-332 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2010

    Protecting kernel data through virtualization technology

    Tian, D., Kong, D., Changzhen, H. & Liu, P., 2010, Proceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010. p. 5-10 6 p. 5632294. (Proceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    Hierarchical distributed alert correlation model

    Tian, D., Changzhen, H., Qi, Y. & Jianqiao, W., 2009, 5th International Conference on Information Assurance and Security, IAS 2009. IEEE Computer Society, p. 766-769 4 p. 5284086. (5th International Conference on Information Assurance and Security, IAS 2009; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)