Follow
liang cheng
Title
Cited by
Cited by
Year
Optimizing seed inputs in fuzzing with machine learning
L Cheng, Y Zhang, Y Zhang, C Wu, Z Li, Y Fu, H Li
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
282019
Improving accuracy of static integer overflow detection in binary
Y Zhang, X Sun, Y Deng, L Cheng, S Zeng, Y Fu, D Feng
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
222015
基于犝犕犔和模型检测的安全模型验证方法
程亮, 张阳
计算机学报 32 (4), 2009
142009
Protecting interoperable clinical environment with authentication
L Cheng, Z Li, Y Zhang, Y Zhang, I Lee
ACM SIGBED Review 14 (2), 34-43, 2017
102017
Systematic analysis and detection of misconfiguration vulnerabilities in android smartphones
Z Han, L Cheng, Y Zhang, S Zeng, Y Deng, X Sun
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
102014
A covert timing channel via algorithmic complexity attacks: Design and analysis
X Sun, L Cheng, Y Zhang
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
62011
Model checking security policy model using both UML static and dynamic diagrams
L Cheng, Y Zhang
Proceedings of the 4th International Conference on Security of Information …, 2011
52011
Evaluating and comparing the quality of access control in different operating systems
L Cheng, Y Zhang, Z Han, Y Deng, X Sun, D Feng
Computers & security 47, 26-40, 2014
32014
Quantitatively measure access control mechanisms across different operating systems
L Cheng, Y Zhang, Z Han
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
32013
Measuring and comparing the protection quality in different operating systems
Z Han, L Cheng, Y Zhang, D Feng
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
32013
一种基于安全状态转移的简并测试集生成方法
程亮, 张阳, 冯登国
软件学报 21 (3), 539-547, 2010
32010
A new property verification method for code security based on pointer logic
Y Zhang, L Cheng
Chinese Journal of Computers 32 (6), 1119-1125, 2009
32009
Refining the pointer analysis by exploiting constraints on the cfl-paths
X Sun, L Cheng, Y Zhang, Y Deng, J Hou
2013 20th Asia-Pacific Software Engineering Conference (APSEC) 1, 17-24, 2013
22013
Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability
D Chen, Y Zhang, L Cheng, Y Deng, X Sun
2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013
22013
Static integer overflow vulnerability detection in windows binary
Y Deng, Y Zhang, L Cheng, X Sun
Advances in Information and Computer Security: 8th International Workshop on …, 2013
22013
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System
Z Li, L Cheng, Y Zhang, D Feng
Wireless Algorithms, Systems, and Applications: 16th International …, 2021
12021
Improving the effectiveness of grey-box fuzzing by extracting program information
Y Fu, S Tong, X Guo, L Cheng, Y Zhang, D Feng
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
12020
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Z Li, L Cheng, Y Zhang
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
12019
Operating System Security Policy Hardening via Capability Dependency Graphs
Z Han, L Cheng, Y Zhang, D Feng
Information Security Practice and Experience: 11th International Conference …, 2015
12015
Mitigating network-layer security attacks on authentication-enhanced OpenICE
Z Li, L Cheng, Y Zhang
ACM SIGBED Review 16 (2), 14-23, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20