Follow
Jian Liu
Title
Cited by
Cited by
Year
Libd: Scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1462017
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
International conference on security and privacy in communication systems …, 2018
1062018
Three-dimensional assemblies of carbon nitride tubes as nanoreactors for enhanced photocatalytic hydrogen production
C Zhao, Q Li, Y Xie, L Zhang, X Xiao, D Wang, Y Jiao, CAH Price, B Jiang, ...
Journal of Materials Chemistry A 8 (1), 305-312, 2020
652020
Porous Carbon Nitride Thin Strip: Precise Carbon Doping Regulating Delocalized π‐Electron Induces Elevated Photocatalytic Hydrogen Evolution
Q Li, L Zhang, J Liu, J Zhou, Y Jiao, X Xiao, C Zhao, Y Zhou, S Ye, B Jiang, ...
Small 17 (11), 2006622, 2021
422021
A deployable sampling strategy for data race detection
Y Cai, J Zhang, L Cao, J Liu
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
342016
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
292017
Eliminating path redundancy via postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
IEEE Transactions on Software Engineering 44 (1), 25-43, 2017
282017
Postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
2015 IEEE 8th International Conference on Software Testing, Verification and …, 2015
282015
A session-packets-based encrypted traffic classification using capsule neural networks
S Cui, B Jiang, Z Cai, Z Lu, S Liu, J Liu
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
252019
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network
F Ren, Z Jiang, X Wang, J Liu
Cybersecurity 3 (1), 1-13, 2020
242020
A synergistic analysis method for explaining failed regression tests
Q Yi, Z Yang, J Liu, C Zhao, C Wang
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
212015
Towards network anomaly detection using graph embedding
Q Xiao, J Liu, Q Wang, Z Jiang, X Wang, Y Yao
International Conference on Computational Science, 156-169, 2020
202020
Nonmuscle myosin heavy chain IIA facilitates SARS-CoV-2 infection in human pulmonary cells
J Chen, J Fan, Z Chen, M Zhang, H Peng, J Liu, L Ding, M Liu, C Zhao, ...
Proceedings of the National Academy of Sciences 118 (50), e2111011118, 2021
162021
Large-scale third-party library detection in Android markets
M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou
IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018
122018
Explaining software failures by cascade fault localization
Q Yi, Z Yang, J Liu, C Zhao, C Wang
ACM Transactions on Design Automation of Electronic Systems (TODAES) 20 (3 …, 2015
122015
Nitrogen vacancy-rich porous carbon nitride nanosheets for efficient photocatalytic H2O2 production
C Zhao, C Shi, Q Li, X Wang, G Zeng, S Ye, B Jiang, J Liu
Materials Today Energy 24, 100926, 2022
112022
A bi-directional lstm model with attention for malicious url detection
F Ren, Z Jiang, J Liu
2019 IEEE 4th Advanced Information Technology, Electronic and Automation …, 2019
92019
Tainting-assisted and context-migrated symbolic execution of Android framework for vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019
92019
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
X Wang, X Gong, L Yu, J Liu
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
72021
Context-aware system service call-oriented symbolic execution of android framework with application to exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
arXiv preprint arXiv:1611.00837, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20