BibTeX records: Hongliang Liang

download as .bib file

@article{DBLP:journals/jss/MaLYL25,
  author       = {Dongyu Ma and
                  Zeyu Liang and
                  Luming Yin and
                  Hongliang Liang},
  title        = {Symbolic testing of floating-point bugs and exceptions},
  journal      = {J. Syst. Softw.},
  volume       = {219},
  pages        = {112226},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.jss.2024.112226},
  doi          = {10.1016/J.JSS.2024.112226},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/MaLYL25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/LiangYHLS25,
  author       = {Hongliang Liang and
                  Luming Yin and
                  Wenying Hu and
                  Yuxiang Li and
                  Wuwei Shen},
  title        = {Unified and Split Symbolic Execution for Exposing Semantic Differences},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {34},
  number       = {6},
  pages        = {168:1--168:27},
  year         = {2025},
  url          = {https://doi.org/10.1145/3705299},
  doi          = {10.1145/3705299},
  timestamp    = {Thu, 07 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/LiangYHLS25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/NiXMLZL25,
  author       = {Ruikang Ni and
                  Da Xiao and
                  Qingye Meng and
                  Xiangyu Li and
                  Shihui Zheng and
                  Hongliang Liang},
  editor       = {Toby Walsh and
                  Julie Shah and
                  Zico Kolter},
  title        = {Benchmarking and Understanding Compositional Relational Reasoning
                  of LLMs},
  booktitle    = {AAAI-25, Sponsored by the Association for the Advancement of Artificial
                  Intelligence, February 25 - March 4, 2025, Philadelphia, PA, {USA}},
  pages        = {19703--19711},
  publisher    = {{AAAI} Press},
  year         = {2025},
  url          = {https://doi.org/10.1609/aaai.v39i18.34170},
  doi          = {10.1609/AAAI.V39I18.34170},
  timestamp    = {Thu, 17 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/NiXMLZL25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2504-04422,
  author       = {Hongliang Liang and
                  Luming Yin and
                  Guohao Wu and
                  Yuxiang Li and
                  Qiuping Yi and
                  Lei Wang},
  title        = {LeakGuard: Detecting Memory Leaks Accurately and Scalably},
  journal      = {CoRR},
  volume       = {abs/2504.04422},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2504.04422},
  doi          = {10.48550/ARXIV.2504.04422},
  eprinttype    = {arXiv},
  eprint       = {2504.04422},
  timestamp    = {Mon, 19 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2504-04422.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiangLXLZWL24,
  author       = {Hongliang Liang and
                  Xiangyu Li and
                  Da Xiao and
                  Jie Liu and
                  Yanjie Zhou and
                  Aibo Wang and
                  Jin Li},
  title        = {Generative Pre-Trained Transformer-Based Reinforcement Learning for
                  Testing Web Application Firewalls},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {309--324},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3252523},
  doi          = {10.1109/TDSC.2023.3252523},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiangLXLZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiangYCLL24,
  author       = {Hongliang Liang and
                  Xinglin Yu and
                  Xianglin Cheng and
                  Jie Liu and
                  Jin Li},
  title        = {Multiple Targets Directed Greybox Fuzzing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {325--339},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253120},
  doi          = {10.1109/TDSC.2023.3253120},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiangYCLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/YuLW24,
  author       = {Xinglin Yu and
                  Hongliang Liang and
                  Chunlin Wang},
  title        = {Multiple Targets Directed Greybox Fuzzing: From Reachable to Exploited},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2024, Rovaniemi, Finland, March 12-15, 2024},
  pages        = {907--917},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SANER60148.2024.00099},
  doi          = {10.1109/SANER60148.2024.00099},
  timestamp    = {Tue, 30 Jul 2024 11:08:59 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/YuLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2412-12841,
  author       = {Ruikang Ni and
                  Da Xiao and
                  Qingye Meng and
                  Xiangyu Li and
                  Shihui Zheng and
                  Hongliang Liang},
  title        = {Benchmarking and Understanding Compositional Relational Reasoning
                  of LLMs},
  journal      = {CoRR},
  volume       = {abs/2412.12841},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2412.12841},
  doi          = {10.48550/ARXIV.2412.12841},
  eprinttype    = {arXiv},
  eprint       = {2412.12841},
  timestamp    = {Tue, 21 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2412-12841.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/WangL23,
  author       = {Chunlin Wang and
                  Hongliang Liang},
  title        = {Value Peripheral Register Values for Fuzzing {MCU} Firmware},
  booktitle    = {34th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2023, Florence, Italy, October 9-12, 2023},
  pages        = {718--729},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISSRE59848.2023.00061},
  doi          = {10.1109/ISSRE59848.2023.00061},
  timestamp    = {Tue, 14 Nov 2023 16:09:47 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/WangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/XiaoHALL22,
  author       = {Da Xiao and
                  Dengji Hang and
                  Lu Ai and
                  Shengping Li and
                  Hongliang Liang},
  title        = {Path context augmented statement and network for learning programs},
  journal      = {Empir. Softw. Eng.},
  volume       = {27},
  number       = {2},
  pages        = {37},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10664-021-10098-y},
  doi          = {10.1007/S10664-021-10098-Y},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ese/XiaoHALL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/LiangHL22,
  author       = {Hongliang Liang and
                  Dengji Hang and
                  Xiangyu Li},
  title        = {Modeling function-level interactions for file-level bug localization},
  journal      = {Empir. Softw. Eng.},
  volume       = {27},
  number       = {7},
  pages        = {186},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10664-022-10237-z},
  doi          = {10.1007/S10664-022-10237-Z},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/LiangHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/LiuALL22,
  author       = {Jie Liu and
                  Hang An and
                  Jin Li and
                  Hongliang Liang},
  title        = {{DEPA:} Determining Exploit Primitives Automatically for Interactive
                  Programs},
  booktitle    = {Proceedings of the 2022 6th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2022, Xiamen,
                  China, October 21-23, 2022},
  pages        = {690--694},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573428.3573550},
  doi          = {10.1145/3573428.3573550},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eitce/LiuALL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HaoML22,
  author       = {Xiantong Hao and
                  Dandan Ma and
                  Hongliang Liang},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Detection and Privacy Leakage Analysis of Third-Party Libraries in
                  Android Apps},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {569--587},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_30},
  doi          = {10.1007/978-3-031-25538-0\_30},
  timestamp    = {Thu, 12 Dec 2024 08:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/HaoML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14977,
  author       = {Hongliang Liang and
                  Xianglin Cheng and
                  Jie Liu and
                  Jin Li},
  title        = {Multiple Targets Directed Greybox Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2206.14977},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14977},
  doi          = {10.48550/ARXIV.2206.14977},
  eprinttype    = {arXiv},
  eprint       = {2206.14977},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14977.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-13990,
  author       = {Jie Liu and
                  Hang An and
                  Jin Li and
                  Hongliang Liang},
  title        = {Detecting Exploit Primitives Automatically for Heap Vulnerabilities
                  on Binary Programs},
  journal      = {CoRR},
  volume       = {abs/2212.13990},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.13990},
  doi          = {10.48550/ARXIV.2212.13990},
  eprinttype    = {arXiv},
  eprint       = {2212.13990},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-13990.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsysc/LiJL21,
  author       = {Zhen Li and
                  Yao{-}Lin Jiang and
                  Hongliang Liang},
  title        = {Parametric model order reduction based on parallel tensor compression},
  journal      = {Int. J. Syst. Sci.},
  volume       = {52},
  number       = {11},
  pages        = {2201--2216},
  year         = {2021},
  url          = {https://doi.org/10.1080/00207721.2021.1880665},
  doi          = {10.1080/00207721.2021.1880665},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsysc/LiJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiangLC0XJ21,
  author       = {Hongliang Liang and
                  Mingyu Li and
                  Yixiu Chen and
                  Tianqi Yang and
                  Zhuosi Xie and
                  Lin Jiang},
  title        = {Architectural Protection of Trusted System Services for {SGX} Enclaves
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {3},
  pages        = {910--922},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2019.2892449},
  doi          = {10.1109/TCC.2019.2892449},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/LiangLC0XJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceel/LiangHLL21,
  author       = {Xiao Liang and
                  Weiying Hou and
                  Hongzheng Li and
                  Hongliang Liang},
  title        = {An Undergraduate Course for {FOSS} and with {FOSS}},
  booktitle    = {{ICEEL} 2021: 5th International Conference on Education and E-Learning,
                  Virtual Event, Japan, November 5 - 7, 2021},
  pages        = {161--167},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3502434.3502465},
  doi          = {10.1145/3502434.3502465},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceel/LiangHLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/LiangA21,
  author       = {Hongliang Liang and
                  Lu Ai},
  title        = {AST-path Based Compare-Aggregate Network for Code Clone Detection},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9534099},
  doi          = {10.1109/IJCNN52387.2021.9534099},
  timestamp    = {Wed, 29 Sep 2021 17:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/LiangA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangXCNW20,
  author       = {Hongliang Liang and
                  Zhuosi Xie and
                  Yixiu Chen and
                  Hua Ning and
                  Jianli Wang},
  title        = {{FIT:} Inspect vulnerabilities in cross-architecture firmware by deep
                  learning and bipartite matching},
  journal      = {Comput. Secur.},
  volume       = {99},
  pages        = {102032},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.102032},
  doi          = {10.1016/J.COSE.2020.102032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangXCNW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiangLCJXY20,
  author       = {Hongliang Liang and
                  Mingyu Li and
                  Yixiu Chen and
                  Lin Jiang and
                  Zhuosi Xie and
                  Tianqi Yang},
  title        = {Establishing Trusted {I/O} Paths for {SGX} Client Systems With Aurora},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1589--1600},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2945621},
  doi          = {10.1109/TIFS.2019.2945621},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiangLCJXY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ease/LiangYAJ20,
  author       = {Hongliang Liang and
                  Wenqing Yu and
                  Lu Ai and
                  Lin Jiang},
  editor       = {Jingyue Li and
                  Letizia Jaccheri and
                  Torgeir Dings{\o}yr and
                  Ruzanna Chitchyan},
  title        = {A Practical Concolic Execution Technique for Large Scale Software
                  Systems},
  booktitle    = {{EASE} '20: Evaluation and Assessment in Software Engineering, Trondheim,
                  Norway, April 15-17, 2020},
  pages        = {312--317},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3383219.3383254},
  doi          = {10.1145/3383219.3383254},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ease/LiangYAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/LiangCXL20,
  author       = {Hongliang Liang and
                  Yixiu Chen and
                  Zhuosi Xie and
                  Zhiyi Liang},
  editor       = {Lorenzo Cavallaro and
                  Andrea Lanzi},
  title        = {{X-AFL:} a kernel fuzzer combining passive and active fuzzing},
  booktitle    = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys
                  2020, Heraklion, Greece, April 27, 2020},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380786.3391400},
  doi          = {10.1145/3380786.3391400},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/LiangCXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/LiangLW20,
  author       = {Hongliang Liang and
                  Mingyue Li and
                  Jianli Wang},
  editor       = {Lorenzo Cavallaro and
                  Andrea Lanzi},
  title        = {Automated data race bugs addition},
  booktitle    = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys
                  2020, Heraklion, Greece, April 27, 2020},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380786.3391401},
  doi          = {10.1145/3380786.3391401},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/LiangLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/LiLLMQYZ20,
  author       = {Rundong Li and
                  Hongliang Liang and
                  Liming Liu and
                  Xutong Ma and
                  Rong Qu and
                  Jun Yan and
                  Jian Zhang},
  title        = {GTFuzz: Guard Token Directed Grey-Box Fuzzing},
  booktitle    = {25th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2020, Perth, Australia, December 1-4, 2020},
  pages        = {160--170},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/PRDC50213.2020.00027},
  doi          = {10.1109/PRDC50213.2020.00027},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/LiLLMQYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/LiangJAW20,
  author       = {Hongliang Liang and
                  Lin Jiang and
                  Lu Ai and
                  Jinyi Wei},
  editor       = {Kostas Kontogiannis and
                  Foutse Khomh and
                  Alexander Chatzigeorgiou and
                  Marios{-}Eleftherios Fokaefs and
                  Minghui Zhou},
  title        = {Sequence Directed Hybrid Fuzzing},
  booktitle    = {27th {IEEE} International Conference on Software Analysis, Evolution
                  and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21,
                  2020},
  pages        = {127--137},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SANER48275.2020.9054807},
  doi          = {10.1109/SANER48275.2020.9054807},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/LiangJAW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiangYJX19,
  author       = {Hongliang Liang and
                  Yue Yu and
                  Lin Jiang and
                  Zhuosi Xie},
  title        = {Seml: {A} Semantic {LSTM} Model for Software Defect Prediction},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {83812--83824},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2925313},
  doi          = {10.1109/ACCESS.2019.2925313},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiangYJX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiangSWY19,
  author       = {Hongliang Liang and
                  Lu Sun and
                  Meilin Wang and
                  Yuxing Yang},
  title        = {Deep Learning With Customized Abstract Syntax Tree for Bug Localization},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {116309--116320},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2936948},
  doi          = {10.1109/ACCESS.2019.2936948},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiangSWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/LiangYJCX19,
  author       = {Hongliang Liang and
                  Tianqi Yang and
                  Lin Jiang and
                  Yixiu Chen and
                  Zhuosi Xie},
  title        = {Witness: Detecting Vulnerabilities in Android Apps Extensively and
                  Verifiably},
  booktitle    = {26th Asia-Pacific Software Engineering Conference, {APSEC} 2019, Putrajaya,
                  Malaysia, December 2-5, 2019},
  pages        = {434--441},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/APSEC48747.2019.00065},
  doi          = {10.1109/APSEC48747.2019.00065},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsec/LiangYJCX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/LiangYSJ19,
  author       = {Hongliang Liang and
                  Yuxing Yang and
                  Lu Sun and
                  Lin Jiang},
  title        = {{JSAC:} {A} Novel Framework to Detect Malicious JavaScript via CNNs
                  over {AST} and {CFG}},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
                  Hungary, July 14-19, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IJCNN.2019.8851760},
  doi          = {10.1109/IJCNN.2019.8851760},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/LiangYSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LiangZLL19,
  author       = {Hongliang Liang and
                  Qiong Zhang and
                  Mingyu Li and
                  Jianqiang Li},
  title        = {Toward Migration of SGX-Enabled Containers},
  booktitle    = {2019 {IEEE} Symposium on Computers and Communications, {ISCC} 2019,
                  Barcelona, Spain, June 29 - July 3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISCC47284.2019.8969644},
  doi          = {10.1109/ISCC47284.2019.8969644},
  timestamp    = {Tue, 04 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/LiangZLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/LiangZYXJ19,
  author       = {Hongliang Liang and
                  Yini Zhang and
                  Yue Yu and
                  Zhuosi Xie and
                  Lin Jiang},
  editor       = {Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and
                  Foutse Khomh and
                  Federica Sarro},
  title        = {Sequence coverage directed greybox fuzzing},
  booktitle    = {Proceedings of the 27th International Conference on Program Comprehension,
                  {ICPC} 2019, Montreal, QC, Canada, May 25-31, 2019},
  pages        = {249--259},
  publisher    = {{IEEE} / {ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICPC.2019.00044},
  doi          = {10.1109/ICPC.2019.00044},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwpc/LiangZYXJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/XuLLLLDL18,
  author       = {Jiuyun Xu and
                  Shuang Liu and
                  Xiaoxuan Lu and
                  Li Li and
                  Hongliang Liang and
                  Qiang Duan and
                  Runjie Liu},
  title        = {A Temporal Adaptive Access Mechanism for Data Fusion in an IoT Environment},
  journal      = {Sensors},
  volume       = {18},
  number       = {12},
  pages        = {4205},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18124205},
  doi          = {10.3390/S18124205},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/XuLLLLDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LiangPJSZ18,
  author       = {Hongliang Liang and
                  Xiaoxiao Pei and
                  Xiaodong Jia and
                  Wuwei Shen and
                  Jian Zhang},
  title        = {Fuzzing: State of the Art},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {67},
  number       = {3},
  pages        = {1199--1218},
  year         = {2018},
  url          = {https://doi.org/10.1109/TR.2018.2834476},
  doi          = {10.1109/TR.2018.2834476},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/LiangPJSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/LiangL18,
  author       = {Hongliang Liang and
                  Mingyu Li},
  editor       = {Angelos Stavrou and
                  Konrad Rieck},
  title        = {Bring the Missing Jigsaw Back: TrustedClock for {SGX} Enclaves},
  booktitle    = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys
                  2018, Porto, Portugal, April 23, 2018},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3193111.3193119},
  doi          = {10.1145/3193111.3193119},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/LiangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LiangHZJS18,
  author       = {Hongliang Liang and
                  Wenying Hu and
                  Yini Zhang and
                  Lin Jiang and
                  Wuwei Shen},
  editor       = {Michel Chaudron and
                  Ivica Crnkovic and
                  Marsha Chechik and
                  Mark Harman},
  title        = {{USE:} unified and split execution for exposing divergences between
                  versions},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering:
                  Companion Proceeedings, {ICSE} 2018, Gothenburg, Sweden, May 27 -
                  June 03, 2018},
  pages        = {386--387},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183440.3195020},
  doi          = {10.1145/3183440.3195020},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LiangHZJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/LiangWYY18,
  author       = {Hongliang Liang and
                  Yudong Wang and
                  Tianqi Yang and
                  Yue Yu},
  editor       = {Nils Gruschka},
  title        = {AppLance: {A} Lightweight Approach to Detect Privacy Leak for Packed
                  Applications},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {54--70},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_4},
  doi          = {10.1007/978-3-030-03638-6\_4},
  timestamp    = {Mon, 12 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/LiangWYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-03530,
  author       = {Hongliang Liang and
                  Mingyu Li and
                  Qiong Zhang and
                  Yue Yu and
                  Lin Jiang and
                  Yixiu Chen},
  title        = {Aurora: Providing Trusted System Services for Enclaves On an Untrusted
                  System},
  journal      = {CoRR},
  volume       = {abs/1802.03530},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.03530},
  eprinttype    = {arXiv},
  eprint       = {1802.03530},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-03530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangLXHPJS17,
  author       = {Hongliang Liang and
                  Mingyu Li and
                  Jian Xu and
                  Wenying Hu and
                  Xiaoxiao Pei and
                  Xiaodong Jia and
                  Yan Song},
  title        = {vmOS: {A} virtualization-based, secure desktop system},
  journal      = {Comput. Secur.},
  volume       = {65},
  pages        = {329--343},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.10.008},
  doi          = {10.1016/J.COSE.2016.10.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangLXHPJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/LiangWCW17,
  author       = {Hongliang Liang and
                  Yuying Wang and
                  Huayang Cao and
                  Jiajie Wang},
  title        = {Fuzzing the Font Parser of Compound Documents},
  booktitle    = {4th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2017, New York, NY, USA, June 26-28, 2017},
  pages        = {237--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSCloud.2017.42},
  doi          = {10.1109/CSCLOUD.2017.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/LiangWCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/LiangLHP17,
  author       = {Hongliang Liang and
                  Zhengyu Li and
                  Minhuan Huang and
                  Xiaoxiao Pei},
  title        = {A Novel Method Makes Concolic System More Effective},
  booktitle    = {4th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2017, New York, NY, USA, June 26-28, 2017},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSCloud.2017.43},
  doi          = {10.1109/CSCLOUD.2017.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/LiangLHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiangSX17,
  author       = {Hongliang Liang and
                  Yan Song and
                  Da Xiao},
  title        = {An end-to-end model for Android malware detection},
  booktitle    = {2017 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2017, Beijing, China, July 22-24, 2017},
  pages        = {140--142},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISI.2017.8004891},
  doi          = {10.1109/ISI.2017.8004891},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiangSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/LiangLZW17,
  author       = {Hongliang Liang and
                  Shirun Liu and
                  Yini Zhang and
                  Meilin Wang},
  editor       = {Teruhisa Hochin and
                  Hiroaki Hirata and
                  Hiroki Nomiya},
  title        = {Improving the precision of static analysis: Symbolic execution based
                  on {GCC} abstract syntax tree},
  booktitle    = {18th {IEEE/ACIS} International Conference on Software Engineering,
                  Artificial Intelligence, Networking and Parallel/Distributed Computing,
                  {SNPD} 2017, Kanazawa, Japan, June 26-28, 2017},
  pages        = {395--400},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SNPD.2017.8022752},
  doi          = {10.1109/SNPD.2017.8022752},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/LiangLZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofl/ShenLLL17,
  author       = {Wuwei Shen and
                  Guangyuan Li and
                  Chung{-}Ling Lin and
                  Hongliang Liang},
  editor       = {Cong Tian and
                  Fumiko Nagoya and
                  Shaoying Liu and
                  Zhenhua Duan},
  title        = {Foundation of a Framework to Support Compliance Checking in Construction
                  Industry},
  booktitle    = {Structured Object-Oriented Formal Language and Method - 7th International
                  Workshop, {SOFL+MSVL} 2017, Xi'an, China, November 16, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10795},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-90104-6\_7},
  doi          = {10.1007/978-3-319-90104-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/sofl/ShenLLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiangWLDL16,
  author       = {Hongliang Liang and
                  Dongyang Wu and
                  Shirun Liu and
                  Hao Dai and
                  Haifeng Liu},
  title        = {Providing Privacy Protection and Personalization Awareness for Android
                  Devices},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {12},
  number       = {9},
  pages        = {4645256},
  year         = {2016},
  url          = {https://doi.org/10.1177/155014774645256},
  doi          = {10.1177/155014774645256},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiangWLDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijndc/LiangWWX16,
  author       = {Hongliang Liang and
                  Lei Wang and
                  Dongyang Wu and
                  Jiuyun Xu},
  title        = {{MLSA:} a static bugs analysis tool based on {LLVM} {IR}},
  journal      = {Int. J. Networked Distributed Comput.},
  volume       = {4},
  number       = {3},
  pages        = {137--144},
  year         = {2016},
  url          = {https://doi.org/10.2991/ijndc.2016.4.3.1},
  doi          = {10.2991/IJNDC.2016.4.3.1},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijndc/LiangWWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/LiangZPJLX16,
  author       = {Hongliang Liang and
                  Daijie Zhang and
                  Xiaoxiao Pei and
                  Xiaodong Jia and
                  Guangyuan Li and
                  Jiuyun Xu},
  editor       = {Meikang Qiu and
                  Lixin Tao and
                  Jianwei Niu},
  title        = {A Correctness Verification Method for {C} Programs Based on {VCC}},
  booktitle    = {3rd {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2016, Beijing, China, June 25-27, 2016},
  pages        = {172--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSCloud.2016.30},
  doi          = {10.1109/CSCLOUD.2016.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/LiangZPJLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/LiangDPZ16,
  author       = {Hongliang Liang and
                  Hao Dai and
                  Xiaoxiao Pei and
                  Qiong Zhang},
  title        = {A New Pre-copy Strategy for Live Migration of Virtual Machines},
  booktitle    = {International Conference on Identification, Information and Knowledge
                  in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21,
                  2016},
  pages        = {54--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IIKI.2016.45},
  doi          = {10.1109/IIKI.2016.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/LiangDPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/LiangHLZ16,
  author       = {Hongliang Liang and
                  Qichen Hao and
                  Mingyu Li and
                  Yini Zhang},
  title        = {Semantics-Based Anomaly Detection of Processes in Linux Containers},
  booktitle    = {International Conference on Identification, Information and Knowledge
                  in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21,
                  2016},
  pages        = {60--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IIKI.2016.99},
  doi          = {10.1109/IIKI.2016.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/LiangHLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/LiangZJPL16,
  author       = {Hongliang Liang and
                  Daijie Zhang and
                  Xiaodong Jia and
                  Xiaoxiao Pei and
                  Guangyuan Li},
  editor       = {Yihai Chen},
  title        = {Verifying RTuinOS using {VCC:} From approach to practice},
  booktitle    = {17th {IEEE/ACIS} International Conference on Software Engineering,
                  Artificial Intelligence, Networking and Parallel/Distributed Computing,
                  {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016},
  pages        = {373--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SNPD.2016.7515927},
  doi          = {10.1109/SNPD.2016.7515927},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/LiangZJPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/LiangWWX16,
  author       = {Hongliang Liang and
                  Lei Wang and
                  Dongyang Wu and
                  Jiuyun Xu},
  editor       = {Yihai Chen},
  title        = {{MLSA:} {A} static bugs analysis tool based on {LLVM} {IR}},
  booktitle    = {17th {IEEE/ACIS} International Conference on Software Engineering,
                  Artificial Intelligence, Networking and Parallel/Distributed Computing,
                  {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016},
  pages        = {407--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SNPD.2016.7515932},
  doi          = {10.1109/SNPD.2016.7515932},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/LiangWWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/LiangZWL16,
  author       = {Hongliang Liang and
                  Qian Zhao and
                  Yuying Wang and
                  Haifeng Liu},
  editor       = {Yihai Chen},
  title        = {Understanding and detecting performance and security bugs in {IOT}
                  OSes},
  booktitle    = {17th {IEEE/ACIS} International Conference on Software Engineering,
                  Artificial Intelligence, Networking and Parallel/Distributed Computing,
                  {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016},
  pages        = {413--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SNPD.2016.7515933},
  doi          = {10.1109/SNPD.2016.7515933},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/LiangZWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/WangMYL15,
  author       = {Xuefei Wang and
                  Hengtai Ma and
                  Ke Yang and
                  Hongliang Liang},
  title        = {An Uneven Distributed System for Dynamic Taint Analysis Framework},
  booktitle    = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2015, New York, NY, USA, November 3-5, 2015},
  pages        = {237--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSCloud.2015.20},
  doi          = {10.1109/CSCLOUD.2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/WangMYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/LiangWXM15,
  author       = {Hongliang Liang and
                  Dongyang Wu and
                  Jiuyun Xu and
                  Hengtai Ma},
  title        = {Survey on Privacy Protection of Android Devices},
  booktitle    = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2015, New York, NY, USA, November 3-5, 2015},
  pages        = {241--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSCloud.2015.21},
  doi          = {10.1109/CSCLOUD.2015.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/LiangWXM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/LiangC15,
  author       = {Hongliang Liang and
                  Hongyan Cui},
  title        = {The Relation of Energy-Consumption and the Population of People},
  booktitle    = {2015 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2015, Xi'an, China, September 17-19,
                  2015},
  pages        = {169--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberC.2015.79},
  doi          = {10.1109/CYBERC.2015.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/LiangC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/LiangWSZX15,
  author       = {Hongliang Liang and
                  Dongyang Wu and
                  Yan Song and
                  Daijie Zhang and
                  Lingqing Xia},
  title        = {PAPDroid: Personalization Awareness Privacy Protection in Android},
  booktitle    = {International Conference on Identification, Information, and Knowledge
                  in the Internet of Things, {IIKI} 2015, Beijing, China, October 22-23,
                  2015},
  pages        = {122--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IIKI.2015.34},
  doi          = {10.1109/IIKI.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/LiangWSZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/HaoLZZC14,
  author       = {Yongle Hao and
                  Hongliang Liang and
                  Daijie Zhang and
                  Qian Zhao and
                  Baojiang Cui},
  title        = {JavaScript Malicious Codes Analysis Based on Naive Bayes Classification},
  booktitle    = {2014 Ninth International Conference on P2P, Parallel, Grid, Cloud
                  and Internet Computing, Guangdong, China, November 8-10, 2014},
  pages        = {513--519},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/3PGCIC.2014.147},
  doi          = {10.1109/3PGCIC.2014.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/HaoLZZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiangHZW14,
  author       = {Hongliang Liang and
                  Changyao Han and
                  Daijie Zhang and
                  Dongyang Wu},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {A Lightweight Security Isolation Approach for Virtual Machines Deployment},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {516--529},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_28},
  doi          = {10.1007/978-3-319-16745-9\_28},
  timestamp    = {Fri, 09 Apr 2021 18:52:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiangHZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiangDWL13,
  author       = {Hongliang Liang and
                  Yu Dong and
                  Bin Wang and
                  Shuchang Liu},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {EAdroid: Providing Environment Adaptive Security for Android System},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {118--131},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_8},
  doi          = {10.1007/978-3-319-12087-4\_8},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiangDWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WuZHL09,
  author       = {Xinsong Wu and
                  Zhouyi Zhou and
                  Yeping He and
                  Hongliang Liang},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Static Analysis of a Class of Memory Leaks in TrustedBSD {MAC} Framework},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {83--92},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_8},
  doi          = {10.1007/978-3-642-00843-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WuZHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WuSLSYB05,
  author       = {Yanjun Wu and
                  Wenchang Shi and
                  Hongliang Liang and
                  Qinghua Shang and
                  Chunyang Yuan and
                  Bin Liang},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {Security On-demand Architecture with Multiple Modules Support},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {121--131},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_11},
  doi          = {10.1007/978-3-540-31979-5\_11},
  timestamp    = {Tue, 01 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WuSLSYB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}