


default search action
BibTeX records: Hongliang Liang
@article{DBLP:journals/jss/MaLYL25, author = {Dongyu Ma and Zeyu Liang and Luming Yin and Hongliang Liang}, title = {Symbolic testing of floating-point bugs and exceptions}, journal = {J. Syst. Softw.}, volume = {219}, pages = {112226}, year = {2025}, url = {https://doi.org/10.1016/j.jss.2024.112226}, doi = {10.1016/J.JSS.2024.112226}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/MaLYL25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/LiangYHLS25, author = {Hongliang Liang and Luming Yin and Wenying Hu and Yuxiang Li and Wuwei Shen}, title = {Unified and Split Symbolic Execution for Exposing Semantic Differences}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {34}, number = {6}, pages = {168:1--168:27}, year = {2025}, url = {https://doi.org/10.1145/3705299}, doi = {10.1145/3705299}, timestamp = {Thu, 07 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/LiangYHLS25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/NiXMLZL25, author = {Ruikang Ni and Da Xiao and Qingye Meng and Xiangyu Li and Shihui Zheng and Hongliang Liang}, editor = {Toby Walsh and Julie Shah and Zico Kolter}, title = {Benchmarking and Understanding Compositional Relational Reasoning of LLMs}, booktitle = {AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25 - March 4, 2025, Philadelphia, PA, {USA}}, pages = {19703--19711}, publisher = {{AAAI} Press}, year = {2025}, url = {https://doi.org/10.1609/aaai.v39i18.34170}, doi = {10.1609/AAAI.V39I18.34170}, timestamp = {Thu, 17 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/NiXMLZL25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2504-04422, author = {Hongliang Liang and Luming Yin and Guohao Wu and Yuxiang Li and Qiuping Yi and Lei Wang}, title = {LeakGuard: Detecting Memory Leaks Accurately and Scalably}, journal = {CoRR}, volume = {abs/2504.04422}, year = {2025}, url = {https://doi.org/10.48550/arXiv.2504.04422}, doi = {10.48550/ARXIV.2504.04422}, eprinttype = {arXiv}, eprint = {2504.04422}, timestamp = {Mon, 19 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2504-04422.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiangLXLZWL24, author = {Hongliang Liang and Xiangyu Li and Da Xiao and Jie Liu and Yanjie Zhou and Aibo Wang and Jin Li}, title = {Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {309--324}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3252523}, doi = {10.1109/TDSC.2023.3252523}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiangLXLZWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiangYCLL24, author = {Hongliang Liang and Xinglin Yu and Xianglin Cheng and Jie Liu and Jin Li}, title = {Multiple Targets Directed Greybox Fuzzing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {325--339}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253120}, doi = {10.1109/TDSC.2023.3253120}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiangYCLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/YuLW24, author = {Xinglin Yu and Hongliang Liang and Chunlin Wang}, title = {Multiple Targets Directed Greybox Fuzzing: From Reachable to Exploited}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2024, Rovaniemi, Finland, March 12-15, 2024}, pages = {907--917}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SANER60148.2024.00099}, doi = {10.1109/SANER60148.2024.00099}, timestamp = {Tue, 30 Jul 2024 11:08:59 +0200}, biburl = {https://dblp.org/rec/conf/wcre/YuLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2412-12841, author = {Ruikang Ni and Da Xiao and Qingye Meng and Xiangyu Li and Shihui Zheng and Hongliang Liang}, title = {Benchmarking and Understanding Compositional Relational Reasoning of LLMs}, journal = {CoRR}, volume = {abs/2412.12841}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2412.12841}, doi = {10.48550/ARXIV.2412.12841}, eprinttype = {arXiv}, eprint = {2412.12841}, timestamp = {Tue, 21 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2412-12841.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/WangL23, author = {Chunlin Wang and Hongliang Liang}, title = {Value Peripheral Register Values for Fuzzing {MCU} Firmware}, booktitle = {34th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2023, Florence, Italy, October 9-12, 2023}, pages = {718--729}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISSRE59848.2023.00061}, doi = {10.1109/ISSRE59848.2023.00061}, timestamp = {Tue, 14 Nov 2023 16:09:47 +0100}, biburl = {https://dblp.org/rec/conf/issre/WangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/XiaoHALL22, author = {Da Xiao and Dengji Hang and Lu Ai and Shengping Li and Hongliang Liang}, title = {Path context augmented statement and network for learning programs}, journal = {Empir. Softw. Eng.}, volume = {27}, number = {2}, pages = {37}, year = {2022}, url = {https://doi.org/10.1007/s10664-021-10098-y}, doi = {10.1007/S10664-021-10098-Y}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/XiaoHALL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/LiangHL22, author = {Hongliang Liang and Dengji Hang and Xiangyu Li}, title = {Modeling function-level interactions for file-level bug localization}, journal = {Empir. Softw. Eng.}, volume = {27}, number = {7}, pages = {186}, year = {2022}, url = {https://doi.org/10.1007/s10664-022-10237-z}, doi = {10.1007/S10664-022-10237-Z}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/LiangHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/LiuALL22, author = {Jie Liu and Hang An and Jin Li and Hongliang Liang}, title = {{DEPA:} Determining Exploit Primitives Automatically for Interactive Programs}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {690--694}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428.3573550}, doi = {10.1145/3573428.3573550}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eitce/LiuALL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HaoML22, author = {Xiantong Hao and Dandan Ma and Hongliang Liang}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {569--587}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_30}, doi = {10.1007/978-3-031-25538-0\_30}, timestamp = {Thu, 12 Dec 2024 08:35:15 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/HaoML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14977, author = {Hongliang Liang and Xianglin Cheng and Jie Liu and Jin Li}, title = {Multiple Targets Directed Greybox Fuzzing}, journal = {CoRR}, volume = {abs/2206.14977}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14977}, doi = {10.48550/ARXIV.2206.14977}, eprinttype = {arXiv}, eprint = {2206.14977}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-13990, author = {Jie Liu and Hang An and Jin Li and Hongliang Liang}, title = {Detecting Exploit Primitives Automatically for Heap Vulnerabilities on Binary Programs}, journal = {CoRR}, volume = {abs/2212.13990}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.13990}, doi = {10.48550/ARXIV.2212.13990}, eprinttype = {arXiv}, eprint = {2212.13990}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-13990.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsysc/LiJL21, author = {Zhen Li and Yao{-}Lin Jiang and Hongliang Liang}, title = {Parametric model order reduction based on parallel tensor compression}, journal = {Int. J. Syst. Sci.}, volume = {52}, number = {11}, pages = {2201--2216}, year = {2021}, url = {https://doi.org/10.1080/00207721.2021.1880665}, doi = {10.1080/00207721.2021.1880665}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsysc/LiJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiangLC0XJ21, author = {Hongliang Liang and Mingyu Li and Yixiu Chen and Tianqi Yang and Zhuosi Xie and Lin Jiang}, title = {Architectural Protection of Trusted System Services for {SGX} Enclaves in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {3}, pages = {910--922}, year = {2021}, url = {https://doi.org/10.1109/TCC.2019.2892449}, doi = {10.1109/TCC.2019.2892449}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/LiangLC0XJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceel/LiangHLL21, author = {Xiao Liang and Weiying Hou and Hongzheng Li and Hongliang Liang}, title = {An Undergraduate Course for {FOSS} and with {FOSS}}, booktitle = {{ICEEL} 2021: 5th International Conference on Education and E-Learning, Virtual Event, Japan, November 5 - 7, 2021}, pages = {161--167}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3502434.3502465}, doi = {10.1145/3502434.3502465}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceel/LiangHLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/LiangA21, author = {Hongliang Liang and Lu Ai}, title = {AST-path Based Compare-Aggregate Network for Code Clone Detection}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9534099}, doi = {10.1109/IJCNN52387.2021.9534099}, timestamp = {Wed, 29 Sep 2021 17:00:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/LiangA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangXCNW20, author = {Hongliang Liang and Zhuosi Xie and Yixiu Chen and Hua Ning and Jianli Wang}, title = {{FIT:} Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching}, journal = {Comput. Secur.}, volume = {99}, pages = {102032}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.102032}, doi = {10.1016/J.COSE.2020.102032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangXCNW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiangLCJXY20, author = {Hongliang Liang and Mingyu Li and Yixiu Chen and Lin Jiang and Zhuosi Xie and Tianqi Yang}, title = {Establishing Trusted {I/O} Paths for {SGX} Client Systems With Aurora}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1589--1600}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2945621}, doi = {10.1109/TIFS.2019.2945621}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiangLCJXY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ease/LiangYAJ20, author = {Hongliang Liang and Wenqing Yu and Lu Ai and Lin Jiang}, editor = {Jingyue Li and Letizia Jaccheri and Torgeir Dings{\o}yr and Ruzanna Chitchyan}, title = {A Practical Concolic Execution Technique for Large Scale Software Systems}, booktitle = {{EASE} '20: Evaluation and Assessment in Software Engineering, Trondheim, Norway, April 15-17, 2020}, pages = {312--317}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3383219.3383254}, doi = {10.1145/3383219.3383254}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ease/LiangYAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/LiangCXL20, author = {Hongliang Liang and Yixiu Chen and Zhuosi Xie and Zhiyi Liang}, editor = {Lorenzo Cavallaro and Andrea Lanzi}, title = {{X-AFL:} a kernel fuzzer combining passive and active fuzzing}, booktitle = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020}, pages = {13--18}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3380786.3391400}, doi = {10.1145/3380786.3391400}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/LiangCXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/LiangLW20, author = {Hongliang Liang and Mingyue Li and Jianli Wang}, editor = {Lorenzo Cavallaro and Andrea Lanzi}, title = {Automated data race bugs addition}, booktitle = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys 2020, Heraklion, Greece, April 27, 2020}, pages = {37--42}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3380786.3391401}, doi = {10.1145/3380786.3391401}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/LiangLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/LiLLMQYZ20, author = {Rundong Li and Hongliang Liang and Liming Liu and Xutong Ma and Rong Qu and Jun Yan and Jian Zhang}, title = {GTFuzz: Guard Token Directed Grey-Box Fuzzing}, booktitle = {25th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2020, Perth, Australia, December 1-4, 2020}, pages = {160--170}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/PRDC50213.2020.00027}, doi = {10.1109/PRDC50213.2020.00027}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/LiLLMQYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/LiangJAW20, author = {Hongliang Liang and Lin Jiang and Lu Ai and Jinyi Wei}, editor = {Kostas Kontogiannis and Foutse Khomh and Alexander Chatzigeorgiou and Marios{-}Eleftherios Fokaefs and Minghui Zhou}, title = {Sequence Directed Hybrid Fuzzing}, booktitle = {27th {IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2020, London, ON, Canada, February 18-21, 2020}, pages = {127--137}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SANER48275.2020.9054807}, doi = {10.1109/SANER48275.2020.9054807}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcre/LiangJAW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiangYJX19, author = {Hongliang Liang and Yue Yu and Lin Jiang and Zhuosi Xie}, title = {Seml: {A} Semantic {LSTM} Model for Software Defect Prediction}, journal = {{IEEE} Access}, volume = {7}, pages = {83812--83824}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2925313}, doi = {10.1109/ACCESS.2019.2925313}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiangYJX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiangSWY19, author = {Hongliang Liang and Lu Sun and Meilin Wang and Yuxing Yang}, title = {Deep Learning With Customized Abstract Syntax Tree for Bug Localization}, journal = {{IEEE} Access}, volume = {7}, pages = {116309--116320}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2936948}, doi = {10.1109/ACCESS.2019.2936948}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiangSWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/LiangYJCX19, author = {Hongliang Liang and Tianqi Yang and Lin Jiang and Yixiu Chen and Zhuosi Xie}, title = {Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably}, booktitle = {26th Asia-Pacific Software Engineering Conference, {APSEC} 2019, Putrajaya, Malaysia, December 2-5, 2019}, pages = {434--441}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/APSEC48747.2019.00065}, doi = {10.1109/APSEC48747.2019.00065}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsec/LiangYJCX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/LiangYSJ19, author = {Hongliang Liang and Yuxing Yang and Lu Sun and Lin Jiang}, title = {{JSAC:} {A} Novel Framework to Detect Malicious JavaScript via CNNs over {AST} and {CFG}}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IJCNN.2019.8851760}, doi = {10.1109/IJCNN.2019.8851760}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/LiangYSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/LiangZLL19, author = {Hongliang Liang and Qiong Zhang and Mingyu Li and Jianqiang Li}, title = {Toward Migration of SGX-Enabled Containers}, booktitle = {2019 {IEEE} Symposium on Computers and Communications, {ISCC} 2019, Barcelona, Spain, June 29 - July 3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCC47284.2019.8969644}, doi = {10.1109/ISCC47284.2019.8969644}, timestamp = {Tue, 04 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/LiangZLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/LiangZYXJ19, author = {Hongliang Liang and Yini Zhang and Yue Yu and Zhuosi Xie and Lin Jiang}, editor = {Yann{-}Ga{\"{e}}l Gu{\'{e}}h{\'{e}}neuc and Foutse Khomh and Federica Sarro}, title = {Sequence coverage directed greybox fuzzing}, booktitle = {Proceedings of the 27th International Conference on Program Comprehension, {ICPC} 2019, Montreal, QC, Canada, May 25-31, 2019}, pages = {249--259}, publisher = {{IEEE} / {ACM}}, year = {2019}, url = {https://doi.org/10.1109/ICPC.2019.00044}, doi = {10.1109/ICPC.2019.00044}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwpc/LiangZYXJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/XuLLLLDL18, author = {Jiuyun Xu and Shuang Liu and Xiaoxuan Lu and Li Li and Hongliang Liang and Qiang Duan and Runjie Liu}, title = {A Temporal Adaptive Access Mechanism for Data Fusion in an IoT Environment}, journal = {Sensors}, volume = {18}, number = {12}, pages = {4205}, year = {2018}, url = {https://doi.org/10.3390/s18124205}, doi = {10.3390/S18124205}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/XuLLLLDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LiangPJSZ18, author = {Hongliang Liang and Xiaoxiao Pei and Xiaodong Jia and Wuwei Shen and Jian Zhang}, title = {Fuzzing: State of the Art}, journal = {{IEEE} Trans. Reliab.}, volume = {67}, number = {3}, pages = {1199--1218}, year = {2018}, url = {https://doi.org/10.1109/TR.2018.2834476}, doi = {10.1109/TR.2018.2834476}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/LiangPJSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/LiangL18, author = {Hongliang Liang and Mingyu Li}, editor = {Angelos Stavrou and Konrad Rieck}, title = {Bring the Missing Jigsaw Back: TrustedClock for {SGX} Enclaves}, booktitle = {Proceedings of the 11th European Workshop on Systems Security, EuroSec@EuroSys 2018, Porto, Portugal, April 23, 2018}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3193111.3193119}, doi = {10.1145/3193111.3193119}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/LiangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LiangHZJS18, author = {Hongliang Liang and Wenying Hu and Yini Zhang and Lin Jiang and Wuwei Shen}, editor = {Michel Chaudron and Ivica Crnkovic and Marsha Chechik and Mark Harman}, title = {{USE:} unified and split execution for exposing divergences between versions}, booktitle = {Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018}, pages = {386--387}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3183440.3195020}, doi = {10.1145/3183440.3195020}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LiangHZJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/LiangWYY18, author = {Hongliang Liang and Yudong Wang and Tianqi Yang and Yue Yu}, editor = {Nils Gruschka}, title = {AppLance: {A} Lightweight Approach to Detect Privacy Leak for Packed Applications}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {54--70}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_4}, doi = {10.1007/978-3-030-03638-6\_4}, timestamp = {Mon, 12 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/LiangWYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-03530, author = {Hongliang Liang and Mingyu Li and Qiong Zhang and Yue Yu and Lin Jiang and Yixiu Chen}, title = {Aurora: Providing Trusted System Services for Enclaves On an Untrusted System}, journal = {CoRR}, volume = {abs/1802.03530}, year = {2018}, url = {http://arxiv.org/abs/1802.03530}, eprinttype = {arXiv}, eprint = {1802.03530}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-03530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangLXHPJS17, author = {Hongliang Liang and Mingyu Li and Jian Xu and Wenying Hu and Xiaoxiao Pei and Xiaodong Jia and Yan Song}, title = {vmOS: {A} virtualization-based, secure desktop system}, journal = {Comput. Secur.}, volume = {65}, pages = {329--343}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.10.008}, doi = {10.1016/J.COSE.2016.10.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangLXHPJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/LiangWCW17, author = {Hongliang Liang and Yuying Wang and Huayang Cao and Jiajie Wang}, title = {Fuzzing the Font Parser of Compound Documents}, booktitle = {4th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017}, pages = {237--242}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSCloud.2017.42}, doi = {10.1109/CSCLOUD.2017.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/LiangWCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/LiangLHP17, author = {Hongliang Liang and Zhengyu Li and Minhuan Huang and Xiaoxiao Pei}, title = {A Novel Method Makes Concolic System More Effective}, booktitle = {4th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSCloud.2017.43}, doi = {10.1109/CSCLOUD.2017.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/LiangLHP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiangSX17, author = {Hongliang Liang and Yan Song and Da Xiao}, title = {An end-to-end model for Android malware detection}, booktitle = {2017 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2017, Beijing, China, July 22-24, 2017}, pages = {140--142}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISI.2017.8004891}, doi = {10.1109/ISI.2017.8004891}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiangSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/LiangLZW17, author = {Hongliang Liang and Shirun Liu and Yini Zhang and Meilin Wang}, editor = {Teruhisa Hochin and Hiroaki Hirata and Hiroki Nomiya}, title = {Improving the precision of static analysis: Symbolic execution based on {GCC} abstract syntax tree}, booktitle = {18th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2017, Kanazawa, Japan, June 26-28, 2017}, pages = {395--400}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SNPD.2017.8022752}, doi = {10.1109/SNPD.2017.8022752}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/LiangLZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofl/ShenLLL17, author = {Wuwei Shen and Guangyuan Li and Chung{-}Ling Lin and Hongliang Liang}, editor = {Cong Tian and Fumiko Nagoya and Shaoying Liu and Zhenhua Duan}, title = {Foundation of a Framework to Support Compliance Checking in Construction Industry}, booktitle = {Structured Object-Oriented Formal Language and Method - 7th International Workshop, {SOFL+MSVL} 2017, Xi'an, China, November 16, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10795}, pages = {111--122}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-90104-6\_7}, doi = {10.1007/978-3-319-90104-6\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/sofl/ShenLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiangWLDL16, author = {Hongliang Liang and Dongyang Wu and Shirun Liu and Hao Dai and Haifeng Liu}, title = {Providing Privacy Protection and Personalization Awareness for Android Devices}, journal = {Int. J. Distributed Sens. Networks}, volume = {12}, number = {9}, pages = {4645256}, year = {2016}, url = {https://doi.org/10.1177/155014774645256}, doi = {10.1177/155014774645256}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/LiangWLDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijndc/LiangWWX16, author = {Hongliang Liang and Lei Wang and Dongyang Wu and Jiuyun Xu}, title = {{MLSA:} a static bugs analysis tool based on {LLVM} {IR}}, journal = {Int. J. Networked Distributed Comput.}, volume = {4}, number = {3}, pages = {137--144}, year = {2016}, url = {https://doi.org/10.2991/ijndc.2016.4.3.1}, doi = {10.2991/IJNDC.2016.4.3.1}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijndc/LiangWWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/LiangZPJLX16, author = {Hongliang Liang and Daijie Zhang and Xiaoxiao Pei and Xiaodong Jia and Guangyuan Li and Jiuyun Xu}, editor = {Meikang Qiu and Lixin Tao and Jianwei Niu}, title = {A Correctness Verification Method for {C} Programs Based on {VCC}}, booktitle = {3rd {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2016, Beijing, China, June 25-27, 2016}, pages = {172--177}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSCloud.2016.30}, doi = {10.1109/CSCLOUD.2016.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/LiangZPJLX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/LiangDPZ16, author = {Hongliang Liang and Hao Dai and Xiaoxiao Pei and Qiong Zhang}, title = {A New Pre-copy Strategy for Live Migration of Virtual Machines}, booktitle = {International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21, 2016}, pages = {54--59}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IIKI.2016.45}, doi = {10.1109/IIKI.2016.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/LiangDPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/LiangHLZ16, author = {Hongliang Liang and Qichen Hao and Mingyu Li and Yini Zhang}, title = {Semantics-Based Anomaly Detection of Processes in Linux Containers}, booktitle = {International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21, 2016}, pages = {60--63}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IIKI.2016.99}, doi = {10.1109/IIKI.2016.99}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/LiangHLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/LiangZJPL16, author = {Hongliang Liang and Daijie Zhang and Xiaodong Jia and Xiaoxiao Pei and Guangyuan Li}, editor = {Yihai Chen}, title = {Verifying RTuinOS using {VCC:} From approach to practice}, booktitle = {17th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016}, pages = {373--378}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SNPD.2016.7515927}, doi = {10.1109/SNPD.2016.7515927}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/LiangZJPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/LiangWWX16, author = {Hongliang Liang and Lei Wang and Dongyang Wu and Jiuyun Xu}, editor = {Yihai Chen}, title = {{MLSA:} {A} static bugs analysis tool based on {LLVM} {IR}}, booktitle = {17th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016}, pages = {407--412}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SNPD.2016.7515932}, doi = {10.1109/SNPD.2016.7515932}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/LiangWWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/LiangZWL16, author = {Hongliang Liang and Qian Zhao and Yuying Wang and Haifeng Liu}, editor = {Yihai Chen}, title = {Understanding and detecting performance and security bugs in {IOT} OSes}, booktitle = {17th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2016, Shanghai, China, May 30 - June 1, 2016}, pages = {413--418}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SNPD.2016.7515933}, doi = {10.1109/SNPD.2016.7515933}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/LiangZWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/WangMYL15, author = {Xuefei Wang and Hengtai Ma and Ke Yang and Hongliang Liang}, title = {An Uneven Distributed System for Dynamic Taint Analysis Framework}, booktitle = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015}, pages = {237--240}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSCloud.2015.20}, doi = {10.1109/CSCLOUD.2015.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/WangMYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/LiangWXM15, author = {Hongliang Liang and Dongyang Wu and Jiuyun Xu and Hengtai Ma}, title = {Survey on Privacy Protection of Android Devices}, booktitle = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015}, pages = {241--246}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSCloud.2015.21}, doi = {10.1109/CSCLOUD.2015.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/LiangWXM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/LiangC15, author = {Hongliang Liang and Hongyan Cui}, title = {The Relation of Energy-Consumption and the Population of People}, booktitle = {2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2015, Xi'an, China, September 17-19, 2015}, pages = {169--175}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CyberC.2015.79}, doi = {10.1109/CYBERC.2015.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/LiangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/LiangWSZX15, author = {Hongliang Liang and Dongyang Wu and Yan Song and Daijie Zhang and Lingqing Xia}, title = {PAPDroid: Personalization Awareness Privacy Protection in Android}, booktitle = {International Conference on Identification, Information, and Knowledge in the Internet of Things, {IIKI} 2015, Beijing, China, October 22-23, 2015}, pages = {122--125}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IIKI.2015.34}, doi = {10.1109/IIKI.2015.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/LiangWSZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/HaoLZZC14, author = {Yongle Hao and Hongliang Liang and Daijie Zhang and Qian Zhao and Baojiang Cui}, title = {JavaScript Malicious Codes Analysis Based on Naive Bayes Classification}, booktitle = {2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014}, pages = {513--519}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/3PGCIC.2014.147}, doi = {10.1109/3PGCIC.2014.147}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/HaoLZZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiangHZW14, author = {Hongliang Liang and Changyao Han and Daijie Zhang and Dongyang Wu}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {A Lightweight Security Isolation Approach for Virtual Machines Deployment}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {516--529}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_28}, doi = {10.1007/978-3-319-16745-9\_28}, timestamp = {Fri, 09 Apr 2021 18:52:22 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiangHZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiangDWL13, author = {Hongliang Liang and Yu Dong and Bin Wang and Shuchang Liu}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {EAdroid: Providing Environment Adaptive Security for Android System}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {118--131}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_8}, doi = {10.1007/978-3-319-12087-4\_8}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiangDWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuZHL09, author = {Xinsong Wu and Zhouyi Zhou and Yeping He and Hongliang Liang}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Static Analysis of a Class of Memory Leaks in TrustedBSD {MAC} Framework}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {83--92}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_8}, doi = {10.1007/978-3-642-00843-6\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WuZHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuSLSYB05, author = {Yanjun Wu and Wenchang Shi and Hongliang Liang and Qinghua Shang and Chunyang Yuan and Bin Liang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Security On-demand Architecture with Multiple Modules Support}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {121--131}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_11}, doi = {10.1007/978-3-540-31979-5\_11}, timestamp = {Tue, 01 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WuSLSYB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.