Follow
Jian Liu
Title
Cited by
Cited by
Year
Libd: Scalable and precise third-party library detection in android markets
M Li, W Wang, P Wang, S Wang, D Wu, J Liu, R Xue, W Huo
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1762017
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1502018
Porous carbon nitride thin strip: precise carbon doping regulating delocalized π‐electron induces elevated photocatalytic hydrogen evolution
Q Li, L Zhang, J Liu, J Zhou, Y Jiao, X Xiao, C Zhao, Y Zhou, S Ye, B Jiang, ...
Small 17 (11), 2006622, 2021
972021
Three-dimensional assemblies of carbon nitride tubes as nanoreactors for enhanced photocatalytic hydrogen production
C Zhao, Q Li, Y Xie, L Zhang, X Xiao, D Wang, Y Jiao, CAH Price, B Jiang, ...
Journal of materials chemistry A 8 (1), 305-312, 2020
862020
A session-packets-based encrypted traffic classification using capsule neural networks
S Cui, B Jiang, Z Cai, Z Lu, S Liu, J Liu
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
452019
Nitrogen vacancy-rich porous carbon nitride nanosheets for efficient photocatalytic H2O2 production
C Zhao, C Shi, Q Li, X Wang, G Zeng, S Ye, B Jiang, J Liu
Materials today energy 24, 100926, 2022
422022
Postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
2015 IEEE 8th International Conference on Software Testing, Verification and …, 2015
412015
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network
F Ren, Z Jiang, X Wang, J Liu
Cybersecurity 3 (1), 4, 2020
402020
Towards network anomaly detection using graph embedding
Q Xiao, J Liu, Q Wang, Z Jiang, X Wang, Y Yao
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
382020
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
382017
A deployable sampling strategy for data race detection
Y Cai, J Zhang, L Cao, J Liu
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
382016
Eliminating path redundancy via postconditioned symbolic execution
Q Yi, Z Yang, S Guo, C Wang, J Liu, C Zhao
IEEE Transactions on Software Engineering 44 (1), 25-43, 2017
352017
A synergistic analysis method for explaining failed regression tests
Q Yi, Z Yang, J Liu, C Zhao, C Wang
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
292015
Nonmuscle myosin heavy chain IIA facilitates SARS-CoV-2 infection in human pulmonary cells
J Chen, J Fan, Z Chen, M Zhang, H Peng, J Liu, L Ding, M Liu, C Zhao, ...
Proceedings of the National Academy of Sciences 118 (50), e2111011118, 2021
282021
Machine learning prediction analysis using IoT for smart farming
A Rehman, J Liu, L Keqiu, A Mateen, MQ Yasin
Int. J 8 (9), 1-6, 2020
222020
MAAC: Novel alert correlation method to detect multi-step attack
X Wang, X Gong, L Yu, J Liu
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
202021
A bi-directional lstm model with attention for malicious url detection
F Ren, Z Jiang, J Liu
2019 IEEE 4th Advanced Information Technology, Electronic and Automation …, 2019
202019
Large-scale third-party library detection in android markets
M Li, P Wang, W Wang, S Wang, D Wu, J Liu, R Xue, W Huo, W Zou
IEEE Transactions on Software Engineering 46 (9), 981-1003, 2018
162018
Explaining software failures by cascade fault localization
Q Yi, Z Yang, J Liu, C Zhao, C Wang
ACM Transactions on Design Automation of Electronic Systems (TODAES) 20 (3 …, 2015
152015
Tainting-assisted and context-migrated symbolic execution of android framework for vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20