Остановите войну!
for scientists:
default search action
Zhi Li 0018
- > Home > Persons > Zhi Li 0018
Publications
- 2024
- [j12]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Trans. Softw. Eng. Methodol. 33(1): 1:1-1:40 (2024) - [c14]Chaopeng Dong, Siyuan Li, Shouguo Yang, Yang Xiao, Yongpan Wang, Hong Li, Zhi Li, Limin Sun:
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. ICSE 2024: 66:1-66:12 - 2023
- [j11]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Zhi Li, Hongsong Zhu, Limin Sun:
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. Knowl. Inf. Syst. 65(10): 4411-4429 (2023) - [j10]Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun:
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE Trans. Dependable Secur. Comput. 20(5): 3890-3909 (2023) - [j9]Yue Sun, Zhi Li, Shichao Lv, Limin Sun:
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE Trans. Dependable Secur. Comput. 20(6): 4502-4518 (2023) - [c13]Xiaohui Chen, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun:
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. DSN 2023: 165-178 - [i3]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. CoRR abs/2301.00511 (2023) - [i2]Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhi Li, Limin Sun:
Harnessing the Power of LLM to Support Binary Taint Analysis. CoRR abs/2310.08275 (2023) - 2022
- [j8]Kai Yang, Yueyang Zhang, Xiaodong Lin, Zhi Li, Limin Sun:
Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction. IEEE Internet Things J. 9(7): 5434-5446 (2022) - [j7]Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. IEEE Trans. Dependable Secur. Comput. 19(6): 4099-4112 (2022) - [c12]Ke Li, Zhi Li, Zhimin Gu, Jing Guo, Ziying Wang, Limin Sun:
Compromised IoT Devices Detection in Smart Home via Semantic Information. ICC 2022: 4986-4992 - 2021
- [c11]Zhaoteng Yan, Zhi Li, Wenping Bai, Nan Yu, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features. SciSec 2021: 21-35 - 2020
- [c10]Zhaoteng Yan, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net. WASA (1) 2020: 602-614 - 2018
- [j6]Feng Yi, Guan Feng, Hongtao Wang, Zhi Li, Limin Sun:
MIAC: A mobility intention auto-completion model for location prediction. Intell. Syst. Account. Finance Manag. 25(4): 161-173 (2018) - [j5]Jiali Li, Yongle Chen, Zhi Li, Limin Sun:
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph). 计算机科学 45(9): 171-176 (2018) - [c9]Weidong Zhang, Yu Chen, Hong Li, Zhi Li, Limin Sun:
PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. ICC 2018: 1-6 - [c8]Qiang Li, Xuan Feng, Haining Wang, Zhi Li, Limin Sun:
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. INFOCOM 2018: 2537-2545 - 2017
- [c7]Feng Yi, Zhi Li, Hongtao Wang, Weimin Zheng, Limin Sun:
MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KSEM 2017: 432-444 - 2016
- [j4]Hongtao Wang, Qiang Li, Feng Yi, Zhi Li, Limin Sun:
Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP J. Wirel. Commun. Netw. 2016: 103 (2016) - [c6]Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun:
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. ICICS 2016: 27-36 - [c5]Qiang Li, Xuan Feng, Zhi Li, Haining Wang, Limin Sun:
GUIDE: Graphical user interface fingerprints physical devices. ICNP 2016: 1-2 - [c4]Hongtao Wang, Hui Wen, Feng Yi, Zhi Li, Limin Sun:
Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles. WASA 2016: 103-115 - 2015
- [j3]Yongle Chen, Wei Liu, Yongping Xiong, Jing Duan, Zhi Li, Hongsong Zhu:
A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning. Int. J. Distributed Sens. Networks 11: 753191:1-753191:10 (2015) - [j2]Zhi Li, Yan Liu, Hongsong Zhu, Limin Sun:
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE Trans. Veh. Technol. 64(11): 5257-5268 (2015) - [c3]Kan Yu, Zhi Li, Qiang Li, Jiguo Yu:
A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model. WASA 2015: 706-714 - [i1]Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Limin Sun:
Fog Computing: Focusing on Mobile Users at the Edge. CoRR abs/1502.01815 (2015) - 2014
- [c2]Yunhua He, Limin Sun, Zhi Li, Hong Li, Xiuzhen Cheng:
An optimal privacy-preserving mechanism for crowdsourced traffic monitoring. FOMC 2014: 11-18 - 2013
- [j1]Zhi Li, Limin Sun, Xinyun Zhou:
Amortized Fairness for Drive-Thru Internet. Int. J. Distributed Sens. Networks 9 (2013) - 2010
- [c1]Zhi Li, Limin Sun, Xinyun Zhou, Liqun Li:
Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks. GLOBECOM 2010: 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-27 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint