default search action
Jianming Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu:
A survey on the evolution of fileless attacks and detection techniques. Comput. Secur. 137: 103653 (2024) - [j22]Yu Nie, Jianming Fu, Yilai Zhang, Chao Li:
Modeling implicit variable and latent structure for aspect-based sentiment quadruple extraction. Neurocomputing 586: 127642 (2024) - [j21]Quancheng Wang, Ming Tang, Jianming Fu:
EavesDroid: Eavesdropping User Behaviors via OS Side Channels on Smartphones. IEEE Internet Things J. 11(3): 3979-3993 (2024) - [j20]Zhetao Li, Jianhui Wang, Saiqin Long, Jianming Fu, Min Yang, Jian Weng:
A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks. IEEE Trans. Mob. Comput. 23(7): 7739-7752 (2024) - 2023
- [j19]Yanzhen Ren, Dengkai Liu, Chenyu Liu, Qiaochu Xiong, Jianming Fu, Lina Wang:
A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet. IEEE Trans. Dependable Secur. Comput. 20(1): 665-679 (2023) - [j18]Mengfei Xie, Yan Lin, Chenke Luo, Guojun Peng, Jianming Fu:
PointerScope: Understanding Pointer Patching for Code Randomization. IEEE Trans. Dependable Secur. Comput. 20(4): 3019-3036 (2023) - [j17]Chenke Luo, Jiang Ming, Jianming Fu, Guojun Peng, Zhetao Li:
Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing. IEEE Trans. Inf. Forensics Secur. 18: 3891-3905 (2023) - [i3]Quancheng Wang, Ming Tang, Jianming Fu:
EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones. CoRR abs/2303.03700 (2023) - 2022
- [j16]Rui Zheng, Qiuyun Wang, Zhuopang Lin, Zhengwei Jiang, Jianming Fu, Guojun Peng:
Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Appl. Soft Comput. 124: 109044 (2022) - [j15]Akshay Kumar, Lin Gao, Jiaming Li, Jiaxin Ma, Jianming Fu, Xudong Gu, Seedahmed S. Mahmoud, Qiang Fang:
Error-Related Negativity-Based Robot-Assisted Stroke Rehabilitation System: Design and Proof-of-Concept. Frontiers Neurorobotics 16: 837119 (2022) - [c37]Han Xu, Yibin Li, Dong Xu, Xiaolong Li, Jianming Fu, Xu Zhang:
Design of a Cable-Driven Interactive Rehabilitation Device with 3D Trajectory Tracking and Force Feedback. ICIRA (1) 2022: 759-768 - 2021
- [j14]Xiuwen Liu, Jianming Fu, Yanjiao Chen, Weichen Luo, Zihan Tang:
Trust-Aware sensing Quality estimation for team Crowdsourcing in social IoT. Comput. Networks 184: 107695 (2021) - [j13]Seedahmed S. Mahmoud, Zheng Cao, Jianming Fu, Xudong Gu, Qiang Fang:
Occupational Therapy Assessment for Upper Limb Rehabilitation: A Multisensor-Based Approach. Frontiers Digit. Health 3: 784120 (2021) - [j12]Rui Zheng, Hao Ma, Qiuyun Wang, Jianming Fu, Zhengwei Jiang:
Assessing the Security of Campus Networks: The Case of Seven Universities. Sensors 21(1): 306 (2021) - [c36]Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng:
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. CCS 2021: 2858-2874 - [c35]Jianli Huang, Meiai Lin, Jianming Fu, Ya Sun, Qiang Fang:
An Immersive Motor Imagery Training System for Post-Stroke Rehabilitation Combining VR and EMG-based Real-Time Feedback. EMBC 2021: 7590-7593 - [c34]Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. ICSE 2021: 1683-1694 - [c33]Dong Xu, Han Xu, Ya Sun, Yibin Li, Xu Zhang, Xiaolong Li, Jianming Fu:
Robot-Assisted quantitative assessment of axis misalignment of wrist joint. RCAR 2021: 1397-1401 - [c32]Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion:
Obfuscation-Resilient Executable Payload Extraction From Packed Malware. USENIX Security Symposium 2021: 3451-3468 - [i2]Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. CoRR abs/2103.03511 (2021) - 2020
- [j11]Xiuwen Liu, Jianming Fu:
SPWalk: Similar Property Oriented Feature Learning for Phishing Detection. IEEE Access 8: 87031-87045 (2020) - [j10]Qiang Fang, Seedahmed S. Mahmoud, Akshay Kumar, Xudong Gu, Jianming Fu:
A Longitudinal Investigation of the Efficacy of Supported In-Home Post-Stroke Rehabilitation. IEEE Access 8: 138690-138700 (2020) - [j9]Xiuwen Liu, Yanjiao Chen, Jianming Fu:
MFRep: Joint user and employer alignment across heterogeneous social networks. Neurocomputing 414: 36-56 (2020) - [j8]Xiuwen Liu, Jianming Fu, Yanjiao Chen:
Event evolution model for cybersecurity event mining in tweet streams. Inf. Sci. 524: 254-276 (2020) - [j7]Seedahmed S. Mahmoud, Akshay Kumar, Yiting Tang, Youcun Li, Xudong Gu, Jianming Fu, Qiang Fang:
An Efficient Deep Learning Based Method for Speech Assessment of Mandarin-Speaking Aphasic Patients. IEEE J. Biomed. Health Informatics 24(11): 3191-3202 (2020) - [c31]Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, Guojun Peng:
JTaint: Finding Privacy-Leakage in Chrome Extensions. ACISP 2020: 563-583 - [c30]Luman Shi, Jiang Ming, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, Xuanchen Pan:
VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. CCS 2020: 535-549 - [c29]Guga Suri, Jianming Fu, Rui Zheng, Xinying Liu:
Family Identification of AGE-Generated Android Malware Using Tree-Based Feature. TrustCom 2020: 386-393
2010 – 2019
- 2019
- [j6]Akshay Kumar, Qiang Fang, Jianming Fu, Elena Pirogova, Xudong Gu:
Error-Related Neural Responses Recorded by Electroencephalography During Post-stroke Rehabilitation Movements. Frontiers Neurorobotics 13: 107 (2019) - [j5]Qiang Fang, Seedahmed S. Mahmoud, Xudong Gu, Jianming Fu:
A Novel Multistandard Compliant Hand Function Assessment Method Using an Infrared Imaging Device. IEEE J. Biomed. Health Informatics 23(2): 758-765 (2019) - [c28]Luman Shi, Jianming Fu, Zhengwei Guo, Jiang Ming:
"Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps. MobiSys 2019: 222-235 - [c27]Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, Guojun Peng:
Web Scanner Detection Based on Behavioral Differences. SocialSec 2019: 1-16 - [i1]Yanzhen Ren, Dengkai Liu, Qiaochu Xiong, Jianming Fu, Lina Wang:
Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram. CoRR abs/1901.06838 (2019) - 2018
- [c26]Han Xu, Mingming Zhang, Yibin Li, Dong Xu, Jianming Fu, Xu Zhang, Xiaolong Li, Sheng Quan Xie:
Development of a Pneumatic Robotic System for Bilateral Upper Limb Interactive Training with Variable Resistance. AIM 2018: 968-973 - [c25]Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion:
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. CCS 2018: 395-411 - [c24]Jianming Fu, Rui Jin, Yan Lin, Baihe Jiang, Zhengwei Guo:
Function Risk Assessment Under Memory Leakage. NaNA 2018: 284-291 - 2017
- [j4]Binlin Cheng, Jianming Fu:
Social Bots Detection on Mobile Social Networks. Int. J. Netw. Secur. 19(1): 163-166 (2017) - [c23]Jianming Fu, Jianwei Huang, Lanxin Zhang:
Curtain: Keep Your Hosts Away from USB Attacks. ISC 2017: 455-471 - [c22]Jianming Fu, Mengfei Xie, Yingjun Wang, Xufen Mei:
An Empirical Study of Unsolicited Content Injection into a Website. NaNA 2017: 104-111 - [c21]Jianming Fu, Rui Jin, Yan Lin:
FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection. SecureComm 2017: 659-672 - 2016
- [j3]Letian Sha, Liwen He, Jianming Fu, Jing Sun, Pengwei Li:
SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. Secur. Commun. Networks 9(13): 1944-1957 (2016) - [c20]Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu:
Control Flow Integrity Enforcement with Dynamic Code Optimization. ISC 2016: 366-385 - [c19]Jianming Fu, Yan Lin, Xu Zhang:
Impact of Environment on Branch Transfer of Software. SecureComm 2016: 575-593 - [c18]Jianming Fu, Yan Lin, Xu Zhang:
Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. Trustcom/BigDataSE/ISPA 2016: 394-401 - [c17]Jianming Fu, Pengwei Li, Yan Lin, Shuang Ding:
Android App Malicious Behavior Detection Based on User Intention. Trustcom/BigDataSE/ISPA 2016: 560-567 - 2015
- [j2]Xinguo Li, Pengwei Li, Jianming Fu, Xiaoyi Ding:
一种安全风险可控的弹性移动云计算通用框架 (Risk-controllable Common Elastic Mobile Cloud Computing Framework). 计算机科学 42(Z11): 357-363 (2015) - [c16]Jianming Fu, Xu Zhang, Yan Lin:
An Instruction-Set Randomization Using Length-Preserving Permutation. TrustCom/BigDataSE/ISPA (1) 2015: 376-383 - 2014
- [c15]Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li:
Computation Integrity Measurement Based on Branch Transfer. TrustCom 2014: 590-597 - 2013
- [c14]Jian Yang, Huanguo Zhang, Jianming Fu:
A Fuzzing Framework Based on Symbolic Execution and Combinatorial Testing. GreenCom/iThings/CPScom 2013: 2076-2080 - 2012
- [c13]Liquan Guo, Jiping Wang, Qiang Fang, Xudong Gu, Jianming Fu:
Motion recognition for unsupervised hand rehabilitation using support vector machine. BioCAS 2012: 104-107 - 2011
- [c12]Jianming Fu, Xinwen Liu, Binling Cheng:
Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing. TrustCom 2011: 328-335 - 2010
- [j1]Huanguo Zhang, Fei Yan, Jianming Fu, Mingdi Xu, Yang Yang, Fan He, Jing Zhan:
Research on theory and key technology of trusted computing platform security testing and evaluation. Sci. China Inf. Sci. 53(3): 434-453 (2010)
2000 – 2009
- 2008
- [c11]Peng Li, Hyundo Park, Debin Gao, Jianming Fu:
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. ACSAC 2008: 392-401 - [c10]Jianming Fu, Huijun Xiong, Zhou Li, Huanguo Zhang:
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. AICCSA 2008: 718-725 - [c9]Fanchen Su, Zhiyi Yin, Haitao Yao, Jianming Fu, Fuxi Zhu:
Fingerprint Extraction of Executables Based on the Potential Field Graph of Callgraph. CSSE (3) 2008: 974-977 - [c8]Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu:
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. ICYCS 2008: 2283-2288 - [c7]Zhiyi Yin, Jianming Fu, Fuxi Zhu, Fanchen Su, Haitao Yao, Fen Liu:
Fingerprinting Executable Programs Based on Color Moments of a Novel Abstract Call Graph. ICYCS 2008: 2319-2324 - 2007
- [c6]Jianming Fu, Binglan Chen, Huanguo Zhang:
A Worm Containment Model Based on Neighbor-Alarm. ATC 2007: 449-457 - 2006
- [c5]Jianming Fu, Hui Fan:
Assigning Block Size Based on Speculation for Parallel Downloading. CIT 2006: 119 - 2005
- [c4]Yichun Liu, Jianming Fu, Huanguo Zhang:
An Optimistic Fair Protocol for P2P Chained Transaction. ASIAN 2005: 136-145 - [c3]Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang:
An Adaptive Service Strategy Based on User Rating in P2P. GCC 2005: 860-870 - 2004
- [c2]Jianming Fu, Xian Yi, Huanguo Zhang:
Modeling the Behavior of Ada Tasks and Verifying Its Safety. CIT 2004: 676-680 - [c1]Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan:
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. NPC 2004: 443-450
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-14 18:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint