default search action
Weiyu Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xuekai Sun, Tieming Liu, Chunling Liu, Weiyu Dong:
FCNN: Simple neural networks for complex code tasks. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101970 (2024) - [j10]Zicong Gao, Hao Xiong, Weiyu Dong, Rui Chang, Rui Yang, Yajin Zhou, Liehui Jiang:
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing. IEEE Trans. Software Eng. 50(1): 1-15 (2024) - 2023
- [j9]Yonghe Tang, Xuyan Qi, Jing Jing, Chunling Liu, Weiyu Dong:
BHMDC: A byte and hex n-gram based malware detection and classification method. Comput. Secur. 128: 103118 (2023) - [j8]Xuekai Sun, Chunling Liu, Weiyu Dong, Tieming Liu:
Improvements to code2vec: Generating path vectors using RNN. Comput. Secur. 132: 103322 (2023) - [j7]Huajuan Ren, Yonghe Tang, Weiyu Dong, Shuai Ren, Liehui Jiang:
DUEN: Dynamic ensemble handling class imbalance in network intrusion detection. Expert Syst. Appl. 229(Part A): 120420 (2023) - [c11]Huajuan Ren, Ruimin Wang, Weiyu Dong, Junhao Li, Yonghe Tang:
Dynamic Resampling Based Boosting Random Forest for Network Anomaly Traffic Detection. IEA/AIE (2) 2023: 333-344 - 2022
- [j6]Zicong Gao, Weiyu Dong, Rui Chang, Yisen Wang:
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j5]Ruimin Wang, Haitao Li, Jing Jing, Liehui Jiang, Weiyu Dong:
WYSIWYG: IoT Device Identification Based on WebUI Login Pages. Sensors 22(13): 4892 (2022) - [c10]Weiyu Dong, Jian Lin, Rui Chang, Ruimin Wang:
CaDeCFF: Compiler-Agnostic Deobfuscator of Control Flow Flattening. Internetware 2022: 282-291 - 2021
- [c9]Hui Cheng, Weiyu Dong, Yan Zheng, Bo Lv:
Identify IoT Devices through Web Interface Characteristics. ICCCS 2021: 405-410 - [c8]Jiangtao Zhao, Weiyu Dong, Haotian Zhang, Jian Lin:
Dynamic Instrumentation Framework Based on Entity Equipment. ICCCS 2021: 1035-1041 - [c7]Haotian Zhang, Weiyu Dong, Jian Lin:
A Partial-Lifting-Based Compiling Concolic Execution Approach. CSP 2021: 123-128 - [c6]Yan Zheng, Weiyu Dong, Jiangtao Zhao:
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph. CSP 2021: 186-192 - 2020
- [c5]Chengwei Ai, Weiyu Dong, Zicong Gao:
A Novel Concolic Execution Approach on Embedded Device. ICCSP 2020: 47-52
2010 – 2019
- 2019
- [j4]Jian Lin, Liehui Jiang, Yisen Wang, Weiyu Dong:
A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving. IEEE Access 7: 114593-114606 (2019) - [j3]Yuzhu Ren, Weiyu Dong, Jian Lin, Xinliang Miao:
A Dynamic Taint Analysis Framework Based on Entity Equipment. IEEE Access 7: 186308-186318 (2019) - 2018
- [c4]Gongbo Wang, Weiyu Dong, Rui Chang:
Association Analysis of Firmware Based on NoSQL Database. ICCCS (5) 2018: 94-105 - 2017
- [c3]Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong:
Implementing a ARM-Based Secure Boot Scheme for the Isolated Execution Environment. CIS 2017: 336-340 - [c2]Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang:
An Effective Authentication for Client Application Using ARM TrustZone. ISPEC 2017: 802-813 - 2016
- [j2]Weiyu Dong, Jinxin Liu, Xuyan Qi, Hongqi He, Liehui Jiang:
基于热例程的动态二进制翻译优化 (Hot-routine Based Optimization of Dynamic Binary Translation). 计算机科学 43(5): 27-33 (2016) - [c1]Haowei Huang, Liehui Jiang, Weiyu Dong, Rui Chang, Yifan Hou, Michael Gerndt:
A Fine-Granular Programming Scheme for Irregular Scientific Applications. ACA 2016: 130-141 - 2015
- [j1]Weiyu Dong, Ruimin Wang, Xuyan Qi, Yun Zeng:
译码制导的动态二进制翻译优化 (Decoding-directed Dynamic Binary Translation Optimization). 计算机科学 42(6): 189-192 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint