default search action
Lin Jiang 0002
Person information
- affiliation: Beijing University of Posts and Telecommunications, Trusted Software and Intelligent System Laboratory, School of Computer Science, China
Other persons with the same name
- Lin Jiang — disambiguation page
- Lin Jiang 0001 — University of Liverpool, Department of Electrical Engineering & Electronics, UK
- Lin Jiang 0003 — Northeastern University, College of Information Science and Engineering, Shenyang, China
- Lin Jiang 0004 — University of Electronic Science and Technology of China, Clinical Hospital of Chengdu Brain Science Institute, MOE Key Lab for Neuroinformation, School of Life Science and Technology, Center for Information in Medicine, Chengdu, China
- Lin Jiang 0005 — University of California, Riverside, USA
- Lin Jiang 0006 — University of Hong Kong
- Lin Jiang 0007 — Florida State University, Tallahassee, FL, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j3]Hongliang Liang, Mingyu Li, Yixiu Chen, Tianqi Yang, Zhuosi Xie, Lin Jiang:
Architectural Protection of Trusted System Services for SGX Enclaves in Cloud Computing. IEEE Trans. Cloud Comput. 9(3): 910-922 (2021) - 2020
- [j2]Hongliang Liang, Mingyu Li, Yixiu Chen, Lin Jiang, Zhuosi Xie, Tianqi Yang:
Establishing Trusted I/O Paths for SGX Client Systems With Aurora. IEEE Trans. Inf. Forensics Secur. 15: 1589-1600 (2020) - [c6]Hongliang Liang, Wenqing Yu, Lu Ai, Lin Jiang:
A Practical Concolic Execution Technique for Large Scale Software Systems. EASE 2020: 312-317 - [c5]Hongliang Liang, Lin Jiang, Lu Ai, Jinyi Wei:
Sequence Directed Hybrid Fuzzing. SANER 2020: 127-137
2010 – 2019
- 2019
- [j1]Hongliang Liang, Yue Yu, Lin Jiang, Zhuosi Xie:
Seml: A Semantic LSTM Model for Software Defect Prediction. IEEE Access 7: 83812-83824 (2019) - [c4]Hongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie:
Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably. APSEC 2019: 434-441 - [c3]Hongliang Liang, Yuxing Yang, Lu Sun, Lin Jiang:
JSAC: A Novel Framework to Detect Malicious JavaScript via CNNs over AST and CFG. IJCNN 2019: 1-8 - [c2]Hongliang Liang, Yini Zhang, Yue Yu, Zhuosi Xie, Lin Jiang:
Sequence coverage directed greybox fuzzing. ICPC 2019: 249-259 - 2018
- [c1]Hongliang Liang, Wenying Hu, Yini Zhang, Lin Jiang, Wuwei Shen:
USE: unified and split execution for exposing divergences between versions. ICSE (Companion Volume) 2018: 386-387 - [i1]Hongliang Liang, Mingyu Li, Qiong Zhang, Yue Yu, Lin Jiang, Yixiu Chen:
Aurora: Providing Trusted System Services for Enclaves On an Untrusted System. CoRR abs/1802.03530 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint