default search action
Jinku Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Zhuo Chen, Lei Wu, Yubo Hu, Jing Cheng, Yufeng Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. IEEE Trans. Dependable Secur. Comput. 21(4): 3406-3421 (2024) - 2023
- [c13]Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. CCS 2023: 341-355 - [c12]Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma:
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. CCS 2023: 2725-2739 - [c11]Nanzi Yang, Wenbo Shen, Jinku Li, Xunqi Liu, Xin Guo, Jianfeng Ma:
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications. CCS 2023: 3048-3062 - [c10]Zhuo Chen, Jie Liu, Yubo Hu, Lei Wu, Yajin Zhou, Yiling He, Xianhao Liao, Ke Wang, Jinku Li, Zhan Qin:
DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity. ISSTA 2023: 223-235 - [c9]Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren:
Demystifying Pointer Authentication on Apple M1. USENIX Security Symposium 2023: 2833-2848 - [c8]Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma:
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding. USENIX Security Symposium 2023: 7517-7534 - 2022
- [j12]Jun Qiu, Xuewu Yang, Huamao Wu, Yajin Zhou, Jinku Li, Jianfeng Ma:
LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications. IEEE Trans. Dependable Secur. Comput. 19(5): 2873-2889 (2022) - [j11]Wei Chen, Jinku Li, Yi Li, Maomao Zhang, Lihui Peng:
Conductance Sensor With Self-Calibration and Venturi Tube Based Flowrate Measurement for Gas-Water Slug Flow. IEEE Trans. Instrum. Meas. 71: 1-14 (2022) - 2021
- [j10]Jinku Li, Delin Hu, Wei Chen, Yi Li, Maomao Zhang, Lihui Peng:
CNN-Based Volume Flow Rate Prediction of Oil-Gas-Water Three-Phase Intermittent Flow from Multiple Sensors. Sensors 21(4): 1245 (2021) - [j9]Wei Chen, Jinku Li, Yi Li, Maomao Zhang, Lihui Peng:
Flowrate Estimation of Horizontal Gas-Water Slug Flow Based on Venturi Tube and Conductance Sensor. IEEE Trans. Instrum. Meas. 70: 1-10 (2021) - [c7]Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. CCS 2021: 764-778 - [i2]Zhuo Chen, Lei Wu, Jing Cheng, Yubo Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE. CoRR abs/2106.05756 (2021) - 2020
- [j8]Fei Tang, Boyang Ma, Jinku Li, Fengwei Zhang, Jipeng Su, Jianfeng Ma:
RansomSpector: An introspection-based approach to detect crypto ransomware. Comput. Secur. 97: 101997 (2020) - [j7]Xiaonan Zhu, Jinku Li, Yajin Zhou, Jianfeng Ma:
AdCapsule: Practical Confinement of Advertisements in Android Applications. IEEE Trans. Dependable Secur. Comput. 17(3): 479-492 (2020) - [j6]Delin Hu, Jinku Li, Yinyan Liu, Yi Li:
Flow Adversarial Networks: Flowrate Prediction for Gas-Liquid Multiphase Flows Across Different Domains. IEEE Trans. Neural Networks Learn. Syst. 31(2): 475-487 (2020)
2010 – 2019
- 2019
- [j5]Qingsong Yao, Jianfeng Ma, Rui Li, Xinghua Li, Jinku Li, Jiao Liu:
Energy-Aware RFID Authentication in Edge Computing. IEEE Access 7: 77964-77980 (2019) - [c6]Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. RAID 2019: 47-60 - [i1]Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. CoRR abs/1904.01981 (2019) - 2018
- [j4]Jinku Li, Yangtian Ye, Yajin Zhou, Jianfeng Ma:
CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages. IEEE Access 6: 10107-10120 (2018) - [j3]Jin Zheng, Jinku Li, Yi Li, Lihui Peng:
A Benchmark Dataset and Deep Learning-Based Image Reconstruction for Electrical Capacitance Tomography. Sensors 18(11): 3701 (2018) - [j2]Jinku Li, Xiaomeng Tong, Fengwei Zhang, Jianfeng Ma:
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. IEEE Trans. Inf. Forensics Secur. 13(6): 1535-1550 (2018) - 2016
- [c5]Qingsong Yao, Jianfeng Ma, Cong Sun, Xinghua Li, Jinku Li:
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags. MSCC@MobiHoc 2016: 23-28 - 2014
- [c4]Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma:
Verifying Secure Interface Composition for Component-Based System Designs. APSEC (1) 2014: 359-366 - 2011
- [j1]Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang:
Comprehensive and Efficient Protection of Kernel Control Data. IEEE Trans. Inf. Forensics Secur. 6(4): 1404-1417 (2011) - 2010
- [c3]Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace, Sina Bahram:
Defeating return-oriented rootkits with "Return-Less" kernels. EuroSys 2010: 195-208 - [c2]Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. SecureComm 2010: 162-180 - [c1]Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu:
DKSM: Subverting Virtual Machine Introspection for Fun and Profit. SRDS 2010: 82-91
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint