default search action
Jinxin Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Liqun Yang, Chaoren Wei, Jian Yang, Jinxin Ma, Hongcheng Guo, Long Cheng, Zhoujun Li:
Seq2Seq-AFL: Fuzzing via sequence-to-sequence model. Int. J. Mach. Learn. Cybern. 15(10): 4403-4421 (2024) - [c19]Rui Liu, Baojiang Cui, Chen Chen, Jinxin Ma:
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning. EIDWT 2024: 307-317 - [i1]Liqun Yang, Chunan Li, Yongxin Qiu, Chaoren Wei, Jian Yang, Hongcheng Guo, Jinxin Ma, Zhoujun Li:
WGAN-AFL: Seed Generation Augmented Fuzzer with Wasserstein-GAN. CoRR abs/2401.16947 (2024) - 2023
- [c18]Liang He, Purui Su, Chao Zhang, Yan Cai, Jinxin Ma:
One Simple API Can Cause Hundreds of Bugs An Analysis of Refcounting Bugs in All Modern Linux Kernels. SOSP 2023: 52-65 - 2022
- [j7]Zhibo Wang, Tengda Zhao, Jinxin Ma, Hongkai Chen, Kaixin Liu, Huajie Shao, Qian Wang, Ju Ren:
Hear Sign Language: A Real-Time End-to-End Sign Language Recognition System. IEEE Trans. Mob. Comput. 21(7): 2398-2410 (2022) - [c17]Zhihao Zhou, Jinxin Ma, Guangnian Wan, Li Su, Haitao Du, Baojiang Cui:
Research on 6G Satellite-Terrestrial Integrated Network Architecture. ICCSIE 2022: 1057-1062 - 2021
- [j6]Chen Chen, Jinxin Ma, Tao Qi, Baojiang Cui, Weikong Qi, Zhaolei Zhang, Peng Sun:
Firmware code instrumentation technology for internet of things-based services. World Wide Web 24(3): 941-954 (2021) - [c16]Fanglei Zhang, Baojiang Cui, Chen Chen, Yiqi Sun, Kairui Gong, Jinxin Ma:
Simulation-Based Fuzzing for Smart IoT Devices. IMIS 2021: 304-313 - 2020
- [j5]Chen Chen, Zhe Jing, Jinxin Ma, Baojiang Cui, Han Xu, Quanchen Zou:
IoTSIT: A Static Instrumentation Tool for IoT Devices. IEEE Access 8: 92153-92161 (2020) - [j4]Xinyao Liu, Baojiang Cui, Junsong Fu, Jinxin Ma:
HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations. Future Gener. Comput. Syst. 108: 390-400 (2020) - [c15]Zhibo Wang, Jinxin Ma, Yongquan Zhang, Qian Wang, Ju Ren, Peng Sun:
Attention-over-Attention Field-Aware Factorization Machine. AAAI 2020: 6323-6330
2010 – 2019
- 2019
- [j3]Hanfang Zhang, Anmin Zhou, Peng Jia, Luping Liu, Jinxin Ma, Liang Liu:
InsFuzz: Fuzzing Binaries With Location Sensitivity. IEEE Access 7: 22434-22444 (2019) - 2018
- [j2]Dong Shen, Zhoujun Li, Xiaojing Su, Jinxin Ma, Robert Huijie Deng:
TinyVisor: An extensible secure framework on android platforms. Comput. Secur. 72: 145-162 (2018) - [j1]Chen Chen, Baojiang Cui, Jinxin Ma, Runpu Wu, Jianchao Guo, Wenqian Liu:
A systematic review of fuzzing techniques. Comput. Secur. 75: 118-137 (2018) - [c14]Jingling Zhao, Zhan Su, Jinxin Ma, Baojiang Cui:
Fuzzing Test Method Based on Constraint-Conditions Priority for LTE-EPC Protocol. CISIS 2018: 465-475 - [c13]Wenchuan Yang, Zhen Fu, Jinxin Ma:
An Optimization Safety Solution for Sip Call Base on ESP. CISIS 2018: 476-485 - [c12]Zhangkai Zhang, Zhoujun Li, Chunhe Xia, Jinhua Cui, Jinxin Ma:
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices. DSC 2018: 325-332 - [c11]Jinxin Ma, Anaelia Ovalle, Diane Myung-kyung Woodbridge:
Medhere: A Smartwatch-based Medication Adherence Monitoring System using Machine Learning and Distributed Computing. EMBC 2018: 4945-4948 - 2017
- [c10]Foqin Wang, Xuehan Zhang, Jinxin Ma, Jin Tang, Aihua Zheng:
Manifold ranking weighted local maximal occurrence descriptor for person re-identification. SERA 2017: 111-114 - 2016
- [c9]Baojiang Cui, Chong Wang, Guowei Dong, Jinxin Ma:
A program behavior recognition algorithm based on assembly instruction sequence similarity. BWCCA 2016: 13-20 - [c8]Baojiang Cui, Yang Wei, Songling Shan, Jinxin Ma:
The generation of XSS attacks developing in the detect detection. BWCCA 2016: 353-361 - 2015
- [c7]Huikang Hao, Zhoujun Li, Yueying He, Jinxin Ma:
Characterization of Android Applications with Root Exploit by Using Static Feature Analysis. ICA3PP (Workshops and Symposiums) 2015: 153-165 - [c6]Jinxin Ma, Tao Zhang, Puhan Zhang:
Enhancing fuzzing with a minimum set solver. ICACI 2015: 23-26 - [c5]Jinxin Ma, Tao Zhang, Puhan Zhang:
Enhancing symbolic execution method with a taint layer. ICACI 2015: 27-31 - [c4]Jiangxiao Zhang, Lina Huo, Xia Liu, Chunrong Sui, Zhoujun Li, Jinxin Ma:
Transferable Optimal-size Fair E-cash with Optimal Anonymity. TASE 2015: 139-142 - 2014
- [c3]Jinxin Ma, Puhan Zhang, Guowei Dong, Shuai Shao, Jiangxiao Zhang:
TWalker: An efficient taint analysis tool. IAS 2014: 18-22 - [c2]Jinxin Ma, Guowei Dong, Puhan Zhang, Tao Guo:
SymWalker: Symbolic Execution in Routines of Binary Code. CIS 2014: 694-698 - 2012
- [c1]Chaojian Hu, Zhoujun Li, Jinxin Ma, Tao Guo, Zhiwei Shi:
File Parsing Vulnerability Detection with Symbolic Execution. TASE 2012: 135-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint