default search action
Chaojing Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Xiaolei Wang, Bin Zhang, Chaojing Tang, Long Zhang:
Highly Comprehensive and Efficient Memory Safety Enforcement with Pointer Tagging. DSN-W 2024: 74-81 - 2023
- [c39]Wei Zhao, Zhiwei Li, Ruilin Li, Chaojing Tang:
CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior. ICCNS 2023: 6-11 - [c38]Runhao Li, Bin Zhang, Jiongyi Chen, Wenfeng Lin, Chao Feng, Chaojing Tang:
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs. NDSS 2023 - [c37]Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang:
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing. USENIX Security Symposium 2023: 4499-4515 - 2022
- [j31]Bin Zhang, Jiaxi Ye, Ruilin Li, Chao Feng, Yunfei Su, Chaojing Tang:
Pusher: an augmented fuzzer based on the connection between input and comparison operand. Frontiers Comput. Sci. 16(4): 164206 (2022) - [j30]Gang Yang, Chaojing Tang, Xingtong Liu:
DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective. Symmetry 14(10): 2138 (2022) - [c36]Zhiyuan Jiang, Shuitao Gan, Adrian Herrera, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer:
Evocatio: Conjuring Bug Capabilities from a Single PoC. CCS 2022: 1599-1613 - [c35]Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Wenrui Diao, Kehuan Zhang, Jing Lei, Chaojing Tang:
Default: Mutual Information-based Crash Triage for Massive Crashes. ICSE 2022: 635-646 - 2021
- [j29]Zhipeng Pan, Jing Lei, Lei Wen, Chaojing Tang, Zhongfeng Wang:
Low-complexity sphere decoding for MIMO-SCMA systems. IET Commun. 15(4): 537-545 (2021) - [c34]Zhiyuan Jiang, Xiyue Jiang, Ahmad Hazimeh, Chaojing Tang, Chao Zhang, Mathias Payer:
Igor: Crash Deduplication Through Root-Cause Clustering. CCS 2021: 3318-3336 - [c33]Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Yunfei Su, Bin Zhang, Jing Lei, Chaojing Tang:
Reducing Test Cases with Attention Mechanism of Neural Networks. USENIX Security Symposium 2021: 2075-2092 - 2020
- [j28]Weixu Shi, Chaojing Tang:
Number of quantum measurement outcomes as a resource. Quantum Inf. Process. 19(10): 393 (2020)
2010 – 2019
- 2019
- [j27]Xiayang Chen, Xingtong Liu, Lei Zhang, Chaojing Tang:
Optimal Defense Strategy Selection for Spear-Phishing Attack Based on a Multistage Signaling Game. IEEE Access 7: 19907-19921 (2019) - [j26]Jiaxi Ye, Bin Zhang, Ruilin Li, Chao Feng, Chaojing Tang:
Program State Sensitive Parallel Fuzzing for Real World Software. IEEE Access 7: 42557-42564 (2019) - [j25]Xing Zhang, Chao Feng, Runhao Li, Jing Lei, Chaojing Tang:
NeuralTaint: A Key Segment Marking Tool Based on Neural Network. IEEE Access 7: 68786-68798 (2019) - [j24]Runhao Li, Chao Feng, Xing Zhang, Chaojing Tang:
A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks. IEEE Access 7: 80079-80092 (2019) - [j23]Runhao Li, Chen Zhang, Chao Feng, Xing Zhang, Chaojing Tang:
Locating Vulnerability in Binaries Using Deep Neural Networks. IEEE Access 7: 134660-134676 (2019) - [j22]Zhipeng Pan, Jing Lei, Wei Liu, Junshan Luo, Chaojing Tang:
Grant-Free Rateless SCMA for Cellular Internet of Things Networks. IEEE Access 7: 147954-147961 (2019) - [j21]Xing Zhang, Chao Feng, Runhao Li, Jing Lei, Chaojing Tang:
Marking Key Segment of Program Input via Attention Mechanism. IEEE Access 7: 183877-183891 (2019) - [j20]Zhipeng Pan, Junshan Luo, Jing Lei, Lei Wen, Chaojing Tang:
Uplink Spatial Modulation SCMA System. IEEE Commun. Lett. 23(1): 184-187 (2019) - [j19]Zhipeng Pan, Wei Liu, Jing Lei, Junshan Luo, Lei Wen, Chaojing Tang:
Multi-Dimensional Space-Time Block Coding Aided Downlink MIMO-SCMA. IEEE Trans. Veh. Technol. 68(7): 6657-6669 (2019) - 2018
- [j18]Yi Liu, Xingtong Liu, Chaojing Tang, Jian Wang, Lei Zhang:
Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin. IEEE Access 6: 23261-23270 (2018) - [j17]Zhipeng Pan, Erbao Li, Lei Zhang, Jing Lei, Chaojing Tang:
Design and Optimization of Joint Iterative Detection and Decoding Receiver for Uplink Polar Coded SCMA System. IEEE Access 6: 52014-52026 (2018) - [j16]Jiao Hu, Ruilin Li, Chaojing Tang:
A real-time inversion attack on the GMR-2 cipher used in the satellite phones. Sci. China Inf. Sci. 61(3): 032113:1-032113:18 (2018) - [j15]Xiayang Chen, Chaojing Tang, Jian Wang, Lei Zhang, Qingkun Meng:
Improved Wolf Pack Algorithm Based on Differential Evolution Elite Set. IEICE Trans. Inf. Syst. 101-D(7): 1946-1949 (2018) - [j14]Yi Liu, Qingkun Meng, Xingtong Liu, Jian Wang, Lei Zhang, Chaojing Tang:
Formal Method for Security Analysis of Electronic Payment Protocols. IEICE Trans. Inf. Syst. 101-D(9): 2291-2297 (2018) - [j13]Bin Zhang, Chao Feng, Adrian Herrera, Vitaly Chipounov, George Candea, Chaojing Tang:
Discover deeper bugs with dynamic symbolic execution and coverage-based fuzz testing. IET Softw. 12(6): 507-519 (2018) - [j12]Zhiyuan Jiang, Chao Feng, Chaojing Tang:
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. Secur. Commun. Networks 2018: 4610320:1-4610320:21 (2018) - [c32]Xiayang Chen, Chaojing Tang, Lei Zhang, Yi Liu:
Improved wolf pack algorithm with differential evolution for global numerical optimization. ICACI 2018: 116-121 - [c31]Yuan Xia, Chao Feng, Xing Zhang, Runhao Li, Chaojing Tang:
Parallelization of Extracting Binary Program Execution Trace Offline. ICAIP 2018: 184-188 - [c30]Yang Li, Chao Feng, Chaojing Tang:
A Large-scale Parallel Fuzzing System. ICAIP 2018: 194-197 - [c29]Zhipeng Pan, Erbao Li, Lei Wen, Jing Lei, Chaojing Tang:
Joint Iterative Detection and Decoding Receiver for Polar Coded SCMA System. ICC Workshops 2018: 1-6 - 2017
- [j11]Ran Ji, Jian Wang, Chaojing Tang, Ruilin Li:
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs. Secur. Commun. Networks 2017: 1308045:1-1308045:9 (2017) - [c28]Yi Liu, Ruilin Li, Xingtong Liu, Jian Wang, Chaojing Tang, Hongyan Kang:
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm. CIS 2017: 317-321 - [c27]Jiaxi Ye, Bin Zhang, Ziqing Ye, Chao Feng, Chaojing Tang:
Improving the Cooperation of Fuzzing and Symbolic Execution by Test-cases Prioritizing. CIS 2017: 543-547 - [c26]Bin Zhang, Jiaxi Ye, Chao Feng, Chaojing Tang:
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing. CIS 2017: 548-552 - [c25]Yi Liu, Xingtong Liu, Lei Zhang, Chaojing Tang, Hongyan Kang:
An efficient strategy to eliminate malleability of bitcoin transaction. ICSAI 2017: 960-964 - [c24]Xiayang Chen, Chaojing Tang, Jian Wang, Lei Zhang, Yi Liu:
A Novel Hybrid Based on Wolf Pack Algorithm and Differential Evolution Algorithm. ISCID (1) 2017: 69-74 - [c23]Yi Liu, Xiayang Chen, Lei Zhang, Chaojing Tang, Hongyan Kang:
An Intelligent Strategy to Gain Profit for Bitcoin Mining Pools. ISCID (2) 2017: 427-430 - [c22]Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang:
Area-Dividing Route Mutation in Moving Target Defense Based on SDN. NSS 2017: 565-574 - [i2]Yi Liu, Xingtong Liu, Lei Zhang, Jian Wang, Chaojing Tang:
Novel Logical Method for Security Analysis of Electronic Payment Protocols. CoRR abs/1706.10078 (2017) - [i1]Jiao Hu, Ruilin Li, Chaojing Tang:
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones. IACR Cryptol. ePrint Arch. 2017: 655 (2017) - 2016
- [c21]Qingkun Meng, Shameng Wen, Chao Feng, Chaojing Tang:
Predicting buffer overflow using semi-supervised learning. CISP-BMEI 2016: 1959-1963 - [c20]Ran Ji, Haifeng Li, Chaojing Tang:
Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning. CIS 2016: 309-313 - [c19]Shameng Wen, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, Chaojing Tang:
Testing Network Protocol Binary Software with Selective Symbolic Execution. CIS 2016: 318-322 - [c18]Jian Liu, Quan Zhang, Chaojing Tang:
Nose Tip Detection and Face Localization from Face Range Image Based on Multi-angle Energy. Edutainment 2016: 136-147 - [c17]Shameng Wen, Chao Feng, Qingkun Meng, Bin Zhang, Ligeng Wu, Chaojing Tang:
Analyzing network protocol binary software with joint symbolic execution. ICSAI 2016: 738-742 - [c16]Bin Zhang, Chao Feng, Bo Wu, Chaojing Tang:
Detecting integer overflow in Windows binary executables based on symbolic execution. SNPD 2016: 385-390 - 2015
- [j10]Wei Liu, Jing Lei, Muhammad Ali Imran, Chaojing Tang:
Diversity gain of lattice constellation-based joint orthogonal space-time block coding. IET Commun. 9(18): 2274-2280 (2015) - [j9]Bo Zhang, Xingtong Liu, Jian Wang, Chaojing Tang:
Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party. Quantum Inf. Process. 14(12): 4593-4600 (2015) - [c15]Haifeng Li, Bo Shuai, Jian Wang, Chaojing Tang:
Protocol Reverse Engineering Using LDA and Association Analysis. CIS 2015: 312-316 - [c14]Bo Shuai, Haifeng Li, Lei Zhang, Quan Zhang, Chaojing Tang:
Software Vulnerability Detection Based on Code Coverage and Test Cost. CIS 2015: 317-321 - [c13]Jian Liu, Quan Zhang, Chen Zhang, Chaojing Tang:
Robust nose tip detection for face range images based on local features in scale-space. IC3D 2015: 1-8 - 2014
- [j8]Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Jian Xu, Quan Zhang, Chaojing Tang:
RFID seeking: Finding a lost tag rather than only detecting its missing. J. Netw. Comput. Appl. 42: 135-142 (2014) - [j7]Xingtong Liu, Bo Zhang, Jian Wang, Chaojing Tang, Jingjing Zhao:
Differential phase shift quantum private comparison. Quantum Inf. Process. 13(1): 71-84 (2014) - [j6]Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Chao Wang, Chaojing Tang:
TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer. Secur. Commun. Networks 7(5): 934-944 (2014) - [c12]Jian Liu, Quan Zhang, Chaojing Tang:
Find Dense Correspondence between High Resolution Non-rigid 3D Human Faces. BIC-TA 2014: 259-275 - [c11]Shiyou Xu, Chaojing Tang, Peiliang Jing, Zengping Chen:
Efficient centralized track initiation method for multistatic radar. FUSION 2014: 1-7 - 2013
- [c10]Bo Shuai, Haifeng Li, Mengjun Li, Quan Zhang, Chaojing Tang:
Software Defect Prediction Using Dynamic Support Vector Machine. CIS 2013: 260-263 - [c9]Bo Shuai, Haifeng Li, Mengjun Li, Quan Zhang, Chaojing Tang:
Automatic classification for vulnerability based on machine learning. ICIA 2013: 312-318 - [c8]Anqi Huang, Chen Zhang, Chaojing Tang:
Another Improvement of LMAP++: An RFID Authentication Protocol. ISCTCS 2013: 100-106 - 2012
- [j5]Xi Zhang, Xiaofei Wang, Anna Liu, Quan Zhang, Chaojing Tang:
PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks. KSII Trans. Internet Inf. Syst. 6(4): 973-988 (2012) - [c7]Wei Liu, Mathini Sellathurai, Jing Lei, Jibo Wei, Chaojing Tang:
Completely decoupled space-time block codes with low-rate feedback. ISIT 2012: 2929-2933 - 2011
- [c6]Qiang Wang, Xue Qiu, Quan Zhang, Chaojing Tang:
Key Privacy in McEliece Public Key Cryptosystem. TrustCom 2011: 824-828 - 2010
- [j4]Wei Liu, Mathini Sellathurai, Chaojing Tang, Jibo Wei:
Achieving space and time diversity by using lattice constellation based joint Alamouti coding. IEEE Commun. Lett. 14(1): 33-35 (2010) - [j3]Lei Zhang, Chengjin An, Quan Zhang, Chaojing Tang:
Misbehavior Detection Algorithm in CCSDS Space Telecommand System. IEEE Commun. Lett. 14(8): 746-748 (2010) - [j2]Wei Liu, Mathini Sellathurai, Jibo Wei, Chaojing Tang:
A Cyclotomic Lattice Based Quasi-Orthogonal STBC for Eight Transmit Antennas. IEEE Signal Process. Lett. 17(4): 394-397 (2010)
2000 – 2009
- 2009
- [j1]Lei Zhang, Susanna Spinsante, Chaojing Tang, Ennio Gambi:
Application and performance analysis of various AEAD techniques for space telecommand authentication. IEEE Trans. Wirel. Commun. 8(1): 308-319 (2009) - [c5]Wei Liu, Mathini Sellathurai, Pei Xiao, Chaojing Tang, Jibo Wei:
Improved design of two and four-group decodable STBCs with larger diversity product for eight transmit antennas. ICASSP 2009: 2737-2740 - [c4]Chun-lin Xiong, Hua Wang, Xiaoying Zhang, Ji-Bo Wei, Chaojing Tang:
Low Complexity Variational Bayes Iterative Receiver for MIMO-OFDM Systems. ICC 2009: 1-5 - [c3]Chun-lin Xiong, De-Gang Wang, Xiaoying Zhang, Ji-Bo Wei, Chaojing Tang:
Recursive channel estimation algorithms for iterative receiver in MIMO-OFDM systems. WCNC 2009: 785-789 - 2008
- [c2]Xingtong Liu, Quan Zhang, Chaojing Tang, Jingjing Zhao, Jian Liu:
A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation. ISIP 2008: 417-421 - 2005
- [c1]Xingyang Guo, Quan Zhang, Chaojing Tang:
On the Security of Two Key-Updating Signature Schemes. ACISP 2005: 506-517
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 02:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint