Penghui Li

ORCID: 0000-0002-3077-5697
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Web Application Security Vulnerabilities
  • Advanced Malware Detection Techniques
  • Video Surveillance and Tracking Methods
  • Security and Verification in Computing
  • Software Engineering Research
  • Caching and Content Delivery
  • Advanced Decision-Making Techniques
  • Adversarial Robustness in Machine Learning
  • Service-Oriented Architecture and Web Services
  • Robotic Path Planning Algorithms
  • Network Traffic and Congestion Control
  • Software Reliability and Analysis Research
  • Advanced Graph Neural Networks
  • Advanced Measurement and Detection Methods
  • Image Processing and 3D Reconstruction
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Software System Performance and Reliability
  • Advanced Computational Techniques and Applications
  • Advanced Vision and Imaging
  • Topic Modeling
  • Human Motion and Animation
  • Spam and Phishing Detection
  • Artificial Intelligence in Games

Jianghan University
2024

Chinese University of Hong Kong
2021-2023

Qingdao University of Technology
2023

Chongqing Technology and Business University
2023

Yibin University
2023

Ningbo University
2020-2022

Jiangsu Police Officer College
2022

Changchun University of Science and Technology
2022

Beijing Normal University
2022

Shenyang Aerospace University
2021

Directed grey-box fuzzers specialize in testing specific target code. They have been applied to many security applications such as reproducing known crashes and detecting vulnerabilities caused by incomplete patches. However, existing directed favor the inputs discovering new code regardless whether newly uncovered is relevant or not. As a result, would extensively explore irrelevant suffer from low efficiency.In this paper, we distinguish program one that does not help trigger We present...

10.1109/sp46215.2023.10179296 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

Weakly-typed languages such as PHP support loosely comparing two operands by implicitly converting their types and values. Such a language feature is widely used but can also pose severe security threats. In certain conditions, loose comparisons cause unexpected results, leading to authentication bypass other functionality problems.

10.1145/3442381.3449826 article EN 2021-04-19

10.1007/s00521-023-08839-9 article EN Neural Computing and Applications 2023-07-16

Graph database systems (GDBs) have supported many important real-world applications such as social networks, logistics, and path planning. Meanwhile, logic bugs are also prevalent in GDBs, leading to incorrect results severe consequences. However, the largely cannot be revealed by prior solutions which unaware of graph native structures data. In this paper, we propose Gamera (Graph-aware metamorphic relations), a novel testing approach uncover unknown GDBs. We design three classes...

10.14778/3636218.3636236 article EN Proceedings of the VLDB Endowment 2023-12-01

With the continuous development of mobile internet, smart terminal is now tightly integrated in information system. As extension traditional system, real-time problem data transfer for has become particularly important. In process based on Android platform, method pulling can keep synchronization between and server-side. Each to poll server see whether updated, which wastes a lot unnecessary network traffic mobile-phone battery. order overcome weakness method, we create an application using...

10.1109/iccis.2013.397 article EN International Conference on Computational and Information Sciences 2013-06-01

Symbolic execution has been widely applied in detecting vulnerabilities web applications. Modeling language-specific built-in functions is essential for symbolic execution. Since tend to be complicated and are typically implemented low-level languages, a common strategy manually translate them into the SMT-LIB language constraint solving. Such translation requires an excessive amount of human effort deep understandings function behaviors. Incorrect can invalidate final results. This problem...

10.1145/3442381.3450002 article EN 2021-04-19

PHP applications provide various interfaces for end-users to interact with on the Web. They thus are prone taint-style vulnerabilities such as SQL injection and cross-site scripting. For its high efficiency, static taint analysis is widely adopted detect before application deployment. Unfortunately, due complexity of language, implementing a precise difficult. The existing solutions suffer from both false positives negatives because their incomprehensive inter-procedural variety...

10.1145/3548606.3559391 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

In view of the random retail price and retailer’s preference for risk aversion, we used mean-variance to describe uncertainty price. To study impacts both aversion on supply chain (SC) decision-making, constructed a SC game model based three different power structures, including Manufacturer Stackelberg (MS) game, Retailer (RS) Vertical Nash (VN) game. The results showed that weakened manufacturer’s production effort input, decreased enthusiasm ordering, damaged interests manufacturer...

10.14743/apem2023.1.460 article EN Advances in Production Engineering & Management 2023-03-30

At present, face recognition has been widely used, and in mobile devices a broad application prospect. We try to detect extract faces by extracting Haar-like features then put the images into Convolutional Neural Network (CNN) for training recognition. improve MobileNetV2, use ArcFace classification, test CNN classification program on Raspberry Pi 4B. The is based idea of transfer learning. extraction part network loads weight file, only fully connected layers are trained. Finally, accuracy...

10.1109/isaiam53259.2021.00031 article EN 2021-05-01

Markdown compilers are widely used for translating plain text into formatted text, yet they suffer from performance bugs that cause degradation and resource exhaustion. Currently, there is little knowledge understanding about these in the wild. In this work, we first conduct a comprehensive study of known compilers. We identify ways handle language's context-sensitive features dominant root bugs. To detect unknown bugs, develop MdPerfFuzz, fuzzing framework with syntax-tree based mutation...

10.1109/ase51524.2021.9678611 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2021-11-01

Against traditional collaborative filtering algorithm often face the problems of high sparsity and low recommendation accuracy, we propose convolution autoencoder CCAE, which replaces matrix decomposition training method in with method. First, input data drop sampling through layer downsampling to learn its efficient compression characteristics, then reconstruct deconvolution upsampling layer, calculate score ranking for recommendation. Experimental results show that CCAE achieves lower RMSE...

10.1145/3375998.3376031 article EN 2019-12-13

Bandwidth-sensitive applications rely on the accurate estimation of bottleneck bandwidth. The real-time bandwidth prediction enables application to cope with fluctuation and adjust transmission strategy improve Quality Experience (QoE) user. traditional model hardly considers characteristics in various scenarios, making it challenging achieve high accuracy. In this paper, we propose ALSTM model, which is based Long Short Term Memory (LSTM) recurrent neural network attention mechanism for...

10.1109/icpads53394.2021.00018 article EN 2021-12-01

10.1109/iaeac59436.2024.10503870 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2024-03-15

Fuzzing has shown great promise in detecting vulnerabilities server-side web applications. In this work, we introduce an innovative software-based data cache mechanism that complements and improves all existing application fuzzing tools. Our key observation is a proportion of execution time (e.g., 50%) applications spent on fetching from two major sources: database network; our in-depth investigation reveals the same often repeatedly fetched across trials. We thus design new solution,...

10.1145/3658644.3670278 article EN 2024-12-02

Uterine fibroid (UF) represents the most frequent tumor in women, posing a significant risk for complications, such as miscarriage. Diagnostic accuracy may be affected by physician inexperience and fatigue. We propose deep learning model, combining MobileNetV2 convolutional generative adversarial networks (DCGAN), to support physicians identifying UF assessing its characteristics. Our model leverages superior data augmentation capabilities of DCGAN generate high-quality ultrasound images,...

10.1049/icp.2023.3172 article EN IET conference proceedings. 2024-01-16

10.1109/itnec60942.2024.10733040 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2024-09-20

Dynamic methods have shown great promise in validating vulnerabilities and generating Proof-of-Concept (PoC) exploits of Node.js applications. They typically rely on dictionaries or specifications to determine the values request parameters their relationships. However, they still struggle generate complex inputs from provided specifications.

10.1145/3658644.3690332 article EN 2024-12-02

In the various edge cloud devices within power system, a large amount of discrete data is generated, with most significant being image captured by each construction site. However, due to distance, privacy protection, transmission loss, and other issues, it difficult gather these together for use, resulting in waste valuable resources. Even if are collected, annotating them one challenging, leading limited training effectiveness model. As result, supervision electric operation sites still...

10.1109/pandafpe57779.2023.10141090 article EN 2023-04-01

The problems of moving object detecting and tracking on UAV (Unmanned Aerial Vehicle) platforms in surveillance operations are addressed, a robust method for reliably foreground objects dynamically changing environment is proposed. Firstly, using the modified local feature detector SURF (Speeded Up Robust Features) which linear ordering defined set correspondences, PROSAC (Progressive Sample Consensus) algorithm exploits by similarity function to match detected key points consecutive frames...

10.1109/iih-msp.2015.25 article EN 2015-09-01

A magnetostrictive force sensor that can be used to measure alternating load is presented.Iron-gallium alloy (Galfenol) as the sensing element.The was developed based on a closed structure.A finite element method employed optimally design size of excitation coil and flux path.Simulation results show density distribution clearly improved after optimization.Energy efficiency analysis shows energy proposed increased more than 5 times open structure sensor.To study behavior, discrete...

10.18494/sam.2016.1248 article EN cc-by Sensors and Materials 2016-01-01
Coming Soon ...