Liu Hui

ORCID: 0000-0002-5465-7804
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Direction-of-Arrival Estimation Techniques
  • Blockchain Technology Applications and Security
  • Blind Source Separation Techniques
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Structural Health Monitoring Techniques
  • Software System Performance and Reliability

Institute of Software
2024

Nanjing University
2024

Beijing Jiaotong University
2021

Abstract “Shift To Left” is the cornerstone of successful implementation DevSecOps. By testing projects for vulnerabilities in early stages development, teams can save overall costs before security issues reach build phase. As one popular practices Left,” Software Composition Analysis (SCA) system aims to leverage Bill Materials (SBOM) enhance software supply chain security. However, SBOM lacks mature generation and distribution mechanisms, requiring incentive measures drive industry...

10.1002/smr.2675 article EN Journal of Software Evolution and Process 2024-06-11

As the access control mode of notepad files cannot meet requirements risk for sensitive file hierarchical access, this paper proposes an application classification-based detection method abnormal to files. The classification and classification, policy mapping, basic preset are designed. Combining operating system’s identification different applications at runtime, we monitor by applications. cross-access experiment levels verified effectiveness security strategy reduced disclosure

10.1155/2021/6684456 article EN cc-by Security and Communication Networks 2021-03-13

Web services have covered all areas of social life, and various browsers become necessary software on computers mobile phones, they are also the entrances to services. All kinds threats web data security continue appear, so focus security. In response requirements service for access entity identification control, this paper proposes a multi-dimensional browser fingerprint detection method based adversarial learning, designs control framework combined with detection. Through joint use...

10.13052/jwe1540-9589.20512 article EN Journal of Web Engineering 2021-08-26
Coming Soon ...