- Ideological and Political Education
- Advanced Malware Detection Techniques
- Research in Cotton Cultivation
- Higher Education and Teaching Methods
- Web Application Security Vulnerabilities
- Berry genetics and cultivation research
- Network Security and Intrusion Detection
- Nanoparticles: synthesis and applications
- Plant and Fungal Interactions Research
- Dyeing and Modifying Textile Fibers
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Computational and Text Analysis Methods
- Software Engineering Research
Institute of Software
2024
Chinese Academy of Sciences
2024
Renmin University of China
2021-2022
Anhui Agricultural University
2007-2013
Chengdu Medical College
2008-2010
Dynamic symbolic execution (DSE) has been successfully adopted for vulnerability detection in desktop and mobile platforms. Unfortunately, we cannot simply extrapolate those techniques to smart contracts. The major challenge is that contracts exhibit a nonuniform data access mode. Other than accessing the via uniform addresses, compromise multiple addressing modes, including flat address mode key-value More seriously, table usually involves additional hash operations obtain keys. In this...
Third-party library (TPL) detection is important for Android app security analysis nowadays. Unfortunately, the existing techniques often suffer from poor scalability. In some situations, time cost even unacceptable. Although a few methods run relatively fast, they cannot provide enough effectiveness, especially non-structure-preserving obfuscated apps, e.g., repackaged and flattened. this paper, we treat TPLs as set inclusion problem to effectively efficiently analyze develop scalable...
To Cloud computing has provided a platform for the display and sharing of big data mining technology (hereinafter referred to as BDMT short). In order prevent leaks privacy, these often contain artificially added multi-dimensional information, which makes process face deep problem. Among them, exploration on ideological political development dynamics investigation judgment college students through network is completed by adopting generalization processing method shared precise large data. As...