Jiang Jia-sheng

ORCID: 0000-0003-0875-5793
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Ideological and Political Education
  • Advanced Malware Detection Techniques
  • Research in Cotton Cultivation
  • Higher Education and Teaching Methods
  • Web Application Security Vulnerabilities
  • Berry genetics and cultivation research
  • Network Security and Intrusion Detection
  • Nanoparticles: synthesis and applications
  • Plant and Fungal Interactions Research
  • Dyeing and Modifying Textile Fibers
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Computational and Text Analysis Methods
  • Software Engineering Research

Institute of Software
2024

Chinese Academy of Sciences
2024

Renmin University of China
2021-2022

Anhui Agricultural University
2007-2013

Chengdu Medical College
2008-2010

Dynamic symbolic execution (DSE) has been successfully adopted for vulnerability detection in desktop and mobile platforms. Unfortunately, we cannot simply extrapolate those techniques to smart contracts. The major challenge is that contracts exhibit a nonuniform data access mode. Other than accessing the via uniform addresses, compromise multiple addressing modes, including flat address mode key-value More seriously, table usually involves additional hash operations obtain keys. In this...

10.1109/tc.2021.3092639 article EN IEEE Transactions on Computers 2021-06-28

Third-party library (TPL) detection is important for Android app security analysis nowadays. Unfortunately, the existing techniques often suffer from poor scalability. In some situations, time cost even unacceptable. Although a few methods run relatively fast, they cannot provide enough effectiveness, especially non-structure-preserving obfuscated apps, e.g., repackaged and flattened. this paper, we treat TPLs as set inclusion problem to effectively efficiently analyze develop scalable...

10.1109/tse.2022.3215628 article EN IEEE Transactions on Software Engineering 2022-11-03

To Cloud computing has provided a platform for the display and sharing of big data mining technology (hereinafter referred to as BDMT short). In order prevent leaks privacy, these often contain artificially added multi-dimensional information, which makes process face deep problem. Among them, exploration on ideological political development dynamics investigation judgment college students through network is completed by adopting generalization processing method shared precise large data. As...

10.1109/icscse.2018.00159 article EN 2018-12-01
Coming Soon ...