default search action
Qingbao Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j17]Ye Wang, Qingbao Li, Zhifeng Chen, Ping Zhang, Guimin Zhang, Zhihui Shi:
BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity. Inf. Softw. Technol. 136: 106572 (2021) - 2020
- [j16]Jinjin Liu, Qingbao Li, Ping Zhang, Guimin Zhang, Ming Liu:
Unpaired Domain Transfer for Data Augment in Face Recognition. IEEE Access 8: 39349-39360 (2020) - [j15]Xinbing Zhu, Qingbao Li, Zhifeng Chen, Guimin Zhang, Peng Shan:
Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes. IEEE Access 8: 150226-150241 (2020) - [j14]Ming Liu, Jinjin Liu, Ping Zhang, Qingbao Li:
PA-GAN: A Patch-Attention Based Aggregation Network for Face Recognition in Surveillance. IEEE Access 8: 152780-152789 (2020) - [j13]Zhiguo Yang, Qingbao Li, Ping Zhang, Zhifeng Chen:
Reverse Engineering of Intel Microcode Update Structure. IEEE Access 8: 169676-169687 (2020) - [j12]Jinjin Liu, Qingbao Li, Ming Liu, Tongxin Wei:
CP-GAN: A Cross-Pose Profile Face Frontalization Boosting Pose-Invariant Face Recognition. IEEE Access 8: 198659-198667 (2020) - [j11]Ye Wang, Qingbao Li, Zhifeng Chen, Ping Zhang, Guimin Zhang:
Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks. Comput. Secur. 89 (2020) - [j10]Ye Wang, Qingbao Li, Zhifeng Chen, Ping Zhang, Guimin Zhang:
A Survey of Exploitation Techniques and Defenses for Program Data Attacks. J. Netw. Comput. Appl. 154: 102534 (2020) - [c13]Guoxiao Zong, Qingbao Li, Ping Zhang, Guimin Zhang, Xinbing Zhu:
Efficient Cache Strategy for Face Recognition System. ICBDC 2020: 108-113 - [c12]Zhongxin Yang, Zhifeng Chen, Ping Zhang, Ming Liu, Qingbao Li:
An Information Intelligent Search Method for Computer Forensics Based on Text Similarity. ICCSP 2020: 79-83 - [c11]Guoxiao Zong, Qingbao Li, Ping Zhang, Guimin Zhang:
Refined CNNs for Face Recognition Applications on Embedded Devices. ICMLC 2020: 307-312
2010 – 2019
- 2019
- [j9]Peijun Feng, Qingbao Li, Ping Zhang, Zhifeng Chen:
Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications. IEEE Access 7: 16695-16703 (2019) - [j8]Ye Wang, Zhifeng Chen, Qingbao Li, Ping Zhang, Guimin Zhang:
DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software. IEEE Access 7: 73455-73468 (2019) - [j7]Xinbing Zhu, Qingbao Li, Ping Zhang, Zhifeng Chen:
A Firmware Code Gene Extraction Technology for IoT Terminal. IEEE Access 7: 179591-179604 (2019) - [j6]Ye Wang, Qingbao Li, Ping Zhang, Zhifeng Chen, Guimin Zhang:
DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton. Comput. Secur. 81: 94-106 (2019) - [j5]Zhibo Li, Qingbao Li, Lei Yu, Xuemei Hou:
基于划分的自适应随机测试综述 (Survey on Adaptive Random Testing by Partitioning). 计算机科学 46(3): 19-29 (2019) - [c10]Tianxiao Xue, Qingbao Li, Ping Zhang, Zhifeng Chen, Peijun Feng, Nan Luo:
Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm. ICAIS (3) 2019: 430-441 - [c9]Peng Shan, Qingbao Li, Ping Zhang, Yanyang Gu:
Malware Detection Method based on Control Flow Analysis. ICIT 2019: 158-164 - [c8]Ming Liu, Ping Zhang, Qingbao Li, Jinjin Liu, Zhifeng Chen:
LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks. ICVIP 2019: 222-227 - 2018
- [j4]Peijun Feng, Qingbao Li, Ping Zhang, Zhifeng Chen:
Logical acquisition method based on data migration for Android mobile devices. Digit. Investig. 26: 55-62 (2018) - [j3]Guimin Zhang, Qingbao Li, Zhifeng Chen, Ping Zhang:
Defending Non-control-data Attacks using Influence Domain Monitoring. KSII Trans. Internet Inf. Syst. 12(8): 3888-3910 (2018) - [c7]Guangxin Fu, Qingbao Li, Zhifeng Chen, Guangyu Zeng, Juanjuan Gu:
Network Storage Covert Channel Detection Based on Data Joint Analysis. ICCCS (4) 2018: 346-357 - 2017
- [j2]Songhui Guo, Xuerong Gong, Wei Wang, Qingbao Li, Lei Sun:
一种动态优先级排序的虚拟机I/O调度算法 (I/O Scheduling Algorithm Based on Dynamic Prioritization in Virtual Machines). 计算机科学 44(1): 13-19 (2017) - 2015
- [j1]Qingbao Li, Ping Zhang, Guangyu Zeng:
一种基于完整性保护的终端计算机安全防护方法 (Integrity Based Security Protection Method for Terminal Computer). 计算机科学 42(6): 162-166 (2015) - [c6]Zhifeng Chen, Qingbao Li, Songhui Guo, Ye Wang:
Ensuring Kernel Integrity Using KIPBMFH. ICICS 2015: 10-17 - 2013
- [c5]Xiaopeng Niu, Qingbao Li, Wei Wang, Xiaokang Weng:
Binary Program Statistical Features Hiding through Huffman Obfuscated Coding. ICIC (1) 2013: 275-284 - 2012
- [c4]Hongbo Gao, Qingbao Li, Yu Zhu, Yong Liu:
Code-Controlled Hardware Trojan Horse. ICICA (2) 2012: 171-178
2000 – 2009
- 2008
- [c3]Qingbao Li, Hongbo Gao, Bing Xu, Zhiyong Jiao:
Hardware Threat: The Challenge of Information Security. ISCSCT (1) 2008: 517-520 - [c2]Guangyu Zeng, Min Fan, Qingbao Li, Li Zhou:
Research on the Algorithm of Decrypting Encrypted Synchronous Sequential Machine. ISCSCT (1) 2008: 599-602 - [c1]Qingbao Li, Xiaopeng Niu, Guangyu Zeng:
The Design and Implementation of Crossbar in SMP Symmetrical Multi-processor System. ISCSCT (1) 2008: 626-629
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint