default search action
Donghai Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j26]Jiaqi Chen, Shuhang Han, Donghai Tian, Changzhen Hu:
IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks. J. Netw. Comput. Appl. 233: 104038 (2025) - 2024
- [j25]Qiyuan Li, Yumeng Wang, Donghai Tian, Chong Yuan, Changzhen Hu:
Component-based modeling of cascading failure propagation in directed dual-weight software networks. Comput. Networks 255: 110861 (2024) - [j24]Qiyuan Li, Bo Zhang, Donghai Tian, Xiaoqi Jia, Changzhen Hu:
MDGraph: A novel malware detection method based on memory dump and graph neural network. Expert Syst. Appl. 255: 124776 (2024) - [j23]Xiajing Wang, Rui Ma, Wei Huo, Zheng Zhang, Jinyuan He, Chaonan Zhang, Donghai Tian:
SYNTONY: Potential-aware fuzzing with particle swarm optimization. J. Syst. Softw. 208: 111880 (2024) - [j22]Bo Zhou, Hai Huang, Jun Xia, Donghai Tian:
A novel malware detection method based on API embedding and API parameters. J. Supercomput. 80(2): 2748-2766 (2024) - [c14]Yifeng Wan, Wenting Wang, Jiajun Sun, Donghai Tian:
Directed Fuzzing Based on Bottleneck Detection. CNIOT 2024 - 2023
- [j21]Jiaqi Chen, Chong Yuan, Jiashuo Li, Donghai Tian, Rui Ma, Xiaoqi Jia:
ELAMD: An ensemble learning framework for adversarial malware defense. J. Inf. Secur. Appl. 75: 103508 (2023) - 2022
- [j20]Donghai Tian, Runze Zhao, Rui Ma, Xiaoqi Jia, Qi Shen, Changzhen Hu, Wenmao Liu:
MDCD: A malware detection approach in cloud using deep learning. Trans. Emerg. Telecommun. Technol. 33(11) (2022) - [j19]Qianjin Ying, Yulei Yu, Donghai Tian, Xiaoqi Jia, Rui Ma, Changzhen Hu:
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning. J. Grid Comput. 20(3): 31 (2022) - [j18]Chong Yuan, Jingxuan Cai, Donghai Tian, Rui Ma, Xiaoqi Jia, Wenmao Liu:
Towards time evolved malware identification using two-head neural network. J. Inf. Secur. Appl. 65: 103098 (2022) - [j17]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - 2021
- [j16]Donghai Tian, Qianjin Ying, Xiaoqi Jia, Rui Ma, Changzhen Hu, Wenmao Liu:
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning. Comput. Networks 198: 108394 (2021) - [j15]Xiajing Wang, Changzhen Hu, Rui Ma, Donghai Tian, Jinyuan He:
CMFuzz: context-aware adaptive mutation for fuzzers. Empir. Softw. Eng. 26(1): 10 (2021) - [j14]Donghai Tian, Xiaoqi Jia, Rui Ma, Shuke Liu, Wenjing Liu, Changzhen Hu:
BinDeep: A deep learning approach to binary code similarity detection. Expert Syst. Appl. 168: 114348 (2021) - 2020
- [j13]Wenjie Wang, Donghai Tian, Weizhi Meng, Xiaoqi Jia, Runze Zhao, Rui Ma:
MSYM: A multichannel communication system for android devices. Comput. Networks 168 (2020) - [c13]Xuefei Wang, Rui Ma, Donghai Tian, Xiajing Wang:
VCPEC: Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory. ICCNS 2020: 99-108
2010 – 2019
- 2019
- [j12]Xiajing Wang, Rui Ma, Binbin Li, Donghai Tian, Xuefei Wang:
E-WBM: An Effort-Based Vulnerability Discovery Model. IEEE Access 7: 44276-44292 (2019) - [j11]Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning. IEEE Access 7: 91657-91666 (2019) - [j10]Donghai Tian, Xiaoqi Jia, Zhaolong Zhang, Li Zhan, Changzhen Hu, Jingfeng Xue:
An online approach to defeating ROP attacks∗. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j9]Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
KEcruiser: A novel control flow protection for kernel extensions. Future Gener. Comput. Syst. 100: 1-9 (2019) - 2018
- [j8]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
A policy-centric approach to protecting OS kernel from vulnerable LKMs. Softw. Pract. Exp. 48(6): 1269-1284 (2018) - [c12]Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian:
Binary Obfuscation Based Reassemble. MALWARE 2018: 153-160 - 2017
- [j7]Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu:
An Online Approach for Kernel-level Keylogger Detection and Defense. J. Inf. Sci. Eng. 33(2): 445-461 (2017) - [c11]Donghai Tian, Xiaoqi Jia, Li Zhan, Changzhen Hu, Jingfeng Xue:
An Online Approach to Defeating Return-Oriented-Programming Attacks. CSS 2017: 236-247 - [c10]Xiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian:
FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud. ICDF2C 2017: 3-17 - [c9]Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue:
A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. NSS 2017: 145-159 - 2016
- [j6]Donghai Tian, Junhua Chen, Changzhen Hu, Jingfeng Xue:
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments. J. Inf. Sci. Eng. 32(5): 1131-1143 (2016) - 2015
- [c8]Jiani Li, Donghai Tian, Changzhen Hu:
Dynamic Tracking Reinforcement Based on Simplified Control Flow. CIS 2015: 358-362 - 2014
- [j5]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Defeating buffer overflow attacks via virtualization. Comput. Electr. Eng. 40(6): 1940-1950 (2014) - [j4]Donghai Tian, Xuanya Li, Mo Chen, Changzhen Hu:
iCruiser: An Improved Approach for Concurrent Heap Buffer Overflow Monitoring. IEICE Trans. Inf. Syst. 97-D(3): 601-605 (2014) - [j3]Donghai Tian, Jingfeng Xue, Changzhen Hu, Xuanya Li:
A Virtualization-Based Approach for Application Whitelisting. IEICE Trans. Inf. Syst. 97-D(6): 1648-1651 (2014) - [p1]Dinghao Wu, Peng Liu, Qiang Zeng, Donghai Tian:
Software Cruising: A New Technology for Building Concurrent Software Monitor. Secure Cloud Computing 2014: 303-324 - 2013
- [j2]Donghai Tian, Mo Chen, Changzhen Hu, Xuanya Li:
Efficient Shellcode Detection on Commodity Hardware. IEICE Trans. Inf. Syst. 96-D(10): 2272-2276 (2013) - [j1]Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu:
Semantic aware attribution analysis of remote exploits. Secur. Commun. Networks 6(7): 818-832 (2013) - 2012
- [c7]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. NDSS 2012 - 2011
- [c6]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. ISPEC 2011: 317-332 - [c5]Xi Xiong, Donghai Tian, Peng Liu:
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. NDSS 2011 - [c4]Deguang Kong, Donghai Tian, Peng Liu, Dinghao Wu:
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. SecureComm 2011: 190-208 - 2010
- [c3]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. ISC 2010: 409-415 - [c2]Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu:
Protecting Kernel Data through Virtualization Technology. SECURWARE 2010: 5-10
2000 – 2009
- 2009
- [c1]Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang:
Hierarchical Distributed Alert Correlation Model. IAS 2009: 765-768
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint