default search action
Jianjun Huang 0001
Person information
- affiliation: Renmin University of China
- affiliation (former): Purdue University, USA
- unicode name: 黄建军
Other persons with the same name
- Jianjun Huang (aka: Jian-Jun Huang) — disambiguation page
- Jianjun Huang 0002 (aka: Jian-Jun Huang 0002) — Shenzhen University, College of Information Engineering, China (and 1 more)
- Jianjun Huang 0003 — PLA University of Science and Technology, Nanjing, China
- Jianjun Huang 0004 — Fuzhou University, Fuzhou, Fujian, China
- Jianjun Huang 0005 — Sun Yat-sen University, China
- Jianjun Huang 0006 — Beihang University, School of Electronics and Information Engineering, Beijing, China (and 1 more)
- Jianjun Huang 0007 — Shenzhen University, College of Electronics and Information Engineering, Guangdong Key Laboratory of Intelligent Information Processing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang, Yapeng Ye, Jianjun Huang, Xiangyu Zhang:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. Proc. ACM Softw. Eng. 1(FSE): 562-585 (2024) - [c17]Xuwei Liu, Wei You, Yapeng Ye, Zhuo Zhang, Jianjun Huang, Xiangyu Zhang:
FuzzInMem: Fuzzing Programs via In-memory Structures. ICSE 2024: 131:1-131:13 - [c16]Jianjun Huang, Jianglei Nie, Yuanjun Gong, Wei You, Bin Liang, Pan Bian:
Raisin: Identifying Rare Sensitive Functions for Bug Detection. ICSE 2024: 175:1-175:12 - [c15]Dongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang, Jianjun Huang, Wenchang Shi, Zhuo Zhang, Xiangyu Zhang:
Define-Use Guided Path Exploration for Better Forced Execution. ISSTA 2024: 287-299 - [c14]Yuanjun Gong, Jianglei Nie, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang, Jian Zhang:
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection. ICPC 2024: 304-315 - [i3]Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang, Yapeng Ye, Jianjun Huang, Xiangyu Zhang:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. CoRR abs/2402.11842 (2024) - 2023
- [j6]Jianjun Huang, Bo Xue, Jiasheng Jiang, Wei You, Bin Liang, Jingzheng Wu, Yanjun Wu:
Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering. IEEE Trans. Software Eng. 49(4): 2272-2284 (2023) - [c13]Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang:
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. CCS 2023: 2486-2500 - [c12]Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang, Jian Zhang:
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers. ICSE 2023: 95-107 - [i2]Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. CoRR abs/2311.06122 (2023) - 2022
- [j5]Jianjun Huang, Jiasheng Jiang, Wei You, Bin Liang:
Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts. IEEE Trans. Computers 71(7): 1551-1563 (2022) - [c11]Xiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang, Wei You, Wenchang Shi, Jian Zhang:
Hunting bugs with accelerated optimal graph vertex matching. ISSTA 2022: 64-76 - 2021
- [j4]Shilei Bai, Bin Liang, Jianjun Huang, Wei You, Jiachun Li, Yaping Li, Wenchang Shi:
Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness. IEEE Trans. Computers 70(9): 1374-1387 (2021) - [j3]Jianjun Huang, Songming Han, Wei You, Wenchang Shi, Bin Liang, Jingzheng Wu, Yanjun Wu:
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching. IEEE Trans. Inf. Forensics Secur. 16: 2144-2156 (2021) - [i1]Bin Liang, Jiachun Li, Jianjun Huang:
We Can Always Catch You: Detecting Adversarial Patched Objects WITH or WITHOUT Signature. CoRR abs/2106.05261 (2021) - 2020
- [j2]Hongcheng Li, Jianjun Huang, Bin Liang, Wenchang Shi, Yifang Wu, Shilei Bai:
Identifying parasitic malware as outliers by code clustering. J. Comput. Secur. 28(2): 157-189 (2020) - [j1]Yifang Wu, Jianjun Huang, Bin Liang, Wenchang Shi:
Do not jail my app: Detecting the Android plugin environments by time lag contradiction. J. Comput. Secur. 28(2): 269-293 (2020) - [c10]Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang:
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. ESEC/SIGSOFT FSE 2020: 1101-1113
2010 – 2019
- 2019
- [c9]Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786 - 2018
- [c8]Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:
Precise Android API Protection Mapping Derivation and Reasoning. CCS 2018: 1151-1164 - [c7]Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian:
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. NDSS 2018 - [c6]Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai:
NAR-miner: discovering negative association rules from code for bug detection. ESEC/SIGSOFT FSE 2018: 411-422 - 2017
- [b1]Jianjun Huang:
Static Analysis of Android Apps with Text Analysis and Bi-directional Propagation. Purdue University, USA, 2017 - [c5]Jianjun Huang, Yousra Aafer, David Mitchel Perry, Xiangyu Zhang, Chen Tian:
UI driven Android application reduction. ASE 2017: 286-296 - 2016
- [c4]Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin:
Automatic model generation from documentation for Java API functions. ICSE 2016: 380-391 - [c3]Jianjun Huang, Xiangyu Zhang, Lin Tan:
Detecting sensitive data disclosure via bi-directional text correlation analysis. SIGSOFT FSE 2016: 169-180 - 2015
- [c2]Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang:
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. USENIX Security Symposium 2015: 977-992 - 2014
- [c1]Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang:
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. ICSE 2014: 1036-1046
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint