Donghai Tian
Donghai Tian
Verified email at
Cited by
Cited by
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
X Xiong, D Tian, P Liu
NDSS 11, 2011
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
D Tian, Q Zeng, D Wu, P Liu, C Hu
NDSS, 2012
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning
D Tian, Q Ying, X Jia, R Ma, C Hu, W Liu
Computer Networks 198, 108394, 2021
A kernel rootkit detection approach based on virtualization and machine learning
D Tian, R Ma, X Jia, C Hu
IEEE Access 7, 91657-91666, 2019
Hierarchical distributed alert correlation model
D Tian, H Changzhen, Y Qi, W Jianqiao
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
BinDeep: A deep learning approach to binary code similarity detection
D Tian, X Jia, R Ma, S Liu, W Liu, C Hu
Expert Systems with Applications 168, 114348, 2021
E-WBM: An effort-based vulnerability discovery model
X Wang, R Ma, B Li, D Tian, X Wang
IEEE Access 7, 44276-44292, 2019
MSYM: A multichannel communication system for android devices
W Wang, D Tian, W Meng, X Jia, R Zhao, R Ma
Computer Networks 168, 107024, 2020
Defeating buffer overflow attacks via virtualization
D Tian, X Xiong, C Hu, P Liu
Computers & Electrical Engineering 40 (6), 1940-1950, 2014
Semantic aware attribution analysis of remote exploits
D Kong, D Tian, Q Pan, P Liu, D Wu
Security and Communication Networks, 2012
An Online Approach for Kernel-level Keylogger Detection and Defense.
D Tian, X Jia, J Chen, C Hu
J. Inf. Sci. Eng. 33 (2), 445-461, 2017
MDCD: A malware detection approach in cloud using deep learning
D Tian, R Zhao, R Ma, X Jia, Q Shen, C Hu, W Liu
Transactions on Emerging Telecommunications Technologies 33 (11), e4584, 2022
Findevasion: an effective environment-sensitive malware detection system for the cloud
X Jia, G Zhou, Q Huang, W Zhang, D Tian
Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017 …, 2018
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits
D Kong, D Tian, P Liu, D Wu
Security and Privacy in Communication Networks: 7th International ICST …, 2012
Towards time evolved malware identification using two-head neural network
C Yuan, J Cai, D Tian, R Ma, X Jia, W Liu
Journal of Information Security and Applications 65, 103098, 2022
Policy-centric protection of OS kernel from vulnerable loadable kernel modules
D Tian, X Xiong, C Hu, P Liu
International Conference on Information Security Practice and Experience …, 2011
Cjspector: A novel cryptojacking detection method using hardware trace and deep learning
Q Ying, Y Yu, D Tian, X Jia, R Ma, C Hu
Journal of Grid Computing 20 (3), 31, 2022
A policy‐centric approach to protecting OS kernel from vulnerable LKMs
D Tian, X Xiong, C Hu, P Liu
Software: Practice and Experience 48 (6), 1269-1284, 2018
CMFuzz: context-aware adaptive mutation for fuzzers
X Wang, C Hu, R Ma, D Tian, J He
Empirical Software Engineering 26, 1-34, 2021
Shfuzz: A hybrid fuzzing method assisted by static analysis for binary programs
W Wang, D Tian, R Ma, H Wei, Q Ying, X Jia, L Zuo
China Communications 18 (8), 1-16, 2021
The system can't perform the operation now. Try again later.
Articles 1–20