Jian Mao
Jian Mao
Verified email at buaa.edu.cn
Title
Cited by
Cited by
Year
A new algorithm for identifying loops in decompilation
T Wei, J Mao, W Zou, Y Chen
International Static Analysis Symposium, 170-183, 2007
762007
Phishing-alarm: robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
692017
BaitAlarm: detecting phishing sites using similarity in fundamental visual features
J Mao, P Li, K Li, T Wei, Z Liang
2013 5th International Conference on Intelligent Networking and …, 2013
552013
Man-in-the-browser-cache: persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80, 2015
532015
A position-aware Merkle tree for dynamic cloud data integrity verification
J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu
Soft Computing 21 (8), 2151-2164, 2017
422017
Who is touching my cloud
H Deng, Q Wu, B Qin, J Mao, X Liu, L Zhang, W Shi
European Symposium on Research in Computer Security, 362-379, 2014
312014
RouteGuardian: Constructing secure routing paths in software-defined networking
M Wang, J Liu, J Mao, H Cheng, J Chen, C Qi
Tsinghua Science and Technology 22 (4), 400-412, 2017
302017
A novel identity-based multi-signcryption scheme
J Zhang, J Mao
Computer Communications 32 (1), 14-18, 2009
292009
Perm-guard: Authenticating the validity of flow rules in software defined networking
M Wang, J Liu, J Chen, X Liu, J Mao
Journal of Signal Processing Systems 86 (2-3), 157-173, 2017
252017
An improved anonymous multi‐receiver identity‐based encryption scheme
J Zhang, J Mao
International Journal of Communication Systems 28 (4), 645-658, 2015
252015
Phishing page detection via learning classifiers from page layout feature
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
EURASIP Journal on Wireless Communications and Networking 2019 (1), 1-14, 2019
242019
Detecting phishing websites via aggregation analysis of page layouts
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
Procedia Computer Science 129, 224-230, 2018
242018
A comprehensive client-side behavior model for diagnosing attacks in ajax applications
X Dong, K Patil, J Mao, Z Liang
2013 18th International Conference on Engineering of Complex Computer …, 2013
232013
Application of learning algorithms in smart home IoT system security
J Mao, Q Lin, J Bian
Mathematical foundations of computing 1 (1), 63, 2018
212018
Structuring 2-way branches in binary executables
T Wei, J Mao, W Zou, Y Chen
31st Annual International Computer Software and Applications Conference …, 2007
182007
Efficient public verification proof of retrievability scheme in cloud
J Zhang, W Tang, J Mao
Cluster computing 17 (4), 1401-1411, 2014
162014
On the security of an ID-based anonymous proxy signature scheme and its improved scheme
J Zhang, J Mao, Y Xu
International Journal of Embedded Systems 4 5 (3), 181-188, 2013
162013
Another efficient proxy signature scheme in the standard model
J Zhang, J Mao
Journal of information science and engineering 27 (4), 1249-1264, 2011
162011
Detecting malicious behaviors in javascript applications
J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang
IEEE Access 6, 12284-12294, 2018
152018
IPad: ID-based public auditing for the outsourced data in the standard model
J Zhang, P Li, J Mao
Cluster Computing 19 (1), 127-138, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20