default search action
Peng Jia 0005
Person information
- affiliation (PhD 2019): Sichuan University, School of Cyber Science and Engineering, College of Cybersecurity, Chengdu, China
- affiliation (2015-2016): University of Ottawa, School of Computer Science, ON, Canada
Other persons with the same name
- Peng Jia — disambiguation page
- Peng Jia 0001 — Wuhan University, School of Resource and Environmental Sciences, Wuhan, China (and 2 more)
- Peng Jia 0002 — McGill University, Montreal, Canada
- Peng Jia 0003 — Discover Financial Services, Phoenix, AZ, USA
- Peng Jia 0004 — Xi'an Jiaotong University, Xi'an, Shaanxi, China
- Peng Jia 0006 — Nanjing University of Aeronautics and Astronautics, College of Astronautics, China (and 1 more)
Other persons with a similar name
- Jia-Peng Guo
- Jia-Peng Li
- Jia Peng Lim
- Jia Peng
- Jia-Hung Peng
- Jia-Yin Peng
- Jia Jiu Peng
- Jia Li Peng
- Jia-Peng Yang
- Peng-Jia Zou 0001 (aka: Pengjia Zou 0001) — Xidian University, National Key Laboratory of Radar Signal Processing, Xi'an, China
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Xi Peng, Peng Jia, Ximing Fan, Jiayong Liu:
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation. Inf. Softw. Technol. 177: 107582 (2025) - 2023
- [j15]Yan Wang, Peng Jia, Xi Peng, Cheng Huang, Jiayong Liu:
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention. Comput. Secur. 125: 103023 (2023) - [j14]Jiangheng Kou, Peng Jia, Jiayong Liu, Jinqiao Dai, Hairu Luo:
Identify influential nodes in social networks with graph multi-head attention regression model. Neurocomputing 530: 23-36 (2023) - [j13]Pengsen Cheng, Jinqiao Dai, Jiamiao Liu, Jiayong Liu, Peng Jia:
Reinforcement learning for few-shot text generation adaptation. Neurocomputing 558: 126689 (2023) - [j12]Peng Jia, Jiangheng Kou, Jiayong Liu, Jinqiao Dai, Hairu Luo:
SRFA-GRL: Predicting group influence in social networks with graph representation learning. Inf. Sci. 638: 118960 (2023) - 2022
- [j11]Xiao-Wang Wu, Yan Wang, Yong Fang, Peng Jia:
Embedding vector generation based on function call graph for effective malware detection and classification. Neural Comput. Appl. 34(11): 8643-8656 (2022) - 2021
- [j10]Li Li, Jiayong Liu, Peng Jia:
SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain. Comput. Secur. 103: 102188 (2021) - [j9]Lin Liu, Wang Ren, Feng Xie, Shengwei Yi, Junkai Yi, Peng Jia:
Learning-Based Detection for Malicious Android Application Using Code Vectorization. Secur. Commun. Networks 2021: 9964224:1-9964224:11 (2021) - 2020
- [j8]Li Jia, Anmin Zhou, Peng Jia, Luping Liu, Yan Wang, Liang Liu:
A Neural Network-Based Approach for Cryptographic Function Detection in Malware. IEEE Access 8: 23506-23521 (2020) - [j7]Gouheng Zhao, Peng Jia, Cheng Huang, Anmin Zhou, Yong Fang:
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks. IEEE Access 8: 65462-65471 (2020) - [j6]Gouheng Zhao, Peng Jia, Anmin Zhou, Bing Zhang:
InfGCN: Identifying influential nodes in complex networks with graph convolutional networks. Neurocomputing 414: 18-26 (2020) - [j5]Li Li, Jiayong Liu, Peng Jia:
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation. Secur. Commun. Networks 2020: 8872617:1-8872617:12 (2020)
2010 – 2019
- 2019
- [j4]Hanfang Zhang, Anmin Zhou, Peng Jia, Luping Liu, Jinxin Ma, Liang Liu:
InsFuzz: Fuzzing Binaries With Location Sensitivity. IEEE Access 7: 22434-22444 (2019) - [j3]Xinyue Huang, Anmin Zhou, Peng Jia, Luping Liu, Liang Liu:
Fuzzing the Android Applications With HTTP/HTTPS Network Data. IEEE Access 7: 59951-59962 (2019) - [j2]Yixin Wu, Yuqiang Sun, Cheng Huang, Peng Jia, Luping Liu:
Session-Based Webshell Detection Using Machine Learning in Web Logs. Secur. Commun. Networks 2019: 3093809:1-3093809:11 (2019) - [i1]Yan Wang, Peng Jia, Luping Liu, Jiayong Liu:
A systematic review of fuzzing based on machine learning techniques. CoRR abs/1908.01262 (2019) - 2018
- [j1]Jing Zhang, Anmin Zhou, Liang Liu, Peng Jia, Luping Liu:
Crash可利用性分析方法研究综述 (Review of Crash Exploitability Analysis Methods). 计算机科学 45(5): 5-14 (2018) - 2015
- [c2]Peng Jia, Xiang He, Liang Liu, Binjie Gu, Yong Fang:
A framework for privacy information protection on Android. ICNC 2015: 1127-1131 - [c1]Binjie Gu, Yong Fang, Peng Jia, Liang Liu, Lei Zhang, Meilin Wang:
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis. IIH-MSP 2015: 333-336
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint