发表论文
2020
1. 郑锐,汪秋云,傅建明*,姜政伟,苏日,古嘎, and汪姝玮. "一种基于深度学习的恶意软件家族分类模型."信息安全学报,2020,5(1): 1-9.
2. Liu, Xiuwen, Jianming Fu, and Yanjiao Chen. "Event Evolution Model for Cybersecurity Event Mining in Tweet Streams." Information Sciences (2020).
3. Xiuwen Liu ; Jianming Fu. SPWalk: Similar Property Oriented Feature Learning for Phishing Detection. IEEEAccess, 2020,8(1):87031-87045.
4. Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, and Guojun Peng.JTaint: Finding Privacy-Leakage in Chrome Extensions. ACISP, 2020. (录用)
2019
1. 傅建明、彭国军、严飞,软件安全课程教学方法研究,软件导刊,2020,19(2):226-229.
2. 杜瑞颖,张焕国,傅建明,陈晶,唐明,何琨, ... &代永平. (2019).网络空间安全大类下的信息安全专业人才培养. 网络与信息安全学报, 5(3), 25-30.
3. Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, and Guojun Peng.Web Scanner Detection Basedon Behavioral Differences. 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019
4. 傅建明,梅戌芬,郑锐. Chrome扩展安全[J].武汉大学学报(理学版),2019,65(2):111⁃125.
5. 刘秀文,傅建明,黎琳,等.面向用户交互场景的信息欺骗分类及其威胁抑制机制[J].武汉大学学报(理学版),2019,65(2):126⁃138
6. 傅建明,黎琳,王应军. 基于CNN的Webshell文件检测.郑州大学学报(理学版),2019, 51(2): 1-8
7. 傅建明,黎琳,郑锐,苏日古嘎。基于GAN的网络攻击检测研究综述。信息网络安全。2019, 218(2):1-9
8. LI Pengwei, FU Jianming, XU Chao, CHENG Binlin and ZHANG Huanguo. Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features. Chinese Journal of Electronics, 2019, 28(5):944~952
9. Luman Shi, Jianming Fu, Zhengwei Guo, Jiang Ming. "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps. MobiSys '19 Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, Pages 222-235. Seoul, South Korea, June 17 - 21, 2019
2018
1. 宋文纳,彭 国 军,傅 建 明,张 焕 国,陈 施 旅.恶 意 代 码 演 化 与 溯 源 技 术 研 究.软 件 学 报,2019. http://www.jos.org.cn/1000-9825/5767.htm
2. Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion. Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. In Proceedings of the 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018.
3. 傅建明, 林艳,刘秀文,张旭.云计算环境下基于随机化的安全防御研究. 计算机学报, 2018, 41(6): 1207~1224
4. 姜百合, 傅建明,王应军,王亚丽,黄坚伟.基于Fuzzing技术的云数据泄露漏洞检测.武汉大学学报(理学版), 2018, 64(02) :115-120
5. 王应军,傅建明,姜百合.基于随机化参数名的跨站请求伪造防御方法[J].计算机工程, 2018, 44(11): 158-164.
6. Jianming Fu,Rui Jin,Yan Lin,Baihe Jiang,Zhengwei Guo.Function Risk Assessment under Memory Leakage.International Conference on Networking and Network Applications(NaNa), 2018.10, Xian, China.
7. 黄凯, 傅建明,黄坚伟, et al.一种基于字符及解析特征的恶意域名检测方法[J].计算机仿真, 2018,35(3):287~292
2017
1. Wang, Yu-fei, et al. "Information Flow Integrity of ECPS based on Domain Partition." Current Trends in Computer Science and Mechanical Automation Vol. 2. Sciendo Migration, 2017. 624-637.
2. Fu Jianming. Xie Mengfei, Wang Yingjun, Mei Xufen. An Empirical Study of Unsolicited Content Injection into a Website.International Conference on Networking and Network Applications(NaNa). Kathmandu City, Nepal, on 15-20 October 2017
3. Jianming Fu, Rui Jin and Yan Lin. FRProtector: Defeating Control Flow Hijacking Through Function-level Randomization and Transfer Protection.13th EAI International Conference on Security and Privacy in Communication Networks(Securecomm 2017). Niagara Falls, Canada, 2017, Oct. 22~25.
4. 谢梦非, 傅建明,王应军,彭国军.移动端Web浏览器HTTP流量注入的监控与屏蔽[J]. 武汉大学学报(理学版),2017, 63(5): 385-396
5. 彭国军,梁玉,张焕国,傅建明.软件二进制代码重用技术综述.软件学报,2017,28(8):2026−2045.
6. Jianming Fu, Jianwei Huang and Lanxin Zhang. Curtain: Keep your hosts away from USB attacks. ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017
7. Cheng B, Fu J. Zombie Fans Detection in Sina Microblog a Machine Learning Approach[J]. JOURNAL OF INTERNET TECHNOLOGY (ISSN: 1607-9264) , 2017, 18(3): 561-568.
8. Cheng B, Fu J. Social bots detection on mobile social networks. International Journal of Network Security, Vol.19, No.1, PP.163-166, Jan. 2017 (DOI: 10.6633/IJNS.201701.19(1).17)
2016
1- 傅建明, 汤毅, 刘秀文, 张旭.一种基于动态污点的内存越界访问检测框架. 武汉大学学报(理学版), 2016,62(5):401-410.
2- 傅建明,刘秀文,汤毅,李鹏伟. 内存地址泄漏分析与防御[J]. 计算机研究与发展, 2016, 53(8): 1829-1849.
Fu Jianming, Liu Xiuwen, Tang Yi,Li Pengwei. Survey of Memory Address Leakage and Its Defense. Journal of Computer Research and Development, 2016, 53(8): 1829-1849.
3- Jianming Fu, Yan Lin, Xu Zhang. Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.
4- JianMing Fu, PengWei Li, Yan Lin, Shuang Ding. Android App Malicious Behavior Detection Based on User Intention. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(Trustcom),Auguest 23th, 2016, tianjin, China.
5- Jianming FU, Yan Lin, Xu Zhang. Impact of Environment on Branch Transfer of Software. 12th EAI International Conference on Security and Privacy in Communication Networks(SecureComm), October 12th, 2016,Guangzhou China.{ 2017, LNICST, volume 198: 575-593 }
6- Yan Lin, Xiaoxiao Tang, Debin Gao and Jianming Fu. Control flow integrity enforcement with dynamic code optimization. In Proceedings of the 19th Information Security Conference (ISC 2016), Honolulu, USA, September 2016
2015
7- Jianming Fu, Xu Zhang, Yan Lin. An Instruction-set Randomization Using Length-preserving Permutation. TrustCom-2015,Helsinki, Finland, 20-22 August, 2015
8- 李鹏伟,傅建明,李拴保,吕少卿,沙乐天. 弹性移动云计算的研究进展与安全性分析[J]. 计算机研究与发展, 2015, 52(6): 1362-1377.
Li Pengwei,Fu Jianming,Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis. Journal of Computer Research and Development, 2015, 52(6): 1362-1377.
9- 傅建明, 刘高, 李鹏伟。一种杀毒软件升级流程的安全性分析方法。武汉大学学报(理学版),2015.16(6):509~516.
10- 李拴保,傅建明. 多云服务提供者环境下的一种用户密钥撤销方法. 电子与信息学报,2015.9
11- sha, Le-tian, He, Li-wen, Fu, Jian-ming, Sun, Jing, and Li, Peng-wei. (2015) SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. Security Comm. Networks, doi:10.1002/sec.1367.
12- 沙乐天,何利文,傅建明,王延松等,物联网环境下的一种敏感信息保护方法. 四川大学学报工程科学版, 2016, 48(1):132-138
13- Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang. Stack Layout Randomization with Minimal Rewriting of Android Binaries . In proceedings of the 18th Annual international conference on information security and cryptology(ICISC). Nov, 2015. Seoul, Korea.
14- 李新国,李鹏伟,傅建明,丁笑一。一种安全风险可控的弹性移动云计算通用框架。计算机科学,2015,42(A11):357~363
2014
1- 李拴保, 傅建明, 张焕国, 陈晶, 王晶, 任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报,2014, 35(9):99~111
2- 李拴保,傅建明. 云环境下基于属性的用户权限管理研究. 计算机科学,2014.9
3- Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li. Computation Integrity Measurement Based on Branch Transfer[C]//Procedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014.
4- 梁玉, 傅建明, 彭国军, 彭碧琛, 张焕国. S-Tracker:一种基于栈异常的shellcode检测方法. 华中科技大学学报,2014, (11) 39-46.
5- 傅建明,沙乐天,李鹏伟,彭国军. 一种采用硬件虚拟化的内核数据主动保护方法. 四川大学学报(工程科学版),2014,46(1):8~13 (61202387,201201411110002)
6- Letian Sha, Jianming Fu, Jing Chen, Guojun Peng. PVDF: AN AUTOMATIC PATCH-BASED VULNERABILITY DESCRIPTION AND FUZZING METHOD. Proceeding of Communication security conference, 2014, Beijing.
7- Shuanbao Li, Jianming Fu. USER REVOCATION FOR DATA SHARING BASED ON BROADCAST CP-ABE IN CLOUD COMPUTING. Proceeding of Communication security conference, 2014, Beijing.
8- 沙乐天,傅建明,陈晶,黄诗勇。一种面向敏感信息处理的敏感度度量方法。计算机研究与发展,2014,5: 1050~1060
2013
1. 傅建明,李鹏伟,李晶雯。敏感信息输入安全技术探究。信息网络安全,2013,147(3):82~85.
2. 傅建明,彭国军,严飞,涂航。信息安全案例库的设计与实现。武汉大学教育研究, 2013,1:64~67.
3. 李牷保,傅建明,连向磊。植入城市计算综述。计算机科学,2013,40(3):8~15.
4. DING Shuang, FU Jianming, PENG BiChen. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware. Wuhan University Journal of Natural Sicence, 2013,18(6):489~498
5. 傅建明,李鹏伟,易乔,黄诗勇.一种Android组件间通信的安全缺陷静态检测方法. 华中科技大学学报,2013.11(II):259~264
6. 李鹏伟,傅建明,沙乐天,丁爽。基于细胞自动机的软键盘布局随机化方案。北京交通大学学报,2013,10(5):105~111.