Jian Mao
Jian Mao
Verified email at
Cited by
Cited by
Phishing-alarm: Robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
A new algorithm for identifying loops in decompilation
T Wei, J Mao, W Zou, Y Chen
International Static Analysis Symposium, 170-183, 2007
BaitAlarm: detecting phishing sites using similarity in fundamental visual features
J Mao, P Li, K Li, T Wei, Z Liang
2013 5th International Conference on Intelligent Networking and …, 2013
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80, 2015
A position-aware Merkle tree for dynamic cloud data integrity verification
J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu
Soft Computing 21 (8), 2151-2164, 2017
Phishing page detection via learning classifiers from page layout feature
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
EURASIP Journal on Wireless Communications and Networking 2019 (1), 1-14, 2019
Detecting phishing websites via aggregation analysis of page layouts
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
Procedia Computer Science 129, 224-230, 2018
RouteGuardian: Constructing secure routing paths in software-defined networking
M Wang, J Liu, J Mao, H Cheng, J Chen, C Qi
Tsinghua Science and Technology 22 (4), 400-412, 2017
Who is touching my cloud
H Deng, Q Wu, B Qin, J Mao, X Liu, L Zhang, W Shi
European Symposium on Research in Computer Security, 362-379, 2014
Perm-guard: Authenticating the validity of flow rules in software defined networking
M Wang, J Liu, J Chen, X Liu, J Mao
Journal of Signal Processing Systems 86 (2), 157-173, 2017
A novel identity-based multi-signcryption scheme
J Zhang, J Mao
Computer Communications 32 (1), 14-18, 2009
Application of learning algorithms in smart home IoT system security
J Mao, Q Lin, J Bian
Mathematical foundations of computing 1 (1), 63, 2018
An improved anonymous multi‐receiver identity‐based encryption scheme
J Zhang, J Mao
International Journal of Communication Systems 28 (4), 645-658, 2015
Detecting malicious behaviors in javascript applications
J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang
IEEE Access 6, 12284-12294, 2018
A comprehensive client-side behavior model for diagnosing attacks in ajax applications
X Dong, K Patil, J Mao, Z Liang
2013 18th International Conference on Engineering of Complex Computer …, 2013
IPad: ID-based public auditing for the outsourced data in the standard model
J Zhang, P Li, J Mao
Cluster Computing 19 (1), 127-138, 2016
Efficient public verification proof of retrievability scheme in cloud
J Zhang, W Tang, J Mao
Cluster computing 17 (4), 1401-1411, 2014
Structuring 2-way branches in binary executables
T Wei, J Mao, W Zou, Y Chen
31st Annual International Computer Software and Applications Conference …, 2007
Watchdog: Detecting ultrasonic-based inaudible voice attacks to smart home systems
J Mao, S Zhu, X Dai, Q Lin, J Liu
IEEE Internet of Things Journal 7 (9), 8025-8035, 2020
On the security of an ID-based anonymous proxy signature scheme and its improved scheme
J Zhang, J Mao, Y Xu
International Journal of Embedded Systems 4 5 (3), 181-188, 2013
The system can't perform the operation now. Try again later.
Articles 1–20