​
Login / Signup
Hui Shu
ORCID
Publication Activity (10 Years)
Years Active: 2008-2024
Publications (10 Years): 20
Top Topics
Grey Prediction Model
Cryptographic Algorithms
Reinforcement Learning
Signature Recognition
Top Venues
CoRR
Comput. Secur.
IEEE Access
ICCT
</>
Publications
</>
Huaqi Sun
,
Hui Shu
,
Fei Kang
,
Yuntian Zhao
,
Yuyao Huang
Malware2ATT&CK: A sophisticated model for mapping malware to ATT&CK techniques.
Comput. Secur.
140 (2024)
Heng Li
,
Haofeng Liu
,
Huazhu Fu
,
Yanwu Xu
,
Hui Shu
,
Ke Niu
,
Yan Hu
,
Jiang Liu
A Generic Fundus Image Enhancement Network Boosted by Frequency Self-supervised Representation Learning.
CoRR
(2023)
Yeming Gu
,
Hui Shu
,
Fei Kang
BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries.
Comput. Secur.
135 (2023)
Ying Xing
,
Hui Shu
,
Fei Kang
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning.
Comput. Secur.
128 (2023)
Yuyao Huang
,
Hui Shu
,
Fei Kang
,
Yan Guang
Protocol Reverse-Engineering Methods and Tools: A Survey.
Comput. Commun.
182 (2022)
Yeming Gu
,
Hui Shu
,
Fan Hu
UniASM: Binary Code Similarity Detection without Fine-tuning.
CoRR
(2022)
Yeming Gu
,
Hui Shu
,
Rongkuan Ma
,
Lin Yan
,
Lei Zhu
spotFuzzer: Static Instrument and Fuzzing Windows COTs.
CoRR
(2022)
Chengfei Lv
,
Chaoyue Niu
,
Renjie Gu
,
Xiaotang Jiang
,
Zhaode Wang
,
Bin Liu
,
Ziqi Wu
,
Qiulin Yao
,
Congyu Huang
,
Panos Huang
,
Tao Huang
,
Hui Shu
,
Jinde Song
,
Bin Zou
,
Peng Lan
,
Guohuan Xu
,
Fei Wu
,
Shaojie Tang
,
Fan Wu
,
Guihai Chen
Walle: An End-to-End, General-Purpose, and Large-Scale Production System for Device-Cloud Collaborative Machine Learning.
OSDI
(2022)
Chengfei Lv
,
Chaoyue Niu
,
Renjie Gu
,
Xiaotang Jiang
,
Zhaode Wang
,
Bin Liu
,
Ziqi Wu
,
Qiulin Yao
,
Congyu Huang
,
Panos Huang
,
Tao Huang
,
Hui Shu
,
Jinde Song
,
Bin Zou
,
Peng Lan
,
Guohuan Xu
,
Fei Wu
,
Shaojie Tang
,
Fan Wu
,
Guihai Chen
Walle: An End-to-End, General-Purpose, and Large-Scale Production System for Device-Cloud Collaborative Machine Learning.
CoRR
(2022)
Yeming Gu
,
Hui Shu
,
Pan Yang
,
Rongkuan Ma
MinSIB: Minimized static instrumentation for fuzzing binaries.
Comput. Secur.
122 (2022)
Yuyao Huang
,
Hui Shu
,
Fei Kang
DeMal: Module decomposition of malware based on community discovery.
Comput. Secur.
117 (2022)
Zihan Sha
,
Hui Shu
,
Xiaobing Xiong
,
Fei Kang
Model of Execution Trace Obfuscation Between Threads.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Xiaowei Li
,
Hui Shu
,
Yi Zhai
,
Zhiqiang Lin
A Method for Resume Information Extraction Using BERT-BiLSTM-CRF.
ICCT
(2021)
Hao Zhao
,
Hui Shu
,
Ying Xing
A Review on IoT Botnet.
CONF-CDS
(2021)
Yiwu Yao
,
Yuchao Li
,
Chengyu Wang
,
Tianhang Yu
,
Houjiang Chen
,
Xiaotang Jiang
,
Jun Yang
,
Jun Huang
,
Wei Lin
,
Hui Shu
,
Chengfei Lv
INT8 Winograd Acceleration for Conv1D Equipped ASR Models Deployed on Mobile Devices.
CoRR
(2020)
Zhijie Gui
,
Hui Shu
,
Fei Kang
,
Xiaobing Xiong
FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution.
IEEE Access
8 (2020)
Hao Wu
,
Hui Shu
,
Fei Kang
,
Xiaobing Xiong
BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary.
IEEE Access
7 (2019)
Ping Yang
,
Hui Shu
,
Xiaobing Xiong
,
Fei Kang
Semantic-based Malware Behavior Description: Past and Future.
ICCNS
(2019)
Weijia You
,
Hui Shu
,
Suyuan Luo
Competition, cooperation, and performance: an empirical investigation of Chinese online sellers.
Inf. Syst. E Bus. Manag.
16 (4) (2018)
Hui Shu
,
Wenping Wang
,
Xiong Ping-ping
A study on the equilibrium of regional industrial spatial distribution based on grey prediction model.
SMC
(2016)
Rui Chang
,
Liehui Jiang
,
Hui Shu
,
Hongqi He
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition.
CIS
(2014)
Hui Shu
,
Xideng Zhou
An optimal policy for a single-vendor and a single-buyer integrated system with setup cost reduction and process-quality improvement.
Int. J. Syst. Sci.
45 (5) (2014)
Jianmin Chen
,
Hui Shu
,
Xiaobing Xiong
Ewap: Using Symbolic Execution to Exploit Windows Applications.
CSIE (7)
(2009)
Xian Yu
,
Liehui Jiang
,
Hui Shu
,
Qing Yin
,
Tie-Ming Liu
A Process Model for Forensic Analysis of Symbian Smart Phones.
FGIT-ASEA
(2009)
Xiaobing Xiong
,
Hui Shu
,
Jianmin Chen
,
Yongjun He
Wetrp: A Platform for Recording of Windows Program Execution Traces.
ISCSCT (1)
(2008)