


default search action
Dongliang Fang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j8]Kaixiang Liu
, Yongfang Xie, Yuqi Chen, Shiwen Xie, Xin Chen, Dongliang Fang, Limin Sun:
SFACIF: A safety function attack and anomaly industrial condition identified framework. Comput. Networks 257: 110927 (2025)
[j7]Yibo Qu
, Dongliang Fang
, Zhen Wang
, Jiaxing Cheng
, Shuaizong Si
, Yongle Chen
, Limin Sun
:
ICEPRE: ICS Protocol Reverse Engineering via Data-Driven Concolic Execution. Proc. ACM Softw. Eng. 2(ISSTA): 2384-2406 (2025)
[j6]Dongliang Fang
, Anni Peng
, Le Guan
, Erik van der Kouwe
, Klaus von Gleissenthall
, Wenwen Wang
, Yuqing Zhang
, Limin Sun
:
InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring. IEEE Trans. Dependable Secur. Comput. 22(1): 343-358 (2025)
[j5]Shiquan Dong
, Zhi Li
, Jianshuo Liu
, Hong Li
, Dongliang Fang
, Shichao Lv
, Haining Wang
, Limin Sun
:
EMFuzz: Use Electromagnetic Fuzzing for Automated Attack Surface Assessment of Actuators. IEEE Trans. Inf. Forensics Secur. 20: 8417-8432 (2025)
[j4]Zuxin Chen
, Yaowen Zheng
, Hong Li
, Siyuan Li
, Weijie Wang
, Dongliang Fang
, Zhiqiang Shi
, Limin Sun
:
PREXP: Uncovering and Exploiting Security-Sensitive Objects in the Linux Kernel. IEEE Trans. Inf. Forensics Secur. 20: 10146-10160 (2025)
[c13]Zedong Li
, Shijie Li, Dongliang Fang, Xin Chen, Zhanwei Song, Zhi Li, Shichao Lv, Limin Sun:
PNetGPT: Proprietary Protocol Network Traffic Generation with Pre-trained Transformer. ICASSP 2025: 1-5
[c12]Yuncheng Wang
, Puzhuo Liu, Yaowen Zheng, Dongliang Fang, Shuaizong Si, Zhiwen Pan, Weidong Zhang, Limin Sun:
Automated Flaw Detection for Industrial Robot RESTful Service. VMCAI (2) 2025: 163-184
[c11]Jiaxing Cheng, Dongliang Fang, Zhongwei Gu, Shichao Lv, Shuaizong Si, Limin Sun:
Discovering PLC Web Application Vulnerabilities Impacting Physical Control Using LLM-Based Fuzzing. WASA (1) 2025: 49-61
[c10]Zhanwei Song, Dongliang Fang, Shunchao Xu, Yaowen Zheng, Hong Li, Shichao Lv, Zhiqiang Shi, Limin Sun:
ICSPFuzzer: An Efficient Fuzzing Technique for ICS Protocols. WASA (2) 2025: 369-380
[i1]Yiran Cheng, Ting Zhang, Lwin Khin Shar, Zhe Lang, David Lo, Shichao Lv, Dongliang Fang, Zhiqiang Shi, Limin Sun:
Fixseeker: An Empirical Driven Graph-based Approach for Detecting Silent Vulnerability Fixes in Open Source Software. CoRR abs/2503.20265 (2025)- 2024
[j3]Shijie Li
, Yuqi Chen, Xin Chen, Zedong Li
, Dongliang Fang
, Kaixiang Liu
, Shichao Lv
, Limin Sun
:
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS. IEEE Trans. Inf. Forensics Secur. 19: 8275-8290 (2024)
[j2]Anni Peng
, Dongliang Fang
, Le Guan
, Erik van der Kouwe
, Yin Li
, Wenwen Wang
, Limin Sun
, Yuqing Zhang
:
Bitmap-Based Security Monitoring for Deeply Embedded Systems. ACM Trans. Softw. Eng. Methodol. 33(7): 192:1-192:31 (2024)
[c9]Yang Zhang
, Dongliang Fang, Puzhuo Liu, Laile Xi, Xiao Lu, Xin Chen, Shuaizong Si, Limin Sun:
MSGFuzzer: Message Sequence Guided Industrial Robot Protocol Fuzzing. ICST 2024: 140-150
[c8]Mingqiang Bai, Puzhuo Liu, Fei Lv, Dongliang Fang, Shichao Lv, Weidong Zhang, Limin Sun:
Adversarial Attack against Intrusion Detectors in Cyber-Physical Systems With Minimal Perturbations. ISPA 2024: 816-825
[c7]Gengwang Li, Min Yu, Dongliang Fang, Gang Li, Xiang Meng, Jianguo Jiang, Weiqing Huang:
X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic Deobfuscation. MILCOM 2024: 1082-1087- 2023
[c6]Puzhuo Liu
, Yaowen Zheng
, Chengnian Sun
, Chuan Qin
, Dongliang Fang
, Mingdong Liu
, Limin Sun
:
FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware. ASPLOS (4) 2023: 138-152
[c5]Anni Peng, Dongliang Fang, Wei Zhou, Erik van der Kouwe
, Yin Li, Yuqing Zhang:
CEFI: Command Execution Flow Integrity for Embedded Devices. DIMVA 2023: 235-255- 2022
[j1]Puzhuo Liu
, Yaowen Zheng, Zhanwei Song, Dongliang Fang, Shichao Lv, Limin Sun:
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control. J. Syst. Archit. 127: 102483 (2022)
[c4]Puzhuo Liu
, Dongliang Fang, Chuan Qin, Kai Cheng, Shichao Lv, Hongsong Zhu, Limin Sun:
Finding Vulnerabilities in Internal-binary of Firmware with Clues. ICC 2022: 5397-5402- 2021
[c3]Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo Liu, Limin Sun:
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. ACNS (2) 2021: 27-48
[c2]Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu
, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. ACSAC 2021: 849-860
[c1]Kai Cheng, Dongliang Fang, Chuan Qin, Huizhao Wang, Yaowen Zheng, Nan Yu, Limin Sun:
Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware. SEC 2021: 83-99
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-16 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







