团结拼搏 自强不息
WELCOME
当前位置: 首页>>科研队伍>>师资队伍>>正文
师资队伍

刘磊

2019年07月18日 21:42  点击:[]

基本信息

姓 名: 刘磊

性 别: 男

所属部门: 人工智能学院

行政职务:

职 称 : 实验师

学 历 : 博士

所学专业:软件工程

办公电话:

电子邮件: leiliu1983@foxmail.com

专业方向: 软件工程、软件测试、WEB漏洞检测、智能检测、多媒体实验教学

个人简介:

发表论文:

[1] Yu Qiu, Yun Liu, Xiaoxu Ma, Lei Liu, Hongcan Gao, Jing Xu. Revisiting Multi-level Feature Fusion: A Simple yet Effective Network for Salient Object Detection[c]. 2019 IEEE International Conference on Image Processing (ICIP 2019). 2019, 9.

[2] Lei Liu, Guoxin Su and Jing Xu, et al. An Inferential Metamorphic Testing Approach to Eliminating False Positives in SQLIV Penetration Test [C]. Computer Software and Applications Conference (COMPSAC 2017), 2017 IEEE 41th Annual, July 4-8.

[3] Lei Liu, Jing Xu, and Hongji Yang, et al. An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability[C]. Computer Software and Applications Conference (COMPSAC 2016), 2016 IEEE 40th Annual. IEEE, 2016, 1: 123-132. [4] Lei Liu, Jing Xu, Minglei Li, Jufeng Yang. A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach[C]. Computer Software and Applications Conference (COMPSAC 2013), 2013 IEEE 37th Annual. IEEE, 2013: 256-261.

[5] Lei Liu, Jing Xu, and Chenkai Guo, et al. Exposing SQL Injection Vulnerability through Penetration Test Based on Finite State Machine[C]. Computer and Communications (ICCC 2016), 2016 IEEE International Conference on. IEEE, 2016.10.

[6] Lei Liu, Jing Xu and Chenkai Guo, et al. A SQL Injection Vulnerability Penetration Test Approach Based on Response- Driven Attacking Model [C]. The 7th Proceedings of 2017 International Workshop Conference on Computer and Engineering (WCSE 2017), June 25-27.

[7] Peng Li, Lei Liu, Jing Xu and Hongji Yang, et al. Application of Markov Model in SQL Injection Detection[C]. Workshop of Computer Software and Applications Conference (COMPSAC 2017), 2017 IEEE 41th Annual, July 4-8. 

[8] Sihan Xu, Chenkai Guo, Lei Liu and Jing Xu. A Log-linear Probabilistic Model for Prioritizing Extract Method Refactorings[C]. Computer and Communications (ICCC 2017), 2017 IEEE International Conference on. IEEE, 2017.

[9] Chenkai Guo, Jing Xu, Lei Liu and Sihan Xu. MalDetector-Using Permission Combinations to Evaluate Malicious Features of Android App[C]. Software Engineering and Service Science (ICSESS 2015), 2015 6th IEEE International Conference on. IEEE, 2015: 157-160.

[10] Chenkai Guo, Jing Xu, Lei Liu and Sihan Xu. Using Association Statistics to Rank Risk of Android Application[C]. Computer and Communications (ICCC 2015), 2015 IEEE International Conference on. IEEE, 2015: 6-10

[11] 田伟, 许静, 杨巨峰, 张莹, & 刘磊. (2012). 模型驱动的 web 应用 sql 注入渗透测试. 高技术通讯, 22(11), 1161- 1168.

国家发明专利:申请国家发明专利3项,已授权2

软件著作权:获得软件著作权3

讲授课程:C++程序设计(实验)



上一条:过辰楷
下一条:康介恢

关闭