严飞,张铭伦,张立强. BVI:基于边界值不变量的对抗样本检测方法. 网络与信息安全学报,2020年已录用 (CCF推荐中文期刊网络与信息安全类C类)
Yan Fei, Wang qizhong, Zhang Liqiang, Chen yasha. RSMC: A Safety Model Checker for Concurrency and Memory Safety of Rust. Journal of Wuhan University (Natural Science) 2020. (已录用)
Xin Huang, Fei Yan*, Liqiang Zhang, Kai Wang. HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks. Information Systems Frontier. Springer(中科院JCR : 2019版工程技术3区)
Xin Huang, Fei Yan*, Liqiang Zhang, Kai Wang. HoneyGadget: A Deception Based ROP Detection Scheme. In: Liu F., Xu J., Xu S., Yung M. (eds) Proceeding of 2nd International Conference on Science of Cyber Security. SciSec 2019. Lecture Notes in Computer Science. Springer.(EI检索)
Fei Yan, Kai Wang.Leakage Is Prohibited:Memory Protection Extensions Protected Address Space Randomization. Tsinghua Science and Technology. 2019, v.24(05) 546-556. (中科院JCR: 2019版工程技术3区)
Fei Yan, Yijia Li and Liqiang Zhang, "ActivityShielder: An Activity Hijacking Defense Scheme for Android Devices," 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, 2018, pp. 1-9. (CCF推荐国际会议网络与信息安全类C类,EI 检索)
Fei Yan,Yunlong Xing,et.al. Research on Cryptographic Algorithm Recognition Based on Behavior Analysis. Proceeding of 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017. Springer.(EI检索)
Liqiang Zhang, Fei Yan*, Bo Zhao, et al. Dependence-Induced Risk: Security Metrics and Their Measurement Framework[J]. China Communications, 2016, 13(11): 119-128.(中科院JCR:2019版工程技术3区)
Fei Yan, Fan Huang, Lei Zhao, Huirong Peng and Qian Wang, "Baseline Is Fragile: On the Effectiveness of Stack Pivot Defense," 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS), Wuhan, 2016, pp. 406-413.(CCF推荐国际会议网络与信息安全类C类, EI检索)
Ming Tang, Maixing Luo, Junfeng Zhou, Zhen Yang, Zhipeng Guo, Fei Yan, Liang Liu. Side-Channel Attacks in a Real Scenario. Tsinghua Science and Technology. 2018, v.23(05) 586-598. (中科院JCR: 2019版工程技术3区)