Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fan Jiang is active.

Publication


Featured researches published by Fan Jiang.


advances in mobile multimedia | 2013

DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag

Hui Ye; Shaoyin Cheng; Lanbo Zhang; Fan Jiang

The Android system is getting more and more popular on the mobile devices. Thus, lots of apps have sprung up to facilitate peoples daily life. However, many of the apps are released without sufficient testing work, so the users encounter a sudden app crash now and then. This will undoubtedly impact the users experience and even lead to economic loss. Because current testing tools on Android apps mainly focus on the motion event on the screen, like click event, bugs concerned with data handling module in an app is neglected. In this paper, we propose an automated testing method to fuzz testing the Android apps. The test targets are the Activities which accept outside MIME data. These Activities are picked out by analyzing the Intent-filter tag in the AndroidManifest.xml file. An automated fuzzing tool, DroidFuzzer, is implemented based on the method. Finally, experiments are conducted to prove the effectiveness of it.


international conference on cloud and green computing | 2012

InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog

Wenlong Chen; Shaoyin Cheng; Xing He; Fan Jiang

Microblog, as one of the most popular social networking services, plays an increasingly significant role in communication and information propagation. Among the numerous studies on social network, one critical problem is identifying the influencers (or opinion leaders) and quantifying the influence strength of each individual effectively. This paper focuses on the problem of measuring users influence in microblog network. We define respectively, the social influence in terms of the ability of interactivity driven and the breadth of information dissemination in global network. With the analysis of the characteristics of interactive behaviors and the way of information spread, the principal factors indicating influence are explored, which include the quantity and quality of followers, the quality of tweets, the ratio of retweeting and the similarity of users interests. Although so many metrics have been taken into account to measure influence in proposed User Relative Influence Measure Model and User Network Global Influence Model, our Influence Rank Algorithm to implement the models is only O(e) on time complexity. Finally, the experimental evaluations and comparisons with related algorithms on million-user-level dataset demonstrate the efficiency and effectiveness of Influence Rank Algorithm.


advances in social networks analysis and mining | 2013

Novel user influence measurement based on user interaction in microblog

Xiang Li; Shaoyin Cheng; Wenlong Chen; Fan Jiang

With the development of science and technology, various social networks have emerged in recent years and microblog is a prevailing one. This paper focuses on how to identify the most influential users quantitatively in microblog and proposes a new ranking method which employs the fact that a followers contribution to the influences of his/her followees varies and depends greatly on the interactions between them. We consider bidirectional interactions from perspectives of followees and followers, and measure the interactive degree by four factors comprised of retweeting strength, commenting intensity, mentioning density and a special indicator to the potential interactions called keyword similarity. The experimental results show that our method based on user interaction is better in calculating the user influence.


trust security and privacy in computing and communications | 2011

LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code

Shaoyin Cheng; Jun Yang; Jiajie Wang; Jinding Wang; Fan Jiang

The automatic detection of security vulnerabilities in binary code is challenging and lacks efficient tools. This paper presents a novel semi-simulation approach to statically detect potential vulnerabilities in binary code. The semi-simulation approach simulates address related instructions accurately using value set analysis, and only traces data dependence on other instructions using data dependence analysis. We have implemented this approach on a tool called LoongChecker, and evaluate it on three real world programs, and detect three known vulnerabilities and two zero-day vulnerabilities. The results show our approach is practical and can be applied to large real world software.


international conference on cloud and green computing | 2012

AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks

Guangyu Yin; Fan Jiang; Shaoyin Cheng; Xiang Li; Xing He

Trust is the foundation of interpersonal relationship and interaction as in social networks as in real world. Previous researches about the trust between users mainly focus on nonadjacent users in social networks, where the trust between adjacent users is assumed to be known. However, in most social networks, the trust between adjacent users is unknown, that limits the applications of those nonadjacent users trust models. In this paper, we propose an adjacent users trust measurement model(AUTrust) and discuss how to construct a trust social network with AUTrust. The factors affecting trust between users could be classified into three dimensions: (i) similarity between users, (ii) familiarity between users, (iii) users social reputation. The last two dimensions can be used to reflect asymmetry of trust between users. Then we discuss the methods of quantifying trust with these dimensions. Users information that AUTrust needs can be collected with API provided by social networks, so the model can be widely applied to social networks. Finally, we evaluated the model on 10-million-level Ten cent Weibo dataset, and the experiment proves the practicability and universality of AUTrust model.


CSS | 2013

Static Detection of Dangerous Behaviors in Android Apps

Shaoyin Cheng; Shengmei Luo; Zifeng Li; Wei Wang; Yan Wu; Fan Jiang

This paper presents a scheme to detect dangerous behaviors in Android apps. In order to identify different kinds of dangerous behaviors, we designed two analysis engines. On the one hand, taint analysis engine mainly detects privacy leak by tracking how user’s sensitive data is used by an app; On the other hand, constant analysis engine focuses on the constant information in an app to identify other dangerous behaviors such as SP services ordering, phone bill consuming, and so on. We have implemented these two engines in a system called ApkRiskAnalyzer which identifies the dangerous behaviors by simulating the running process of an Android app statically. Furthermore, we analyzed 1260 malicious apps and found out dangerous behaviors in 1246 (98.9%) apps. Then we downloaded 630 normal apps from Google Play and identified dangerous behaviors in 575(91.3%) apps. These results demonstrate the effectiveness of ApkRiskAnalyzer.


information security practice and experience | 2015

ADKAM: A-Diversity K-Anonymity Model via Microaggregation

Liang Cheng; Shaoyin Cheng; Fan Jiang

A great challenge in privacy preservation is to trade off two important issues: data utility and privacy preservation, in publication of dataset which usually contains sensitive information. Anonymization is a well-represent approach to achieve this, and there exist several anonymity models. Most of those models mainly focuses on protecting privacy exerting identical protection for the whole table with pre-defined parameters. As a result, it could not meet the diverse requirements of protection degrees varied with different sensitive values.Motivated by this, this paper firstly introduces an a-diversity k-anonymity model (ADKAM) to satisfy the diversity deassociation for sensitive values, ant then designs a framework based on an improved microaggregation algorithm, as an alternative to generalization/ suppression to achieve anonymization. By using this framework, we improve the data utility and disclosure risk of privacy disclosure. We conduct several experiments to validate our schemes.


ieee symposium on security and privacy | 2015

Find Referral Social Networks

Hao Guo; Feng Wei; Shaoyin Cheng; Fan Jiang

With the generalizing of Electronic Medical Records lots of facilities such as hospitals, insurance companies and some other government sections, accumulate large amounts of electronic data. Generally, data analysis technologies used in health insurance claims data are statistical and data mining. To get some new information from the data, the social network analysis (SNA) is proposed as a new way to explore the patientstransferring data held by Medical Insurance Bureau. In this paper, we first describe the condition of the basic medical insurance for urban and rural residents in China, then we demonstrate that the method of SNA used in the health insurance claims data can better understand the corporation among hospitals relating to patients-transferring. Particularly, this paper applies social network analysis to mine the data in three aspects: (a) community detection of hospitals network using different models. (b) the relationship among networks characteristics and healthcare quality including Length of stay(Los) in hospital, medicare cost and treatment results. (c)some interesting rules about the patients-transferring correlated with the Los and Cost.


international conference on software technology and engineering | 2010

Software vulnerability analysis framework based on uniform intermediate representation

Jun Xu; Shaoyin Cheng; Jiajie Wang; Zifeng Li; Fan Jiang

Building secure software nowadays is a dominant goal in software development. Consequently, analyzing software vulnerabilities in order to determine how they can be prevented is the pivot of computer security. This paper presents a static analysis framework based on uniform intermediate representation to detect software vulnerabilities, and we have implemented an analysis tool called Melon based on the Microsoft Phoenix. We evaluate the effectiveness of Melon through a number of testing, and the experimental results show that it can effectively validate and analyze software vulnerabilities.


international symposium on information science and engineering | 2008

Combined Symbolic and Concrete Execution of TTCN-3 for Automated Testing

Xuezhi Xing; Lei Zhang; Fan Jiang; Shaoyin Cheng; Xing Jiang

Testing procedure can be described by the testing and test control notation-version 3(TTCN-3). The automatic execution of TTCN-3 test scripts is transformed to automatic testing of system under test (SUT). We propose a framework, which uses combined symbolic and concrete execution of TTCN-3 test scripts to automatically generate test inputs for most of the feasible paths. Meanwhile most of the test procedures are accomplished automatically, which can reduce testing cost and better testing effectiveness. Structured values and function calls are the common difficult problems in symbolic execution. We propose a lazy symbolization mechanism to decrease the amount of symbolic values when structured values are processed. And we also propose combined condition and assignment statements to describe functions. We apply our framework to some public fragments of TTCN-3 test scripts. The results are encouraging.

Collaboration


Dive into the Fan Jiang's collaboration.

Top Co-Authors

Avatar

Shaoyin Cheng

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Jiajie Wang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Wenlong Chen

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Feng Wei

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Jinding Wang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Xing He

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Zifeng Li

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Xiang Li

University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Guangyu Yin

University of Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge