Search Results - "Lin, Mingmin"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols by Zeng, Yingpei, Lin, Mingmin, Guo, Shanqing, Shen, Yanzhao, Cui, Tingting, Wu, Ting, Zheng, Qiuhua, Wang, Qiuhua

    Published in Sensors (Basel, Switzerland) (11-09-2020)
    “…The publish/subscribe model has gained prominence in the Internet of things (IoT) network, and both Message Queue Telemetry Transport (MQTT) and Constrained…”
    Get full text
    Journal Article
  2. 2

    Improved collision detection of MD5 with additional sufficient conditions by Fang, Linan, Wu, Ting, Qi, Yongxing, Shen, Yanzhao, Zhang, Peng, Lin, Mingmin, Dong, Xinfeng

    Published in Electronic research archive (01-06-2022)
    “…One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1…”
    Get full text
    Journal Article
  3. 3

    Surface coordination enhanced visible-light photocatalytic coupling of benzylamine to N-benzylidene benzylamine over the Pd/NH2-MIL-125(Ti) nanosheets by Wang, Hongtao, Yu, Jiani, Wei, Shuai, Lin, Mingmin, Song, Yujie, Wu, Ling

    “…NH2-MIL-125(Ti) nanosheets (MTNs) with abundant surface oxygen vacancies was designed as a multifunctional photocatalyst for precisely oxidative coupling of…”
    Get full text
    Journal Article
  4. 4

    Upcycling waste expanded polystyrene into UV-excited dual-mode multicolor luminescent electrospun fiber membranes for advanced anti-counterfeiting by Fan, Yunjie, Su, Huanyou, Li, Pengfei, Lin, Mingmin, Liu, Dan, Pei, Kemei, Cao, Xuebo

    Published in RSC advances (27-03-2023)
    “…Expanded polystyrene (EPS) is causing severe environmental problems due to its high consumption and non-biodegradability. Upcycling waste EPS into high…”
    Get full text
    Journal Article
  5. 5

    GSA-Fuzz: Optimize Seed Mutation with Gravitational Search Algorithm by Lin, Mingmin, Zeng, Yingpei, Wu, Ting, Wang, Qiuhua, Fang, Linan, Guo, Shanqing

    Published in Security and communication networks (15-07-2022)
    “…Mutation-based fuzzing is currently one of the most effective techniques to discover software vulnerabilities. It relies on mutation strategies to generate…”
    Get full text
    Journal Article
  6. 6

    RegFuzz: A Linear Regression-Based Approach for Seed Scheduling in Directed Fuzzing by Lin, Mingmin, Zeng, Yingpei, Li, Yang

    “…Directed fuzzing is an enhanced fuzzing technique. It can quickly find out bugs at specific locations of a target program and improve the efficiency of…”
    Get full text
    Conference Proceeding