Jianqiang Lv | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr Jianqiang Lv | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr. Jianqiang Lv, Huazhong University of Science and Technology, Huanggang Normal University, China.

Dr. Jianqiang Lv is an associate professor at Huanggang Normal University with a PhD from Huazhong University of Science and Technology. His research focuses on system and software security, AI security, and vulnerability mining. He has contributed to national and provincial projects, published in top-tier journals, and holds 6 invention patents. A recipient of the China Institute of Communications’ Science and Technology Award πŸ…, he is an active IEEE member and a leading researcher in cybersecurity πŸ”.

🌟 Professional Profile

πŸŽ“ Early Academic Pursuits

Jianqiang Lv pursued his doctoral studies at Huazhong University of Science and Technology, where he developed a strong foundation in system and software security. His academic journey was marked by rigorous research, innovation, and technical acumen. His early dedication to cybersecurity and artificial intelligence security laid the groundwork for his future contributions in the field.

πŸ’Ό Professional Endeavors

Currently serving as an Associate Professor at Huanggang Normal University, Jianqiang Lv has played a significant role in academic research and technological development. He has actively contributed to multiple national and provincial research projects, emphasizing the security aspects of digital systems. His commitment to higher education and professional mentorship continues to inspire the next generation of cybersecurity experts.

πŸ”¬ Contributions and Research Focus On CybersecurityΒ 

Dr. Jianqiang Lv has dedicated his research to system security, software security, vulnerability mining, and exploitation. His work focuses on addressing the high false alarm rates in pure data attacks, enhancing data and control flow analysis, and developing data-oriented programming (DOP) techniques. His innovative approach to binary Gadget search algorithms has significantly contributed to the automation of pure data attack mining.

🌍 Impact and Influence

πŸ“šPublications Top Notes

πŸ“– MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection
πŸ“… Year: 2024
πŸ”— DOI: 10.1145/3597503.3639141
πŸ“‘ Published in: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering

πŸ“– IFAttn: Binary Code Similarity Analysis Based on Interpretable Features with Attention
πŸ“… Year: 2022
πŸ”— DOI: 10.1016/j.cose.2022.102804
πŸ“‘ Published in: Computers & Security (ISSN: 0167-4048)