Jianqiang Lv | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr Jianqiang Lv | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr. Jianqiang Lv, Huazhong University of Science and Technology, Huanggang Normal University, China.

Dr. Jianqiang Lv is an associate professor at Huanggang Normal University with a PhD from Huazhong University of Science and Technology. His research focuses on system and software security, AI security, and vulnerability mining. He has contributed to national and provincial projects, published in top-tier journals, and holds 6 invention patents. A recipient of the China Institute of Communications’ Science and Technology Award 🏅, he is an active IEEE member and a leading researcher in cybersecurity 🔐.

🌟 Professional Profile

🎓 Early Academic Pursuits

Jianqiang Lv pursued his doctoral studies at Huazhong University of Science and Technology, where he developed a strong foundation in system and software security. His academic journey was marked by rigorous research, innovation, and technical acumen. His early dedication to cybersecurity and artificial intelligence security laid the groundwork for his future contributions in the field.

💼 Professional Endeavors

Currently serving as an Associate Professor at Huanggang Normal University, Jianqiang Lv has played a significant role in academic research and technological development. He has actively contributed to multiple national and provincial research projects, emphasizing the security aspects of digital systems. His commitment to higher education and professional mentorship continues to inspire the next generation of cybersecurity experts.

🔬 Contributions and Research Focus On Cybersecurity 

Dr. Jianqiang Lv has dedicated his research to system security, software security, vulnerability mining, and exploitation. His work focuses on addressing the high false alarm rates in pure data attacks, enhancing data and control flow analysis, and developing data-oriented programming (DOP) techniques. His innovative approach to binary Gadget search algorithms has significantly contributed to the automation of pure data attack mining.

🌍 Impact and Influence

📚Publications Top Notes

📖 MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection
📅 Year: 2024
🔗 DOI: 10.1145/3597503.3639141
📑 Published in: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering

📖 IFAttn: Binary Code Similarity Analysis Based on Interpretable Features with Attention
📅 Year: 2022
🔗 DOI: 10.1016/j.cose.2022.102804
📑 Published in: Computers & Security (ISSN: 0167-4048)