发表论文
[1] Du, Jin, Yuan, Feng, Ding, Liping, Chen, Guangxuan, Liu, Xuehua. Research on Threat Information Network Based on Link Prediction. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS[J]. 2021, 13(2): 94-102, [2] 刘雪花, 丁丽萍, 郑涛, 吴敬征, 李彦峰. 面向网络取证的网络攻击追踪溯源技术分析. 软件学报[J]. 2021, 32(1): 194-217, http://lib.cqvip.com/Qikan/Article/Detail?id=7103810882.[3] 宋宇宁, 丁丽萍, 李彦峰, 刘雪花. 一种面向图模型数据的差分隐私保护算法. 自动化技术与应用[J]. 2020, 39(7): 86-90, http://lib.cqvip.com/Qikan/Article/Detail?id=7102511983.[4] 丁丽萍. 电子数据取证人才培养的思考. 中国信息安全[J]. 2019, 74-75, http://lib.cqvip.com/Qikan/Article/Detail?id=67737883504849574853485148.[5] 李彦峰, 丁丽萍, 吴敬征, 崔强, 刘雪花, 关贝, 王永吉. 网络隐蔽信道关键技术研究综述. 软件学报[J]. 2019, 30(8): 2470-2490, http://lib.cqvip.com/Qikan/Article/Detail?id=7002704235.[6] 丁丽萍, 刘雪花. 云环境下的电子数据取证技术研究. 中国信息安全[J]. 2019, 59-60, http://lib.cqvip.com/Qikan/Article/Detail?id=67737883504849574853485053.[7] 丁丽萍. Android智能手机动态内存取证技术概述. 信息网络安全. 2019, [8] 丁丽萍, 刘雪花, 陈光宣, 李引. Android 智能手机动态内存取证技术综述. 信息网络安全[J]. 2019, 10-17, http://lib.cqvip.com/Qikan/Article/Detail?id=7001367416.[9] 刘雪花, 丁丽萍, 刘文懋, 郑涛, 李彦峰, 吴敬征. 一种基于软件定义安全和云取证趋势分析的云取证方法. 计算机研究与发展[J]. 2019, 56(10): 2262-2276, http://lib.cqvip.com/Qikan/Article/Detail?id=7100145440.[10] 李彦峰, 丁丽萍, 吴敬征, 崔强, 刘雪花, 关贝. 区块链环境下的新型网络隐蔽信道模型研究. 通信学报[J]. 2019, 40(5): 2019111-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001758.[11] 傅继彬, 张啸剑, 丁丽萍. MAXGDDP:基于差分隐私的决策数据发布算法. 通信学报[J]. 2018, 39(3): 2018049-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7000463166.[12] 丁丽萍. Trust Evaluation Strategy for Single Sign-on Solution in Cloud. International Journal of Digital Crime and Forensics. 2018, [13] 李美玲, 李莹, Sami Muhaidat, 董增寿, 王安红, 梁杰, 丁丽萍. 认知协作网络中非正交多址接入技术性能研究. 通信学报[J]. 2018, 39(9): 57-66, http://lib.cqvip.com/Qikan/Article/Detail?id=7000859160.[14] 丁丽萍. Reliable Security Strategy for Message-oriented Middleware. International Journal of Digital Crime and Forensics. 2018, [15] 丁丽萍. A novel game-theoretic model for content-adaptive image steganograpgy. 2017 IEEE 37th International Conference on Distributed Compuitng Systems Workshops. 2017, [16] Guangxuan Chen, Guangxiao Chen, Liping Ding, Qiang Liu, Panke Qin. Discussion on Self-regulated Learning Based on Policing Bigdata Application Model. 2017, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=ZNXX201706003044&DbName=IPFDLAST2018&DbCode=IPFD&yx=&pr=&URLID=&bsm=.[17] 丁丽萍. 基于区块链的网络取证系统研究. 计算机科学. 2017, [18] Liao, Xin, Qin, Zheng, Ding, Liping. Data embedding in digital images using critical functions. SIGNAL PROCESSING-IMAGE COMMUNICATION[J]. 2017, 58: 146-156, http://dx.doi.org/10.1016/j.image.2017.07.006.[19] 曹原野, 丁丽萍. 基于Clang编译前端的Android源代码静态分析技术. 计算机系统应用[J]. 2017, 26(10): 1-10, http://lib.cqvip.com/Qikan/Article/Detail?id=673513544.[20] 丁丽萍. Risk Analysis of Online Lending Platform Based on Bigdata Technology. 2017 3rd International Conference on E-commerce and Contemporary Economic. 2017, [21] Guangxuan CHEN, Liping DING, Guomin ZHOU, Qiang LIU, Guangxiao CHEN. Research on the Cross Application of Teaching and Policing Practice Oriented Key Laboratory. 2017, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=LRCM201703002007&DbName=IPFDLAST2017&DbCode=IPFD&yx=&pr=&URLID=&bsm=.[22] 丁丽萍. Combinatorial Testing on MP3 for Audio Players. ICST Workshops 2017. 2017, [23] 杜锦, 丁丽萍, 陈光宣. 复杂网络集群中的行为取证研究. 计算机科学[J]. 2016, 43(B12): 7-15, http://lib.cqvip.com/Qikan/Article/Detail?id=670789870.[24] 丁丽萍. Research on the Vital Non-Technical Factor in Telecommunications Fraud: Social Engineering. HSC2016. 2016, [25] 穆海蓉, 丁丽萍, 宋宇宁, 卢国庆. DiffPRFs:一种面向随机森林的差分隐私保护算法. 通信学报[J]. 2016, 37(9): 175-182, http://lib.cqvip.com/Qikan/Article/Detail?id=670121063.[26] 陈光宣, 丁丽萍, 杜锦. iOS手机取证概述. 计算机科学[J]. 2016, 43(B12): 1-6, http://lib.cqvip.com/Qikan/Article/Detail?id=670789869.[27] 李琪, 廖鑫, 李闫育, 丁丽萍. 基于百度云存储的数字取证研究. 计算机科学[J]. 2015, 42(B10): 40-41, http://lib.cqvip.com/Qikan/Article/Detail?id=666696820.[28] 卢国庆, 张啸剑, 丁丽萍, 李彦峰, 廖鑫. 差分隐私下的一种频繁序列模式挖掘方法. 计算机研究与发展[J]. 2015, 52(12): 2789-2801, http://lib.cqvip.com/Qikan/Article/Detail?id=667210346.[29] 丁丽萍. 普及电子证据知识 保护公民合法权益. 中国防伪报道[J]. 2015, 27-28, http://lib.cqvip.com/Qikan/Article/Detail?id=663652140.[30] 丁丽萍, 岳晓萌, 李彦峰. 移动数字取证技术. 中兴通讯技术[J]. 2015, 21(3): 30-33, http://lib.cqvip.com/Qikan/Article/Detail?id=665265235.[31] 丁丽萍. 建设打击网络恐怖主义的国际化电子取证平台. 中国信息安全[J]. 2015, 41-43, http://lib.cqvip.com/Qikan/Article/Detail?id=664803964.[32] 赵晓柯, 丁丽萍, 吴伟, 卢国庆. EBound:一种高效的空间内存错误检测方法. 计算机应用与软件[J]. 2015, 32(7): 288-292, http://lib.cqvip.com/Qikan/Article/Detail?id=665829517.[33] Yuqi Lin, Liping Ding, Jingzheng Wu, Yalong Xie, Yongji Wang. Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation. 2013 IEEE 7th international conference on software security and reliability companion: SERE-C 2013, Gaithersburg, Maryland, USA, 18-20 June 2013. 2015, 45-52, [34] Wu, Jingzheng, Ding, Liping, Wu, Yanjun, Min-Allah, Nasro, Khan, Samee U., Wang Yongji. C(2)Detector: a covert channel detection framework in cloud computing. securityandcommunicationnetworks[J]. 2014, 7(3): 544-557, https://www.webofscience.com/wos/woscc/full-record/WOS:000331454300007.[35] 任桂超, 丁丽萍, 贺也平. 带有空间上下文信息的细粒度Android安全强化机制的设计. 计算机应用与软件[J]. 2014, 31(5): 285-290, http://lib.cqvip.com/Qikan/Article/Detail?id=49773105.[36] 王晓龙, 丁丽萍, 廖晓锋, 金波, 林渝淇, 王秀利, 王永吉. 基于动态信任根的虚拟机监控器动态完整性度量架构. 计算机应用[J]. 2014, 194-199, http://lib.cqvip.com/Qikan/Article/Detail?id=74837489504849528350485353.[37] 丁丽萍, 卢国庆. 面向频繁模式挖掘的差分隐私保护研究综述. 通信学报[J]. 2014, 35(10): 200-209, http://lib.cqvip.com/Qikan/Article/Detail?id=662713429.[38] Ding LiPing, Mao TianHua, Fu Hao, Cao GengYu. Temperature dependence of the photothermal laser cooling efficiency for a micro-cantilever. CHINESE PHYSICS B[J]. 2014, 23(10): http://ir.wipm.ac.cn/handle/112942/1305.[39] Ding LiPing, Zhou QiMing, Wei JiangChun. Estimation of Endocarpon pusillum Hedwig carbon budget in the Tengger Desert based on its photosynthetic rate. SCIENCE CHINA-LIFE SCIENCES[J]. 2013, 56(9): 848-855, http://dx.doi.org/10.1007/s11427-013-4526-9.[40] Guan Bei, Wu Yanjun, Ding Liping, Wang Yongji. CIVSched: Communication-aware inter-VM scheduling in virtual machine monitor based on the process. 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2013null. 2013, 597-604, http://ir.iscas.ac.cn/handle/311060/16642.[41] 谢亚龙, 丁丽萍, 林渝淇, 赵晓柯. ICFF:一种IaaS模式下的云取证框架. 通信学报[J]. 2013, 34(5): 200-206, http://lib.cqvip.com/Qikan/Article/Detail?id=45838051.[42] Lin Yuqi, Ding Liping, Wu Jingzheng, Xie Yalong, Wang Yongji, IEEE Comp Soc. Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation. 2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION SERE-Cnull. 2013, 46-53, [43] Guan Bei, Wu Yanjun, Ding Liping, Wang Yongji, Balaji P, Epema D, Fahringer T. CIVSched: Communication- aware Inter-VM Scheduling in Virtual Machine Monitor based on the Process. PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013)null. 2013, 597-604, [44] Lu Yi, Ding Liping, Wang Yongji. Improved linear analysis on block cipher multi2. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2012, 72-85, http://ir.iscas.ac.cn/handle/311060/15821.[45] Feng Dengguo, Fan Xiubin, Ding Liping, Wang Zhangyi. ON THE NONEXISTENCE OF NONTRIVIAL SMALL CYCLES OF THE μ FUNCTION IN 3x + 1 CONJECTURE. Journal of Systems Science and Complexity[J]. 2012, 25(6): 1215-1222, [46] Wu Jingzheng, Ding Liping, Lin Yuqi, MinAllah Nasro, Wang Yongji. Xenpump: a new method to mitigate timing channel in cloud computing. Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012null. 2012, 678-685, http://ir.iscas.ac.cn/handle/311060/15753.[47] Lu Yi, Vaudenay Serge, Meier Willi, Ding Liping, Jiang Jianchun. Synthetic linear analysis: improved attacks on cubehash and rabbit. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2012, 248-260, http://ir.iscas.ac.cn/handle/311060/15778.[48] 贺喜, 蒋建春, 丁丽萍, 王永吉, 廖晓峰. 基于LDA模型的主机异常检测方法. Computer Applications and Software[J]. 2012, 29(8): 1-4,24, http://lib.cqvip.com/Qikan/Article/Detail?id=42968367.[49] Jiang Jianchun, Ding Liping, Zhai Ennan, Yu Ting. Vrank: a context-aware approach to vulnerability scoring and ranking in soa. Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012null. 2012, 61-70, http://ir.iscas.ac.cn/handle/311060/15754.[50] 邓程, 丁丽萍, 贺也平, 韩伟. 基于静态分析的XSM正确性验证. 计算机应用与软件[J]. 2012, 29(9): 1-5, http://lib.cqvip.com/Qikan/Article/Detail?id=43372965.[51] Feng Dengguo, Fan Xiubin, Ding Liping, Wang Zhangyi. On the nonexistence of nontrivial small cycles of the μ function in 3x+1 conjecture. Journal of Systems Science and Complexity[J]. 2012, 25(6): 1215-1222, https://www.webofscience.com/wos/woscc/full-record/WOS:000312886700014.[52] 贺喜, 蒋建春, 丁丽萍, 王永吉, 廖晓峰. 基于LDA模型的主机异常检测方法. Computer Applications and Software[J]. 2012, 29(8): 1-4,24, http://lib.cqvip.com/Qikan/Article/Detail?id=42968367.[53] 蔡志强, 丁丽萍, 贺也平. 一种基于虚拟机的动态内存泄露检测方法. 计算机应用与软件[J]. 2012, 29(9): 10-13, http://lib.cqvip.com/Qikan/Article/Detail?id=43372967.[54] Liao Xiaofeng, Wang Yongji, Ding Liping, Gu Jian. A novel duplicate images detection method based on plsa model. Proceedings of SPIE - The International Society for Optical Engineeringnull. 2012, [55] Liao, Xiaofeng, Wang, Yongji, Ding, Liping, Gu, Jian, Zeng, Z, Li, Y. A Novel Duplicate Images Detection Method Based on PLSA Model. FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): MACHINE VISION, IMAGE PROCESSING, AND PATTERN ANALYSISnull. 2012, 8349: [56] 丁丽萍. Android操作系统的安全性分析. 信息网络安全[J]. 2012, 28-31, http://lib.cqvip.com/Qikan/Article/Detail?id=41287053.[57] Wu, Jingzheng, Wang, Yongji, Ding, Liping, Liao, Xiaofeng. Improving performance of network covert timing channel through Huffman coding. MATHEMATICAL AND COMPUTER MODELLING[J]. 2012, 55(1-2): 69-79, http://dx.doi.org/10.1016/j.mcm.2011.01.051.[58] Liping Ding, Yifei Guo, Jian Gu, Jingzheng Wu. DRMIBT: A New DRM Implementation Based on Virtual Machine. Energy Procedia. 2011, 4790-4799, http://dx.doi.org/10.1016/j.egypro.2011.12.091.[59] Wu JingZheng, Ding LiPing, Wang YongJi. Research on key problems of covert channel in cloud computing. Tongxin Xuebao/Journal on Communications[J]. 2011, 32(9 A): 184-203, http://ir.iscas.ac.cn/handle/311060/16063.[60] Han Wei, He Yeping, Ding Liping. Verifying the safety of xen security modules. 2011 5th International Conference on Secure Software Integration and Reliability Improvement - Companion, SSIRI-C 2011null. 2011, 30-34, http://124.16.136.157/handle/311060/14205.[61] Zhai, Ennan, Shen, Qingni, Wang, Yonggang, Yang, Tao, Ding, Liping, Qing, Sihan, Du, XY, Fan, WF, Wang, JM, Peng, ZY, Sharaf, MA. SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. WEB TECHNOLOGIES AND APPLICATIONSnull. 2011, 6612: 370-+, [62] Wu JingZheng, Ding Liping, Wang Yongji, Han Wei. A practical covert channel identification approach in source code based on directed information flow graph. Proceedings - 2011 5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011null. 2011, 98-107, http://124.16.136.157/handle/311060/14377.[63] 丁丽萍. 国际四级安全操作系统的内存泄露分析方法研究. 信息网络安全[J]. 2011, 67-68, http://ir.iscas.ac.cn/handle/311060/16100.[64] 丁丽萍. 基于Terra的数字版权管理设计及实现. 信息网络安全[J]. 2011, 5-7, http://lib.cqvip.com/Qikan/Article/Detail?id=37859832.[65] Liao, Xiaofeng, Wang, Yongji, Ding, Liping, Gu, Jian. EXTENDED PROBABILISTIC LATENT SEMANTIC ANALYSIS MODEL FOR TOPICS IN TIME-STAMPED IMAGES. INTELLIGENT AUTOMATION AND SOFT COMPUTING[J]. 2011, 17(7): 983-995, https://www.webofscience.com/wos/woscc/full-record/WOS:000296754800014.[66] 王永吉, 吴敬征, 丁丽萍, 曾海涛. 一种基于并发冲突间隔时间的隐蔽信道检测方法. 计算机研究与发展[J]. 2011, 48(8): 1542-1553, http://lib.cqvip.com/Qikan/Article/Detail?id=38802226.[67] 丁丽萍. 国标四级安全操作系统的内存泄露分析方法研究. 信息网络安全[J]. 2011, 67-68, http://lib.cqvip.com/Qikan/Article/Detail?id=38143249.[68] Liao Xiaofeng, Ding Liping, Wang Yongji. Secure machine learning, a brief overview. 2011 5th International Conference on Secure Software Integration and Reliability Improvement - Companion, SSIRI-C 2011null. 2011, 26-29, http://124.16.136.157/handle/311060/14231.[69] Han Wei, Ren Mengfei, Tian Shuo, Ding Liping, He Yeping. Static analysis of format string vulnerabilities. Proceedings - 1st ACIS International Symposium on Software and Network Engineering, SSNE 2011null. 2011, 122-127, http://ir.iscas.ac.cn/handle/311060/16298.[70] Zhai Ennan, Ding Liping, Qing Sihan. Towards a reliable spam-proof tagging system. Proceedings - 2011 5th International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011null. 2011, 174-181, http://124.16.136.157/handle/311060/14211.[71] Wu Jing Zheng, Ding Liping, Wang Yongji, Han Wei. Identification and evaluation of sharing memory covert timing channel in xen virtual machines. Proceedings - 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011null. 2011, 283-291, http://124.16.136.157/handle/311060/14281.[72] 丁丽萍. Analysis and Research on Security Defense Strategies of Cloud Security. ICETC 2011. 2011, [73] 丁丽萍. 虚拟机与数字版权保护. 信息网络安全[J]. 2011, 4-6, http://lib.cqvip.com/Qikan/Article/Detail?id=37470862.[74] Jiang Jianchun, Chen Weifeng, Ding Liping. On estimating cyber adversaries capabilities: a bayesian model approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2010, 502-504, http://124.16.136.157/handle/311060/8844.[75] 王永吉, 吴敬征, 曾海涛, 丁丽萍, 廖晓锋. 隐蔽信道研究. 软件学报[J]. 2010, 2262-2288, http://lib.cqvip.com/Qikan/Article/Detail?id=35075613.[76] 胡晓昌, 丁丽萍, 武延军. 基于虚拟机执行过程重放的热迁移系统研究. 计算机工程与设计[J]. 2010, 4213-4217, http://lib.cqvip.com/Qikan/Article/Detail?id=35362053.[77] Ding Liping, Gu Jian, Wang Yongji, Wu Jingzheng. Analysis of Telephone Call Detail Records based on Fuzzy Decision Tree. CHINA COMMUNICATIONS[J]. 2010, 7(6): 120-127, http://lib.cqvip.com/Qikan/Article/Detail?id=36082890.[78] 丁丽萍. 网络取证及计算机取证的理论研究. 信息网络安全[J]. 2010, 38-41, http://lib.cqvip.com/Qikan/Article/Detail?id=36154324.[79] Liao Xiaofeng, Wang Yongji, Ding Liping. Discovering temporal patterns from images using extended plsa. 2010 International Conference on Multimedia Technology, ICMT 2010null. 2010, http://124.16.136.157/handle/311060/8732.[80] 丁丽萍. Constructing Scenario of Event-Flag Covert Channel in Secure Operating System. 2nd International Conference on Information and Multimedia Technology (ICIMT 2010). 2010, [81] 丁丽萍. 计算机取证的研究现状分析. 信息网络安全[J]. 2010, 9-11, http://lib.cqvip.com/Qikan/Article/Detail?id=35824895.[82] 丁丽萍. A Countermeasure against Stack-smashing Attack Based on Canary Obtained through Nonlinear Transformation. 2010 2nd International Conference on Information and Multimedia Technology (ICIMT 2010). 2010, [83] 肖贺, 王永吉, 潘远明, 丁丽萍. 采用基本块规约的控制流检测性能优化方法. 小型微型计算机系统[J]. 2009, 2378-2382, http://lib.cqvip.com/Qikan/Article/Detail?id=32378949.[84] 周博文, 丁丽萍, 王永吉. 面向入侵的取证系统框架. 计算机应用研究[J]. 2008, 25(4): 1117-1119, http://lib.cqvip.com/Qikan/Article/Detail?id=26924751.[85] 丁丽萍, 周博文, 王永吉. 基于安全操作系统的电子证据获取与存储. 软件学报[J]. 2007, 18(7): 1715-1729, http://lib.cqvip.com/Qikan/Article/Detail?id=24884678.[86] 丁丽萍, 王永吉. 计算机取证的相关法律技术问题研究. 软件学报[J]. 2005, 16(2): 260-275, http://lib.cqvip.com/Qikan/Article/Detail?id=12025532.[87] 丁丽萍, 王永吉. 多维计算机取证模型研究. 信息网络安全[J]. 2005, 73-74, http://lib.cqvip.com/Qikan/Article/Detail?id=20377832.[88] 丁丽萍, 王永吉. 计算机取证研究综述. 通讯和计算机:中英文版[J]. 2005, 2(8): 1-9, http://lib.cqvip.com/Qikan/Article/Detail?id=23310363.[89] 丁丽萍, 王永吉. 多维计算机取证模型研究. 计算机安全[J]. 2005, 5-9, http://lib.cqvip.com/Qikan/Article/Detail?id=20514187.[90] 丁丽萍. 基于网络数据流的计算机取证技术. 信息网络安全[J]. 2005, 74-76, http://lib.cqvip.com/Qikan/Article/Detail?id=15727039.[91] 丁丽萍, 王永吉. 论计算机取证工具软件及其检测. 中国信息协会信息安全专业委员会. 2004, 5-12, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CPFD&dbname=CPFD9908&filename=XXAQ200406001000&uid=WEEvREcwSlJHSldRa1FhcEFLUmVhZHdLaS82bGhxLzlrYnBrNGNONWFCMD0=$9A4hF_YAuvQ5obgVAqNKPCYcEjKensW4IQMovwHtwkF4VYPoHbKxJw!!&v=MTc0MzRkaG5qOThUbmpxcXhkRWVNT1VLcmlmWmVadkZ5amlVN3JNSTEwU1BUWEtmN0c0SHRYTXFZOUZaZXNQREJOS3Vo.[92] 江亚东, 夏克俭, 丁丽萍, 李恪, 陈因颀. 基于小波神经网络的混沌模式提取. 北京科技大学学报[J]. 2001, 23(5): 474-, http://lib.cqvip.com/Qikan/Article/Detail?id=5616560.