Items where authors include "Fang, D"

Export as [feed] Atom [feed] RSS
Number of items: 20.

Article

Xu, R, Tang, Z, Ye, G et al. (4 more authors) (2022) Detecting Code Vulnerabilities by Learning from Large-Scale Open Source Repositories. Journal of Information Security and Applications, 69. 103293. ISSN 2214-2126

Chen, L, Chen, K, Xiong, J et al. (7 more authors) (2022) Towards Wide-Area Contactless Wireless Sensing. IEEE/ACM Transactions on Networking. ISSN 1063-6692

Zhai, S, Ye, G, Tang, Z et al. (4 more authors) (2021) Towards practical 3D ultrasound sensing on commercial-off-the-shelf mobile devices. Computer Networks, 191. 107990. ISSN 1389-1286

Wang, H, Ye, G, Tang, Z et al. (6 more authors) (2020) Combining Graph-based Learning with Automated Data Collection for Code Vulnerability Detection. IEEE Transactions on Information Forensics and Security, 16. pp. 1943-1958. ISSN 1556-6013

Zhao, Y, Tang, Z, Ye, G et al. (4 more authors) (2020) Semantics-aware obfuscation scheme prediction for binary. Computers & Security, 99. 102072. p. 102072. ISSN 0167-4048

Zhao, Y, Tang, Z, Ye, G et al. (4 more authors) (2020) Compile-time Code Virtualization for Android Applications. Computers & Security, 94. 101821. ISSN 0167-4048

Ye, G, Tang, Z, Fang, D et al. (6 more authors) (2020) Using Generative Adversarial Networks to Break and Protect Text Captchas. ACM Transactions on Privacy and Security, 23 (2). 7. ISSN 2471-2566

Wang, W, Li, M, Tang, Z et al. (7 more authors) (2019) Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity. IEEE Access, 7. pp. 169160-169173. ISSN 2169-3536

Wang, S, Ye, G, Li, M et al. (8 more authors) (2019) Leveraging WebAssembly for Numerical JavaScript Code Virtualization. IEEE Access, 7. pp. 182711-182724. ISSN 2169-3536

He, Z, Ye, G, Yuan, L et al. (7 more authors) (2019) Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging. IEEE Access, 7. pp. 115062-115074. ISSN 2169-3536

Ye, G, Tang, Z, Fang, D et al. (4 more authors) (2018) A Video-based Attack for Android Pattern Lock. ACM Transactions on Privacy and Security, 21 (4). 19. ISSN 2471-2566

Zhai, S, Tang, Z, Wang, D et al. (6 more authors) (2018) Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery. Sensors, 18 (7). 2075. ISSN 1424-8220

Proceedings Paper

Zhai, S, Tang, Z, Nurmi, P et al. (3 more authors) (2021) RISE: Robust Wireless Sensing Using Probabilistic and Statistical Assessments. In: MobiCom '21: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 28 Mar - 01 Apr 2022, New Orleans, Louisiana. ACM , pp. 309-322. ISBN 978-1-4503-8342-4

Zhai, S, Tang, Z, Nurmi, P et al. (3 more authors) (2021) RISE: robust wireless sensing using probabilistic and statistical assessments. In: MobiCom '21: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. The 27th Annual International Conference On Mobile Computing And Networking (Mobicom), 31 Jan - 02 Feb 2022, New Orleans, Louisiana, USA. Association for Computing Machinery , pp. 309-322. ISBN 978-1-4503-8342-4

Ye, G, Tang, Z, Tan, SH et al. (6 more authors) (2021) Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing. In: PLDI 2021: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation. PLDI 2021: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 20-25 Jun 2021, Online. Association for Computing Machinery (ACM) , pp. 435-450. ISBN 978-1-4503-8391-2

Ye, G, Tang, Z, Wang, H et al. (4 more authors) (2020) Deep Program Structure Modeling Through Multi-Relational Graph-based Learning. In: PACT '20: Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques. PACT '20: International Conference on Parallel Architectures and Compilation Techniques, 03-07 Oct 2020, Virtual Event, USA. Association for Computing Machinery , pp. 111-123. ISBN 978-1-4503-8075-1

Chen, K, Chen, L, Han, D et al. (7 more authors) (2019) Towards wide-area contactless human sensing: poster abstract. In: Proceedings of the 17th Conference on Embedded Networked Sensor Systems - SenSys '19. SenSys '19: Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 10-13 Nov 2019, New York, USA. ACM Press . ISBN 9781450369503

Chen, L, Xiong, J, Chen, X et al. (6 more authors) (2019) WideSee: towards wide-area contactless wireless sensing. In: Proceedings of the 17th Conference on Embedded Networked Sensor Systems. 17th ACM Conference on Embedded Networked Sensor Systems (SenSys 2019), 10-13 Nov 2019, New York, NY, USA. ACM Digital Library , pp. 258-270. ISBN 978-1-4503-6950-3

Ye, G, Tang, Z, Fang, D et al. (5 more authors) (2018) Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. CCS 2018: 25th ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada. ACM , pp. 332-348. ISBN 978-1-4503-5693-0

Ye, G, Tang, Z, Fang, D et al. (4 more authors) (2017) Cracking Android Pattern Lock in Five Attempts. In: Proceedings of the 2017 Network and Distributed System Security Symposium 2017 (NDSS 17). NDSS 17, 26 Feb - 01 Mar 2017, San Diego, California, USA. Internet Society . ISBN 1-891562-46-0

This list was generated on Sat Apr 13 15:18:53 2024 BST.