Items where authors include "Fang, D"
Article
Chen, L, Chen, K, Xiong, J et al. (7 more authors) (2023) Towards Wide-Area Contactless Wireless Sensing. IEEE/ACM Transactions on Networking, 31 (2). pp. 590-605. ISSN 1063-6692
Xu, R, Tang, Z, Ye, G et al. (4 more authors) (2022) Detecting Code Vulnerabilities by Learning from Large-Scale Open Source Repositories. Journal of Information Security and Applications, 69. 103293. ISSN 2214-2126
Zhai, S, Ye, G, Tang, Z et al. (4 more authors) (2021) Towards practical 3D ultrasound sensing on commercial-off-the-shelf mobile devices. Computer Networks, 191. 107990. ISSN 1389-1286
Wang, H, Ye, G, Tang, Z et al. (6 more authors) (2020) Combining Graph-based Learning with Automated Data Collection for Code Vulnerability Detection. IEEE Transactions on Information Forensics and Security, 16. pp. 1943-1958. ISSN 1556-6013
Zhao, Y, Tang, Z, Ye, G et al. (4 more authors) (2020) Semantics-aware obfuscation scheme prediction for binary. Computers & Security, 99. 102072. p. 102072. ISSN 0167-4048
Zhao, Y, Tang, Z, Ye, G et al. (4 more authors) (2020) Compile-time Code Virtualization for Android Applications. Computers & Security, 94. 101821. ISSN 0167-4048
Ye, G, Tang, Z, Fang, D et al. (6 more authors) (2020) Using Generative Adversarial Networks to Break and Protect Text Captchas. ACM Transactions on Privacy and Security, 23 (2). 7. ISSN 2471-2566
Wang, W, Li, M, Tang, Z et al. (7 more authors) (2019) Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity. IEEE Access, 7. pp. 169160-169173. ISSN 2169-3536
Wang, S, Ye, G, Li, M et al. (8 more authors) (2019) Leveraging WebAssembly for Numerical JavaScript Code Virtualization. IEEE Access, 7. pp. 182711-182724. ISSN 2169-3536
He, Z, Ye, G, Yuan, L et al. (7 more authors) (2019) Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging. IEEE Access, 7. pp. 115062-115074. ISSN 2169-3536
Ye, G, Tang, Z, Fang, D et al. (4 more authors) (2018) A Video-based Attack for Android Pattern Lock. ACM Transactions on Privacy and Security, 21 (4). 19. ISSN 2471-2566
Zhai, S, Tang, Z, Wang, D et al. (6 more authors) (2018) Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery. Sensors, 18 (7). 2075. ISSN 1424-8220
Proceedings Paper
Zhai, S, Tang, Z, Nurmi, P et al. (3 more authors) (2021) RISE: Robust Wireless Sensing Using Probabilistic and Statistical Assessments. In: MobiCom '21: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 28 Mar - 01 Apr 2022, New Orleans, Louisiana. ACM , pp. 309-322. ISBN 978-1-4503-8342-4
Zhai, S, Tang, Z, Nurmi, P et al. (3 more authors) (2021) RISE: robust wireless sensing using probabilistic and statistical assessments. In: MobiCom '21: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. The 27th Annual International Conference On Mobile Computing And Networking (Mobicom), 31 Jan - 02 Feb 2022, New Orleans, Louisiana, USA. Association for Computing Machinery , pp. 309-322. ISBN 978-1-4503-8342-4
Ye, G, Tang, Z, Tan, SH et al. (6 more authors) (2021) Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing. In: PLDI 2021: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation. PLDI 2021: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 20-25 Jun 2021, Online. Association for Computing Machinery (ACM) , pp. 435-450. ISBN 978-1-4503-8391-2
Ye, G, Tang, Z, Wang, H et al. (4 more authors) (2020) Deep Program Structure Modeling Through Multi-Relational Graph-based Learning. In: PACT '20: Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques. PACT '20: International Conference on Parallel Architectures and Compilation Techniques, 03-07 Oct 2020, Virtual Event, USA. Association for Computing Machinery , pp. 111-123. ISBN 978-1-4503-8075-1
Chen, K, Chen, L, Han, D et al. (7 more authors) (2019) Towards wide-area contactless human sensing: poster abstract. In: Proceedings of the 17th Conference on Embedded Networked Sensor Systems - SenSys '19. SenSys '19: Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 10-13 Nov 2019, New York, USA. ACM Press . ISBN 9781450369503
Chen, L, Xiong, J, Chen, X et al. (6 more authors) (2019) WideSee: towards wide-area contactless wireless sensing. In: Proceedings of the 17th Conference on Embedded Networked Sensor Systems. 17th ACM Conference on Embedded Networked Sensor Systems (SenSys 2019), 10-13 Nov 2019, New York, NY, USA. ACM Digital Library , pp. 258-270. ISBN 978-1-4503-6950-3
Ye, G, Tang, Z, Fang, D et al. (5 more authors) (2018) Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. CCS 2018: 25th ACM SIGSAC Conference on Computer and Communications Security, 15-19 Oct 2018, Toronto, Canada. ACM , pp. 332-348. ISBN 978-1-4503-5693-0
Ye, G, Tang, Z, Fang, D et al. (4 more authors) (2017) Cracking Android Pattern Lock in Five Attempts. In: Proceedings of the 2017 Network and Distributed System Security Symposium 2017 (NDSS 17). NDSS 17, 26 Feb - 01 Mar 2017, San Diego, California, USA. Internet Society . ISBN 1-891562-46-0