Random-walk based approach to detect clone attacks in wireless sensor networks
Zeng, Yingpei, Cao, Jiannong, Zhang, Shigeng, Guo, Shanqing, Xie, Li
Published in IEEE journal on selected areas in communications (01.06.2010)
Published in IEEE journal on selected areas in communications (01.06.2010)
Get full text
Journal Article
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
Hu, Chengyu, Li, Zhen, Liu, Pengtao, Yang, Rupeng, Guo, Shanqing, Zhang, Hailong
Published in Mobile networks and applications (01.12.2021)
Published in Mobile networks and applications (01.12.2021)
Get full text
Journal Article
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols
Zeng, Yingpei, Lin, Mingmin, Guo, Shanqing, Shen, Yanzhao, Cui, Tingting, Wu, Ting, Zheng, Qiuhua, Wang, Qiuhua
Published in Sensors (Basel, Switzerland) (11.09.2020)
Published in Sensors (Basel, Switzerland) (11.09.2020)
Get full text
Journal Article
coxHE: A software-hardware co-design framework for FPGA acceleration of homomorphic computation
Han, Mingqin, Zhu, Yilan, Lou, Qian, Zhou, Zimeng, Guo, Shanqing, Ju, Lei
Published in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01.01.2022)
Published in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01.01.2022)
Get full text
Conference Proceeding
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications
Wu, Jianliang, Cui, Tingting, Ban, Tao, Guo, Shanqing, Cui, Lizhen
Published in Security and communication networks (10.09.2015)
Published in Security and communication networks (10.09.2015)
Get full text
Journal Article
An Overview of Social Analysis from Mobile Telephone Calls of Different Operators
Wang, Changyuan, Liu, Yang, Lu, Zongfei, Guo, Shanqing, Cui, Lizhen
Published in China communications (01.09.2016)
Published in China communications (01.09.2016)
Get full text
Journal Article
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks
Li, Yongfeng, Ouyang, Jinbing, Mao, Bing, Ma, Kai, Guo, Shanqing
Published in EAI endorsed transactions on security and safety (01.12.2017)
Published in EAI endorsed transactions on security and safety (01.12.2017)
Get full text
Journal Article
SWCA: A Secure Weighted Clustering Algorithm in Wireless Ad Hoc Networks
Yingpei Zeng, Jiannong Cao, Shanqing Guo, Kai Yang, Li Xie
Published in 2009 IEEE Wireless Communications and Networking Conference (01.04.2009)
Published in 2009 IEEE Wireless Communications and Networking Conference (01.04.2009)
Get full text
Conference Proceeding
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning
Han, Zhaoxing, Hu, Chengyu, Li, Tongyaqi, Qi, Qingqiang, Tang, Peng, Guo, Shanqing
Published in Neural networks (01.11.2024)
Published in Neural networks (01.11.2024)
Get full text
Journal Article
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM
Tao Ban, Takahashi, Takeshi, Shanqing Guo, Inoue, Daisuke, Nakao, Koji
Published in 2016 11th Asia Joint Conference on Information Security (AsiaJCIS) (01.08.2016)
Published in 2016 11th Asia Joint Conference on Information Security (AsiaJCIS) (01.08.2016)
Get full text
Conference Proceeding
Multi-Party Sequential Data Publishing Under Differential Privacy
Tang, Peng, Chen, Rui, Su, Sen, Guo, Shanqing, Ju, Lei, Liu, Gaoyuan
Published in IEEE transactions on knowledge and data engineering (01.09.2023)
Published in IEEE transactions on knowledge and data engineering (01.09.2023)
Get full text
Journal Article
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security
Qin, Guiyun, Liu, Pengtao, Hu, Chengyu, Li, Zengpeng, Guo, Shanqing
Published in IEEE systems journal (01.12.2023)
Published in IEEE systems journal (01.12.2023)
Get full text
Journal Article
Pollution Attack: A New Attack Against Localization in Wireless Sensor Networks
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqing Guo, Li Xie
Published in 2009 IEEE Wireless Communications and Networking Conference (01.04.2009)
Published in 2009 IEEE Wireless Communications and Networking Conference (01.04.2009)
Get full text
Conference Proceeding
Android Custom Permissions Demystified: A Comprehensive Security Evaluation
Li, Rui, Diao, Wenrui, Li, Zhou, Yang, Shishuai, Li, Shuang, Guo, Shanqing
Published in IEEE transactions on software engineering (01.11.2022)
Published in IEEE transactions on software engineering (01.11.2022)
Get full text
Journal Article
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
Hu, Chengyu, Xu, Yuqin, Liu, Pengtao, Yu, Jia, Guo, Shanqing, Zhao, Minghao
Published in Information sciences (01.05.2020)
Published in Information sciences (01.05.2020)
Get full text
Journal Article