In Vivo Reductionist Approach Identifies miR-15a Protecting Mice From Obesity
Murgia, Nicola, Ma, Yuan, Najam, Syeda Sadia, Liu, Yu, Przybys, Joanna, Guo, Chenkai, Konopka, Witold, Vinnikov, Ilya A.
Published in Frontiers in endocrinology (Lausanne) (07.07.2022)
Published in Frontiers in endocrinology (Lausanne) (07.07.2022)
Get full text
Journal Article
Review Sharing via Deep Semi-Supervised Code Clone Detection
Guo, Chenkai, Yang, Hui, Huang, Dengrong, Zhang, Jianwen, Dong, Naipeng, Xu, Jing, Zhu, Jingwen
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article
Autonomous Permission Recommendation
Gao, Hongcan, Guo, Chenkai, Huang, Dengrong, Hou, Xiaolei, Wu, Yanfeng, Xu, Jing, He, Zhen, Bai, Guangdong
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article
RSKNet-MTSP: Effective and portable deep architecture for speaker verification
Wu, Yanfeng, Guo, Chenkai, Zhao, Junan, Jin, Xiao, Xu, Jing
Published in Neurocomputing (Amsterdam) (28.10.2022)
Published in Neurocomputing (Amsterdam) (28.10.2022)
Get full text
Journal Article
Dilated residual networks with multi-level attention for speaker verification
Wu, Yanfeng, Guo, Chenkai, Gao, Hongcan, Xu, Jing, Bai, Guangdong
Published in Neurocomputing (Amsterdam) (28.10.2020)
Published in Neurocomputing (Amsterdam) (28.10.2020)
Get full text
Journal Article
Callback2Vec: Callback-aware hierarchical embedding for mobile application
Guo, Chenkai, Huang, Dengrong, Dong, Naipeng, Zhang, Jianwen, Xu, Jing
Published in Information sciences (04.01.2021)
Published in Information sciences (04.01.2021)
Get full text
Journal Article
Deep Attentive Factorization Machine for App Recommendation Service
Guo, Chenkai, Xu, Yifan, Hou, Xiaolei, Dong, Naipeng, Xu, Jing, Ye, Quanqi
Published in 2019 IEEE International Conference on Web Services (ICWS) (01.07.2019)
Published in 2019 IEEE International Conference on Web Services (ICWS) (01.07.2019)
Get full text
Conference Proceeding
Sharing runtime permission issues for developers based on similar-app review mining
Gao, Hongcan, Guo, Chenkai, Bai, Guangdong, Huang, Dengrong, He, Zhen, Wu, Yanfeng, Xu, Jing
Published in The Journal of systems and software (01.02.2022)
Published in The Journal of systems and software (01.02.2022)
Get full text
Journal Article
QoS-Aware Diversified Service Selection
Guo, Chenkai, Zhang, Weijie, Dong, Naipeng, Liu, Zheli, Xiang, Yang
Published in IEEE transactions on services computing (01.05.2023)
Published in IEEE transactions on services computing (01.05.2023)
Get full text
Journal Article
Application of Hidden Markov Model in SQL Injection Detection
Peng Li, Lei Liu, Jing Xu, Hongji Yang, Liying Yuan, Chenkai Guo, Xiujuan Ji
Published in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (01.07.2017)
Published in 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (01.07.2017)
Get full text
Conference Proceeding
DALT: Deep Activity Launching Test via Intent-Constraint Extraction
Liu, Ao, Guo, Chenkai, Dong, Naipeng, Wang, Yinjie, Xu, Jing
Published in 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE) (01.10.2022)
Published in 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE) (01.10.2022)
Get full text
Conference Proceeding
Security Threats Caused by Public Event Callback in Android Application
Guo, Chenkai, Zhu, Jingwen, Yan, Xiaoyu, Li, Yan
Published in Journal of physics. Conference series (01.01.2020)
Published in Journal of physics. Conference series (01.01.2020)
Get full text
Journal Article
Exposing SQL Injection Vulnerability through Penetration Test based on Finite State Machine
Lei Liu, Jing Xu, Chenkai Guo, Jiehui Kang, Sihan Xu, Biao Zhang
Published in 2016 2nd IEEE International Conference on Computer and Communications (ICCC) (01.10.2016)
Published in 2016 2nd IEEE International Conference on Computer and Communications (ICCC) (01.10.2016)
Get full text
Conference Proceeding
MalDetector-using permission combinations to evaluate malicious features of Android App
Chenkai Guo, Jing Xu, Lei Liu, Sihan Xu
Published in 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS) (01.09.2015)
Published in 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS) (01.09.2015)
Get full text
Conference Proceeding
App Genome: Callback Sequencing in Android
Chenkai Guo, Naipeng Dong, Guangdong Bai, Quanqi Ye, Jinsong Dong, Jing Xu, Guannan Si
Published in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) (01.05.2017)
Published in 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) (01.05.2017)
Get full text
Conference Proceeding
Using association statistics to rank risk of Android application
Chenkai Guo, Jing Xu, Lei Liu, Sihan Xu
Published in 2015 IEEE International Conference on Computer and Communications (ICCC) (01.10.2015)
Published in 2015 IEEE International Conference on Computer and Communications (ICCC) (01.10.2015)
Get full text
Conference Proceeding
Automatic Construction of Callback Model for Android Application
Chenkai Guo, Quanqi Ye, Naipeng Dong, Guangdong Bai, Jin Song Dong, Jing Xu
Published in 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS) (01.11.2016)
Published in 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS) (01.11.2016)
Get full text
Conference Proceeding