Automatic detection of integer sign vulnerabilities
Bin Liang, Hui Liu, Wenchang Shi, Zhiyong Shan
Published in 2008 International Conference on Information and Automation (01.06.2008)
Published in 2008 International Conference on Information and Automation (01.06.2008)
Get full text
Conference Proceeding
Compatible and Usable Mandatory Access Control for Good-enough OS Security
Get full text
Paper
Journal Article
An Approach to Reveal Unknown Malware Hiding Techniques
Shan, Zhiyong, Channu, Harsha Vardhan Reddy
Published in 2023 IEEE/ACIS 8th International Conference on Big Data, Cloud Computing, and Data Science (BCD) (14.12.2023)
Published in 2023 IEEE/ACIS 8th International Conference on Big Data, Cloud Computing, and Data Science (BCD) (14.12.2023)
Get full text
Conference Proceeding
Bi-C shape antenna design based on a proposed particle swarm optimization algorithm
Shan, Zhiyong, Tian, Haiyun, Chen, Yunpeng
Published in 2021 China Automation Congress (CAC) (22.10.2021)
Published in 2021 China Automation Congress (CAC) (22.10.2021)
Get full text
Conference Proceeding
A new particle swarm optimization method based on random disturbance
Shan, Zhiyong, Xu, Erhao, Xue, Qingshui
Published in 2021 China Automation Congress (CAC) (22.10.2021)
Published in 2021 China Automation Congress (CAC) (22.10.2021)
Get full text
Conference Proceeding
Automated Dynamic Detection of Self-Hiding Behavior
Baird, Luke, Shan, Zhiyong, Namboodiri, Vinod
Published in 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW) (01.11.2019)
Published in 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW) (01.11.2019)
Get full text
Conference Proceeding
Dual frequency planar inverted‐L bow‐tie patch antenna
Shen, Wenhui, Zhou, Xilang, Shan, Zhiyong
Published in Microwave and optical technology letters (20.08.2005)
Published in Microwave and optical technology letters (20.08.2005)
Get full text
Journal Article