Leveraging WebAssembly for Numerical JavaScript Code Virtualization
Wang, Shuai, Ye, Guixin, Li, Meng, Yuan, Lu, Tang, Zhanyong, Wang, Huanting, Wang, Wei, Wang, Fuwei, Ren, Jie, Fang, Dingyi, Wang, Zheng
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection
Wang, Huanting, Ye, Guixin, Tang, Zhanyong, Tan, Shin Hwei, Huang, Songfang, Fang, Dingyi, Feng, Yansong, Bian, Lizhong, Wang, Zheng
Published in IEEE transactions on information forensics and security (2021)
Published in IEEE transactions on information forensics and security (2021)
Get full text
Journal Article
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics
Li, Meng, Shen, Yanzhe, Ye, Guixin, He, Jialing, Zheng, Xin, Zhang, Zijian, Zhu, Liehuang, Conti, Mauro
Published in IEEE transactions on knowledge and data engineering (01.05.2024)
Published in IEEE transactions on knowledge and data engineering (01.05.2024)
Get full text
Journal Article
Input-Output Example-Guided Data Deobfuscation on Binary
Zhao, Yujie, Tang, Zhanyong, Ye, Guixin, Gong, Xiaoqing, Fang, Dingyi
Published in Security and communication networks (13.12.2021)
Published in Security and communication networks (13.12.2021)
Get full text
Journal Article
Semantics-aware obfuscation scheme prediction for binary
Zhao, Yujie, Tang, Zhanyong, Ye, Guixin, Peng, Dongxu, Fang, Dingyi, Chen, Xiaojiang, Wang, Zheng
Published in Computers & security (01.12.2020)
Published in Computers & security (01.12.2020)
Get full text
Journal Article
Compile-time code virtualization for android applications
Zhao, Yujie, Tang, Zhanyong, Ye, Guixin, Peng, Dongxu, Fang, Dingyi, Chen, Xiaojiang, Wang, Zheng
Published in Computers & security (01.07.2020)
Published in Computers & security (01.07.2020)
Get full text
Journal Article
Detecting code vulnerabilities by learning from large-scale open source repositories
Xu, Rongze, Tang, Zhanyong, Ye, Guixin, Wang, Huanting, Ke, Xin, Fang, Dingyi, Wang, Zheng
Published in Journal of information security and applications (01.09.2022)
Published in Journal of information security and applications (01.09.2022)
Get full text
Journal Article
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation
Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang
Published in 2016 IEEE Trustcom/BigDataSE/ISPA (01.08.2016)
Published in 2016 IEEE Trustcom/BigDataSE/ISPA (01.08.2016)
Get full text
Conference Proceeding
Optimizing HPC I/O Performance with Regression Analysis and Ensemble Learning
Liu, Zhangyu, Zhang, Cheng, Wu, Huijun, Fang, Jianbin, Peng, Lin, Ye, Guixin, Tang, Zhanyong
Published in 2023 IEEE International Conference on Cluster Computing (CLUSTER) (31.10.2023)
Published in 2023 IEEE International Conference on Cluster Computing (CLUSTER) (31.10.2023)
Get full text
Conference Proceeding
Exploiting Serialized Fine-Grained Action Recognition Using WiFi Sensing
Tong, Weiyuan, Li, Rong, Gong, Xiaoqing, Zhai, Shuangjiao, Zheng, Xia, Ye, Guixin
Published in Mobile information systems (08.11.2021)
Published in Mobile information systems (08.11.2021)
Get full text
Journal Article
VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern
Tang, Zhanyong, Li, Meng, Ye, Guixin, Cao, Shuai, Chen, Meiling, Gong, Xiaoqing, Fang, Dingyi, Wang, Zheng
Published in Applied sciences (12.05.2018)
Published in Applied sciences (12.05.2018)
Get full text
Journal Article
Exploiting Code Diversity to Enhance Code Virtualization Protection
Xue, Chao, Tang, Zhanyong, Ye, Guixin, Li, Guanghui, Gong, Xiaoqing, Wang, Wei, Fang, Dingyi, Wang, Zheng
Published in 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) (01.12.2018)
Published in 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) (01.12.2018)
Get full text
Conference Proceeding
Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing
Ye, Guixin, Tang, Zhanyong, Shin Hwei Tan, Huang, Songfang, Fang, Dingyi, Sun, Xiaoyang, Bian, Lizhong, Wang, Haibo, Wang, Zheng
Published in arXiv.org (15.04.2021)
Published in arXiv.org (15.04.2021)
Get full text
Paper
Journal Article
Golden snub-nosed monkey face detection and tracking algorithm based on S-TLD
Zheng Xin, Xu Pengfei, He Gang, Ye Guixin, Guo Songtao, Li Baoguo, Chen Xiaojiang, Fang Dingyi, Chang Hongli
Year of Publication 03.08.2016
Get full text
Year of Publication 03.08.2016
Patent