Droidfuzzer: Fuzzing the android apps with intent-filter tag H Ye, S Cheng, L Zhang, F Jiang Proceedings of International Conference on Advances in Mobile Computing …, 2013 | 168 | 2013 |
GDroid: Android malware detection and classification with graph convolutional network H Gao, S Cheng, W Zhang Computers & Security 106, 102264, 2021 | 162 | 2021 |
Influencerank: An efficient social influence measurement for millions of users in microblog W Chen, S Cheng, X He, F Jiang 2012 Second International Conference on Cloud and Green Computing, 563-570, 2012 | 52 | 2012 |
TFDroid: Android malware detection by topics and sensitive data flows using machine learning techniques S Lou, S Cheng, J Huang, F Jiang 2019 IEEE 2Nd international conference on information and computer …, 2019 | 50 | 2019 |
An efficient SVM-based method for multi-class network traffic classification N Jing, M Yang, S Cheng, Q Dong, H Xiong 30th IEEE International performance computing and communications conference, 1-8, 2011 | 46 | 2011 |
Novel user influence measurement based on user interaction in microblog X Li, S Cheng, W Chen, F Jiang Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013 | 44 | 2013 |
A lightweight framework for function name reassignment based on large-scale stripped binaries H Gao, S Cheng, Y Xue, W Zhang Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021 | 35 | 2021 |
An ensemble model for diabetes diagnosis in large-scale and imbalanced dataset X Wei, F Jiang, F Wei, J Zhang, W Liao, S Cheng Proceedings of the computing frontiers conference, 71-78, 2017 | 30 | 2017 |
PU learning in payload-based web anomaly detection Y Luo, S Cheng, C Liu, F Jiang 2018 Third International Conference on Security of Smart Cities, Industrial …, 2018 | 23 | 2018 |
Autrust: A practical trust measurement for adjacent users in social networks G Yin, F Jiang, S Cheng, X Li, X He 2012 Second International Conference on Cloud and Green Computing, 360-367, 2012 | 23 | 2012 |
Loongchecker: Practical summary-based semi-simulation to detect vulnerability in binary code S Cheng, J Yang, J Wang, J Wang, F Jiang 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 22 | 2011 |
A novel Android malware detection approach using operand sequences P Zhang, S Cheng, S Lou, F Jiang 2018 Third International Conference on Security of Smart Cities, Industrial …, 2018 | 18 | 2018 |
From image to code: executable adversarial examples of android applications S Gu, S Cheng, W Zhang Proceedings of the 2020 6th international conference on computing and …, 2020 | 12 | 2020 |
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference J Xiong, G Chen, K Chen, H Gao, S Cheng, W Zhang 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 10 | 2023 |
Image steganography using texture features and GANs J Huang, S Cheng, S Lou, F Jiang 2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019 | 10 | 2019 |
An asynchronous entanglement distribution protocol for quantum networks Z Wang, J Li, K Xue, S Cheng, N Yu, Q Sun, J Lu IEEE Network 36 (5), 40-47, 2022 | 9 | 2022 |
Awareness and control of personal data Based on the Cyber-I privacy model L Tang, J Ma, R Huang, BO Apduhan, H Li, S Cheng 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 …, 2014 | 8 | 2014 |
Find referral social networks H Guo, F Wei, S Cheng, F Jiang 2015 International Symposium on Security and Privacy in Social Networks and …, 2015 | 7 | 2015 |
Static detection of dangerous behaviors in android apps S Cheng, S Luo, Z Li, W Wang, Y Wu, F Jiang Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013 | 7 | 2013 |
Software backdoor analysis based on sensitive flow tracking and concolic execution X Xu, J Wang, S Cheng, T Zhang, F Jiang Wuhan University Journal of Natural Sciences 21 (5), 421-427, 2016 | 6 | 2016 |