Segui
Shaoyin Cheng
Shaoyin Cheng
Email verificata su ustc.edu.cn
Titolo
Citata da
Citata da
Anno
Droidfuzzer: Fuzzing the android apps with intent-filter tag
H Ye, S Cheng, L Zhang, F Jiang
Proceedings of International Conference on Advances in Mobile Computing …, 2013
1682013
GDroid: Android malware detection and classification with graph convolutional network
H Gao, S Cheng, W Zhang
Computers & Security 106, 102264, 2021
1622021
Influencerank: An efficient social influence measurement for millions of users in microblog
W Chen, S Cheng, X He, F Jiang
2012 Second International Conference on Cloud and Green Computing, 563-570, 2012
522012
TFDroid: Android malware detection by topics and sensitive data flows using machine learning techniques
S Lou, S Cheng, J Huang, F Jiang
2019 IEEE 2Nd international conference on information and computer …, 2019
502019
An efficient SVM-based method for multi-class network traffic classification
N Jing, M Yang, S Cheng, Q Dong, H Xiong
30th IEEE International performance computing and communications conference, 1-8, 2011
462011
Novel user influence measurement based on user interaction in microblog
X Li, S Cheng, W Chen, F Jiang
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
442013
A lightweight framework for function name reassignment based on large-scale stripped binaries
H Gao, S Cheng, Y Xue, W Zhang
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
352021
An ensemble model for diabetes diagnosis in large-scale and imbalanced dataset
X Wei, F Jiang, F Wei, J Zhang, W Liao, S Cheng
Proceedings of the computing frontiers conference, 71-78, 2017
302017
PU learning in payload-based web anomaly detection
Y Luo, S Cheng, C Liu, F Jiang
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
232018
Autrust: A practical trust measurement for adjacent users in social networks
G Yin, F Jiang, S Cheng, X Li, X He
2012 Second International Conference on Cloud and Green Computing, 360-367, 2012
232012
Loongchecker: Practical summary-based semi-simulation to detect vulnerability in binary code
S Cheng, J Yang, J Wang, J Wang, F Jiang
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
222011
A novel Android malware detection approach using operand sequences
P Zhang, S Cheng, S Lou, F Jiang
2018 Third International Conference on Security of Smart Cities, Industrial …, 2018
182018
From image to code: executable adversarial examples of android applications
S Gu, S Cheng, W Zhang
Proceedings of the 2020 6th international conference on computing and …, 2020
122020
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference
J Xiong, G Chen, K Chen, H Gao, S Cheng, W Zhang
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
102023
Image steganography using texture features and GANs
J Huang, S Cheng, S Lou, F Jiang
2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019
102019
An asynchronous entanglement distribution protocol for quantum networks
Z Wang, J Li, K Xue, S Cheng, N Yu, Q Sun, J Lu
IEEE Network 36 (5), 40-47, 2022
92022
Awareness and control of personal data Based on the Cyber-I privacy model
L Tang, J Ma, R Huang, BO Apduhan, H Li, S Cheng
2014 IEEE 11th Intl Conf on Ubiquitous Intelligence & Computing and 2014 …, 2014
82014
Find referral social networks
H Guo, F Wei, S Cheng, F Jiang
2015 International Symposium on Security and Privacy in Social Networks and …, 2015
72015
Static detection of dangerous behaviors in android apps
S Cheng, S Luo, Z Li, W Wang, Y Wu, F Jiang
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
72013
Software backdoor analysis based on sensitive flow tracking and concolic execution
X Xu, J Wang, S Cheng, T Zhang, F Jiang
Wuhan University Journal of Natural Sciences 21 (5), 421-427, 2016
62016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20