Label inference attacks against vertical federated learning C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang 31st USENIX security symposium (USENIX Security 22), 1397-1414, 2022 | 227 | 2022 |
How to prove your model belongs to you: A blind-watermark based framework to protect intellectual property of DNN Z Li, C Hu, Y Zhang, S Guo Proceedings of the 35th annual computer security applications conference …, 2019 | 198 | 2019 |
Random-walk based approach to detect clone attacks in wireless sensor networks Y Zeng, J Cao, S Zhang, S Guo, L Xie IEEE Journal on selected areas in communications 28 (5), 677-691, 2010 | 179 | 2010 |
Windranger: A directed greybox fuzzer driven by deviation basic blocks Z Du, Y Li, Y Liu, B Mao Proceedings of the 44th International Conference on Software Engineering …, 2022 | 66 | 2022 |
Attribute-based re-encryption scheme in the standard model S Guo, Y Zeng, J Wei, Q Xu Wuhan University Journal of Natural Sciences 13 (5), 621-625, 2008 | 45 | 2008 |
Android custom permissions demystified: From privilege escalation to design shortcomings R Li, W Diao, Z Li, J Du, S Guo 2021 IEEE Symposium on security and privacy (SP), 70-86, 2021 | 43 | 2021 |
{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 43 | 2019 |
A study on association rule mining of darknet big data T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang 2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015 | 41 | 2015 |
Seeing is living? rethinking the security of facial liveness verification in the deepfake era C Li, L Wang, S Ji, X Zhang, Z Xi, S Guo, T Wang 31st USENIX Security Symposium (USENIX Security 22), 2673-2690, 2022 | 37 | 2022 |
An empirical study of potentially malicious third-party libraries in android apps Z Zhang, W Diao, C Hu, S Guo, C Zuo, L Li Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 34 | 2020 |
Integration of multi-modal features for android malware detection using linear SVM T Ban, T Takahashi, S Guo, D Inoue, K Nakao 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016 | 32 | 2016 |
Paddyfrog: systematically detecting confused deputy vulnerability in android applications J Wu, T Cui, T Ban, S Guo, L Cui Security and Communication Networks 8 (13), 2338-2349, 2015 | 31 | 2015 |
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps C Zuo, J Wu, S Guo Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 31 | 2015 |
Multifuzz: A coverage-based multiparty-protocol fuzzer for iot publish/subscribe protocols Y Zeng, M Lin, S Guo, Y Shen, T Cui, T Wu, Q Zheng, Q Wang Sensors 20 (18), 5194, 2020 | 29 | 2020 |
DRLgencert: Deep learning-based automated testing of certificate verification in SSL/TLS implementations C Chen, W Diao, Y Zeng, S Guo, C Hu 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 28 | 2018 |
Linear unsupervised hashing for ANN search in Euclidean space J Wang, XS Xu, S Guo, L Cui, XL Wang Neurocomputing 171, 283-292, 2016 | 28 | 2016 |
Sok: A modularized approach to study the security of automatic speech recognition systems Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo ACM Transactions on Privacy and Security 25 (3), 1-31, 2022 | 27 | 2022 |
Supervised robust discrete multimodal hashing for cross-media retrieval TK Yan, XS Xu, S Guo, Z Huang, XL Wang Proceedings of the 25th ACM international on conference on information and …, 2016 | 27 | 2016 |
Fine-grained hashing with double filtering ZD Chen, X Luo, Y Wang, S Guo, XS Xu IEEE Transactions on Image Processing 31, 1671-1683, 2022 | 26 | 2022 |
G-means: a clustering algorithm for intrusion detection Z Zhao, S Guo, Q Xu, T Ban International Conference on Neural Information Processing, 563-570, 2008 | 26 | 2008 |