Mu Zhang

According to our database1, Mu Zhang authored at least 42 papers between 2003 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A parallelized hybrid N-S/DSMC-IP approach based on adaptive structured/unstructured overlapping grids for hypersonic transitional flows.
J. Comput. Physics, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Design of spectrum shaping codes for high-density data storage.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Research on Application of Gesture Recognition Technology in Traditional Puppet Show.
Proceedings of the Design, User Experience, and Usability: Designing Interactions, 2018

2017
On the design of spectrum shaping codes for high-density data storage.
IEEE Trans. Consumer Electronics, 2017

Extracting Conditional Formulas for Cross-Platform Bug Search.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Android Application Security - A Semantics and Context-Aware Approach
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-47812-8, 2016

Time-Invariant Quasi-Cyclic Spatially Coupled LDPC Codes Based on Packings.
IEEE Trans. Communications, 2016

Two Enhanced Reliability-Based Decoding Algorithms for Nonbinary LDPC Codes.
IEEE Trans. Communications, 2016

Balanced Gray Codes With Flexible Lengths.
IEEE Communications Letters, 2016

Sparse coding scheme for defective memories.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Extract Me If You Can: Abusing PDF Parsers in Malware Detectors.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Low error-floor majority-logic decoding based algorithm for non-binary LDPC codes.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Privacy-Preserving Offloading of Mobile App to the Public Cloud.
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015

Towards Automatic Generation of Security-Centric Descriptions for Android Apps.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Bit-Reliability Based Low-Complexity Decoding Algorithms for Non-Binary LDPC Codes.
IEEE Trans. Communications, 2014

Optimization of Inter-network Bandwidth Resources for Large-Scale Data Transmission.
JNW, 2014

Density optimisation of generator matrices of quasi-cyclic low-density parity-check codes and their rank analysis.
IET Communications, 2014

Differential Contribution of Bilateral Supplementary Motor Area to the Effective Connectivity Networks Induced by Task Conditions Using Dynamic Causal Modeling.
Brain Connectivity, 2014

AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Low complexity encoding algorithm of RS-based QC-LDPC codes.
Proceedings of the 2014 Information Theory and Applications Workshop, 2014

Efficient, context-aware privacy leakage confinement for android applications without firmware modding.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
TransBlocker: Transforming and Taming Privacy-Breaching Android Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Study on the Influence Factors of High-Tech Enterprise Credit Risk: Empirical Evidence from China's Listed Companies.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

2012
A concatenation scheme of LDPC codes and source codes for flash memories.
EURASIP J. Adv. Sig. Proc., 2012

In praise of nontrivial redundant rows of algebraic LDPC codes.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Study on Low-Carbon Economy Model and Method of Chinese Tourism Industry.
IJAL, 2011

Stable adaptive fuzzy control for MIMO nonlinear systems.
Computers & Mathematics with Applications, 2011

2010
Research on the Security Monitoring of the Amusement Ride of Tourist Sites Based on RFID.
Wireless Sensor Network, 2010

Research on Innovation Mechanism and Model of Logistics Enterprise: A Chinese Perspective.
IJAL, 2010

Adaptive Fuzzy Path Following Control for Mobile Robots with Model Uncertainty.
Proceedings of the Information and Automation - International Symposium, 2010

A Method for Identifying the Industry Credit Risk Based on Markov Chain.
Proceedings of the International Conference on E-Business and E-Government, 2010

Indirect adaptive fuzzy control for a class of MIMO nonlinear systems.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
Study on the Recommendation Technology for Tourism Information Service.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

2008
Deadline-constrained media uploading systems.
Multimedia Tools Appl., 2008

2006
A DT-based Adaptive BLUE Algorithm.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

2003
Method of normal estimation based on approximation for visualization.
J. Electronic Imaging, 2003

Hierarchical Clustering-Merging for Multidimensional Index Structures.
Proceedings of the Image and Video Retrieval, Second International Conference, 2003


  Loading...