Shize Guo

Orcid: 0009-0007-9678-6632

According to our database1, Shize Guo authored at least 74 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Supervised Representation Learning for Network Traffic With Cluster Compression.
IEEE Trans. Sustain. Comput., 2024

MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Towards robust CNN-based malware classifiers using adversarial examples generated based on two saliency similarities.
Neural Comput. Appl., August, 2023

AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation.
Comput. Secur., April, 2023

Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection.
PeerJ Comput. Sci., 2023

GraphMoco: a Graph Momentum Contrast Model that Using Multimodel Structure Information for Large-scale Binary Function Representation Learning.
CoRR, 2023

Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

A Covert Attack Method Against FPGA Clouds.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.
World Wide Web, 2022

A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient.
Secur. Commun. Networks, 2022

A unified semantic description and user's permissions knowledge reasoning for multiple domain cyberspace based on knowledge graph.
J. Intell. Fuzzy Syst., 2022

Instance Attack: An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware Detection.
CoRR, 2022

Fun2Vec: a Contrastive Learning Framework of Function-level Representation for Binary.
CoRR, 2022

A DNS Tunnel Sliding Window Differential Detection Method Based on Normal Distribution Reasonable Range Filtering.
CoRR, 2022

2021
Optimal Sprinting Pattern in Thermal Constrained CMPs.
IEEE Trans. Emerg. Top. Comput., 2021

2020
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism.
Secur. Commun. Networks, 2020

Securing IoT Space via Hardware Trojan Detection.
IEEE Internet Things J., 2020

Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning.
CoRR, 2020

2019
Security-Aware Task Mapping Reducing Thermal Side Channel Leakage in CMPs.
IEEE Trans. Ind. Informatics, 2019

An API Semantics-Aware Malware Detection Method Based on Deep Learning.
Secur. Commun. Networks, 2019

RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information.
Secur. Commun. Networks, 2019

Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans.
IEEE Internet Things J., 2019

MDC-Checker: A novel network risk assessment framework for multiple domain configurations.
Comput. Secur., 2019

A Comprehensive FPGA Reverse Engineering Tool-Chain: From Bitstream to RTL Code.
IEEE Access, 2019

A New Smart Router-Throttling Method to Mitigate DDoS Attacks.
IEEE Access, 2019

A Benchmark Suite of Hardware Trojans for On-Chip Networks.
IEEE Access, 2019

How to Make Attention Mechanisms More Practical in Malware Classification.
IEEE Access, 2019

Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
A New Parallel CODEC Technique for CDMA NoCs.
IEEE Trans. Ind. Electron., 2018

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Frontiers Inf. Technol. Electron. Eng., 2018

社交网络用户认知域特征预测研究综述 (Survey on Cognitive Domain Feature Prediction of Social Network Users).
计算机科学, 2018

Efficient flush-reload cache attack on scalar multiplication based signature algorithm.
Sci. China Inf. Sci., 2018

Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2018

Deep learning-based personality recognition from text posts of online social networks.
Appl. Intell., 2018

Feature-Based Transfer Learning Based on Distribution Similarity.
IEEE Access, 2018

Improved Differential Fault Analysis on LED with Constraint Equations: Towards Reaching Its Limit.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Optimized Lightweight Hardware Trojan-Based Fault Attack on DES.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

A General Personality Prediction Framework Based on Facebook Profiles.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

2017
Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2017

Transistor level SCA-resistant scheme based on fluctuating power logic.
Sci. China Inf. Sci., 2017

Personality Recognition on Social Media With Label Distribution Learning.
IEEE Access, 2017

An Improved k-NN Classification with Dynamic k.
Proceedings of the 9th International Conference on Machine Learning and Computing, 2017

pbSE: Phase-Based Symbolic Execution.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016

2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013
Efficient Hamming weight-based side-channel cube attacks on PRESENT.
J. Syst. Softw., 2013

Enhanced Side-Channel Cube Attacks on PRESENT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables.
IEICE Trans. Commun., 2013

Random Walks on Stochastic and Deterministic Small-World Networks.
IEICE Trans. Inf. Syst., 2013

An Approximate Flow Betweenness Centrality Measure for Complex Network.
IEICE Trans. Inf. Syst., 2013

Image Retrieval Based on Structured Local Binary Kirsch Pattern.
IEICE Trans. Inf. Syst., 2013

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Modelling security message propagation in delay tolerant networks.
Secur. Commun. Networks, 2012

A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus.
J. Networks, 2012

A Tree-Structured Deterministic Small-World Network.
IEICE Trans. Inf. Syst., 2012

Algebraic Differential Fault Attacks on LED using a Single Fault Injection.
IACR Cryptol. ePrint Arch., 2012

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Study on the modeling and analyzing of the role-based threats in the cyberspace.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis.
IEICE Trans. Inf. Syst., 2011

Improved Side Channel Cube Attacks on PRESENT.
IACR Cryptol. ePrint Arch., 2011

Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher.
IACR Cryptol. ePrint Arch., 2011

2010
A method for topology conformance tests under logical constraints.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Extracting Invariable Features Using Geometry Projection Based Histogram Model for 3D Object Description.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Speaker Transformation Using Length-Variable Moving Window Based GMM.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Variable Sliding Window DTW Speech Identification Algorithm.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Speech Synthesis Algorithm of Co-articulation Based on the Continuous Transition of Energy.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A Defending Mechanism against DDoS Based on Registration and Authentication.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...