Zhanyong Tang

Orcid: 0000-0002-4333-2334

According to our database1, Zhanyong Tang authored at least 76 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Toward Wide-Area Contactless Wireless Sensing.
IEEE/ACM Trans. Netw., April, 2023

A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Optimizing HPC I/O Performance with Regression Analysis and Ensemble Learning.
Proceedings of the IEEE International Conference on Cluster Computing, 2023

2022
Detecting code vulnerabilities by learning from large-scale open source repositories.
J. Inf. Secur. Appl., 2022

GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program.
J. Inf. Secur. Appl., 2022

Automating reinforcement learning architecture design for code optimization.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022

2021
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2021

CrossGR: Accurate and Low-cost Cross-target Gesture Recognition Using Wi-Fi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Improving human action recognition by jointly exploiting video and WiFi clues.
Neurocomputing, 2021

Towards practical 3D ultrasound sensing on commercial-off-the-shelf mobile devices.
Comput. Networks, 2021

Automated conformance testing for JavaScript engines via deep compiler fuzzing.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

RISE: robust wireless sensing using probabilistic and statistical assessments.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

2020
Using Generative Adversarial Networks to Break and Protect Text Captchas.
ACM Trans. Priv. Secur., 2020

Multi modal human action recognition for video content matching.
Multim. Tools Appl., 2020

Smart, Adaptive Energy Optimization for Mobile Web Interactions.
CoRR, 2020

Semantics-aware obfuscation scheme prediction for binary.
Comput. Secur., 2020

Compile-time code virtualization for android applications.
Comput. Secur., 2020

Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Deep Program Structure Modeling Through Multi-Relational Graph-based Learning.
Proceedings of the PACT '20: International Conference on Parallel Architectures and Compilation Techniques, 2020

2019
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network.
ACM Trans. Sens. Networks, 2019

Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Multi-cores.
CoRR, 2019

Find me a safe zone: A countermeasure for channel state information based attacks.
Comput. Secur., 2019

Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Systems.
IEEE Access, 2019

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity.
IEEE Access, 2019

Leveraging WebAssembly for Numerical JavaScript Code Virtualization.
IEEE Access, 2019

Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging.
IEEE Access, 2019

Tagtag: material sensing with commodity RFID.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Towards wide-area contactless human sensing: poster abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

WideSee: towards wide-area contactless wireless sensing.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

WisDriver: A WiFi and Smartphone Sensing System for Safely Driving.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

WiMi: Target Material Identification with Commodity Wi-Fi Devices.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
A Video-based Attack for Android Pattern Lock.
ACM Trans. Priv. Secur., 2018

Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery.
Sensors, 2018

SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Comput. Secur., 2018

Maximizing throughput for low duty-cycled sensor networks.
Comput. Networks, 2018

Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploiting Code Diversity to Enhance Code Virtualization Protection.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas.
IEEE/ACM Trans. Netw., 2017

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
Mob. Inf. Syst., 2017

RF-Copybook: A Millimeter Level Calligraphy Copybook based on commodity RFID.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Thwarting Android app repackaging by executable code fragmentation.
Int. J. High Perform. Comput. Netw., 2017

Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Exploit dynamic data flows to protect software against semantic attacks.
Proceedings of the 2017 IEEE SmartWorld, 2017

SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Cracking Android Pattern Lock in Five Attempts.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

AppIS: Protect Android Apps Against Runtime Repackaging Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

DexPro: A Bytecode Level Code Protection System for Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Protect Sensitive Information against Channel State Information Based Attacks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments.
Wirel. Networks, 2016

DE 2: localization based on the rotating RSS using a single beacon.
Wirel. Networks, 2016

Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
Mob. Inf. Syst., 2016

Artistic information extraction from Chinese calligraphy works via Shear-Guided filter.
J. Vis. Commun. Image Represent., 2016

SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Poster: A Device-free Evaluation System for Gymnastics using Passive RFID Tags.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
NDSL: Node Density-Based Subregional Localization in Large Scale Anisotropy Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Multi-link Passive Localization with Low Cost in Wireless Sensor Networks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Low-cost Device-Free Localization using Detection Probability Model in Outdoors.
Proceedings of the 3rd International Workshop on Energy Harvesting & Energy Neutral Sensing Systems, 2015

LIPS: Bring LIght Propagation Selection to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Poster: On the Low-Cost and Distance-Adaptive Device-free Localization.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

TaLc: Time Adaptive Indoor Localization with Little Cost.
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015

2014
RPC: A Localization Method Based on Regional Partition and Cooperation.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Who Move the Treasures: A RFID-based Approach for the Treasures.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

A Novel Method for Protritage Site with WSN.
Proceedings of the Human Centered Computing - First International Conference, 2014

2013
Method to Evaluate Software Protection Based on Attack Modeling.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
A tamper-proof software watermark using code encryption.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2009
W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...