Zhanyong Tang

According to our database1, Zhanyong Tang authored at least 51 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network.
TOSN, 2019

Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Multi-cores.
CoRR, 2019

Find me a safe zone: A countermeasure for channel state information based attacks.
Computers & Security, 2019

Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging.
IEEE Access, 2019

2018
A Video-based Attack for Android Pattern Lock.
ACM Trans. Priv. Secur., 2018

Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery.
Sensors, 2018

SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data.
IMWUT, 2018

Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Computers & Security, 2018

Maximizing throughput for low duty-cycled sensor networks.
Computer Networks, 2018

Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Exploiting Code Diversity to Enhance Code Virtualization Protection.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas.
IEEE/ACM Trans. Netw., 2017

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
Mobile Information Systems, 2017

RF-Copybook: A Millimeter Level Calligraphy Copybook based on commodity RFID.
IMWUT, 2017

Thwarting Android app repackaging by executable code fragmentation.
IJHPCN, 2017

Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2017

Exploit dynamic data flows to protect software against semantic attacks.
Proceedings of the 2017 IEEE SmartWorld, 2017

SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Cracking Android Pattern Lock in Five Attempts.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

AppIS: Protect Android Apps Against Runtime Repackaging Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

DexPro: A Bytecode Level Code Protection System for Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Protect Sensitive Information against Channel State Information Based Attacks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments.
Wireless Networks, 2016

DE 2: localization based on the rotating RSS using a single beacon.
Wireless Networks, 2016

Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
Mobile Information Systems, 2016

Artistic information extraction from Chinese calligraphy works via Shear-Guided filter.
J. Visual Communication and Image Representation, 2016

SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Poster: A Device-free Evaluation System for Gymnastics using Passive RFID Tags.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
NDSL: Node Density-Based Subregional Localization in Large Scale Anisotropy Wireless Sensor Networks.
IJDSN, 2015

CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks.
IJDSN, 2015

FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort.
Computer Communication Review, 2015

Multi-link Passive Localization with Low Cost in Wireless Sensor Networks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Low-cost Device-Free Localization using Detection Probability Model in Outdoors.
Proceedings of the 3rd International Workshop on Energy Harvesting & Energy Neutral Sensing Systems, 2015

LIPS: Bring LIght Propagation Selection to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015

Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Poster: On the Low-Cost and Distance-Adaptive Device-free Localization.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

TaLc: Time Adaptive Indoor Localization with Little Cost.
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015

2014
RPC: A Localization Method Based on Regional Partition and Cooperation.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Who Move the Treasures: A RFID-based Approach for the Treasures.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

A Novel Method for Protritage Site with WSN.
Proceedings of the Human Centered Computing - First International Conference, 2014

2013
Method to Evaluate Software Protection Based on Attack Modeling.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
A tamper-proof software watermark using code encryption.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2009
W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...