Folgen
Guixin Ye
Guixin Ye
Northwest University, Xi'an, China
Bestätigte E-Mail-Adresse bei nwu.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Combining graph-based learning with automated data collection for code vulnerability detection
H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ...
IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020
1802020
Yet another text captcha solver: A generative adversarial network based approach
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, Z Wang
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1552018
Cracking android pattern lock in five attempts
G Ye, Z Tang, D Fang, X Chen, KI Kim, B Taylor, Z Wang
Proceedings of the 2017 Network and Distributed System Security Symposium …, 2017
1352017
Automated conformance testing for javascript engines via deep compiler fuzzing
G Ye, Z Tang, SH Tan, S Huang, D Fang, X Sun, L Bian, H Wang, Z Wang
Proceedings of the 42nd ACM SIGPLAN international conference on programming …, 2021
552021
A video-based attack for android pattern lock
G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018
542018
Deep program structure modeling through multi-relational graph-based learning
G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang
Proceedings of the ACM International conference on parallel architectures …, 2020
342020
Using generative adversarial networks to break and protect text captchas
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, J Han, Z Wang
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-29, 2020
202020
Exploiting dynamic scheduling for VM-based code obfuscation
K Kuang, Z Tang, X Gong, D Fang, X Chen, T Xing, G Ye, J Zhang, ...
2016 IEEE Trustcom/BigDataSE/ISPA, 489-496, 2016
172016
Compile-time code virtualization for android applications
Y Zhao, Z Tang, G Ye, D Peng, D Fang, X Chen, Z Wang
Computers & Security 94, 101821, 2020
122020
Exploiting binary-level code virtualization to protect Android applications against app repackaging
Z He, G Ye, L Yuan, Z Tang, X Wang, J Ren, W Wang, J Yang, D Fang, ...
IEEE Access 7, 115062-115074, 2019
112019
Semantics-aware obfuscation scheme prediction for binary
Y Zhao, Z Tang, G Ye, D Peng, D Fang, X Chen, Z Wang
Computers & Security 99, 102072, 2020
92020
Exploiting code diversity to enhance code virtualization protection
C Xue, Z Tang, G Ye, G Li, X Gong, W Wang, D Fang, Z Wang
2018 IEEE 24th International Conference on Parallel and Distributed Systems …, 2018
92018
VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern
Z Tang, M Li, G Ye, S Cao, M Chen, X Gong, D Fang, Z Wang
Applied Sciences 8 (5), 771, 2018
92018
BugPre: an intelligent software version-to-version bug prediction system using graph convolutional neural networks
Z Wang, W Tong, P Li, G Ye, H Chen, X Gong, Z Tang
Complex & Intelligent Systems 9 (4), 3835-3855, 2023
82023
Leveraging WebAssembly for Numerical JavaScript Code Virtualization
S Wang, G Ye, M Li, L Yuan, Z Tang, H Wang, W Wang, F Wang, J Ren, ...
IEEE Access 7, 182711-182724, 2019
72019
Detecting code vulnerabilities by learning from large-scale open source repositories
R Xu, Z Tang, G Ye, H Wang, X Ke, D Fang, Z Wang
Journal of Information Security and Applications 69, 103293, 2022
52022
Invalidating analysis knowledge for code virtualization protection through partition diversity
W Wang, M Li, Z Tang, H Wang, G Ye, F Wang, J Ren, X Gong, D Fang, ...
IEEE Access 7, 169160-169173, 2019
52019
Input-output example-guided data deobfuscation on binary
Y Zhao, Z Tang, G Ye, X Gong, D Fang
Security and Communication Networks 2021, 1-16, 2021
42021
Exploiting serialized fine-grained action recognition using wifi sensing
W Tong, R Li, X Gong, S Zhai, X Zheng, G Ye
Mobile Information Systems 2021, 1-17, 2021
32021
Yet another text captcha solver
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, Z Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
32018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20