Follow
Zhanyong Tang
Zhanyong Tang
Northwest University, Xi'an, China
Verified email at nwu.edu.cn
Title
Cited by
Cited by
Year
Combining graph-based learning with automated data collection for code vulnerability detection
H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ...
IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020
2652020
CrossSense: towards cross-site and large-scale WiFi sensing
J Zhang, Z Tang, M Li, D Fang, PT Nurmi, Z Wang
The 24th ACM International Conference on Mobile Computing and Networking …, 2018
2382018
Yet another text captcha solver: A generative adversarial network based approach
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, Z Wang
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1722018
Cracking android pattern lock in five attempts
G Ye, Z Tang, D Fang, X Chen, KI Kim, B Taylor, Z Wang
Proceedings of the 2017 Network and Distributed System Security Symposium …, 2017
1462017
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas
L Chang, X Chen, Y Wang, D Fang, J Wang, T Xing, Z Tang
IEEE/ACM Transactions on Networking 25 (4), 1994-2007, 2017
932017
Tagtag: Material sensing with commodity RFID
B Xie, J Xiong, X Chen, E Chai, L Li, Z Tang, D Fang
Proceedings of the 17th conference on embedded networked sensor systems, 338-350, 2019
922019
WideSee: Towards wide-area contactless wireless sensing
L Chen, J Xiong, X Chen, SI Lee, K Chen, D Han, D Fang, Z Tang, ...
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 258-270, 2019
842019
Automated conformance testing for JavaScript engines via deep compiler fuzzing
G Ye, Z Tang, SH Tan, S Huang, D Fang, X Sun, L Bian, H Wang, Z Wang
Proceedings of the 42nd ACM SIGPLAN international conference on programming …, 2021
752021
SleepGuard: Capturing rich sleep information using smartwatch sensing data
L Chang, J Lu, J Wang, X Chen, D Fang, Z Tang, P Nurmi, Z Wang
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
722018
A video-based attack for android pattern lock
G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018
602018
WiMi: Target material identification with commodity Wi-Fi devices
C Feng, J Xiong, L Chang, J Wang, X Chen, D Fang, Z Tang
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
582019
Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes
Z Tang, Y Zhao, L Yang, S Qi, D Fang, X Chen, X Gong, Z Wang
Mobile Information Systems 2017 (1), 1248578, 2017
542017
Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality
J Zhang, X Zheng, Z Tang, T Xing, X Chen, D Fang, R Li, X Gong, F Chen
Mobile Information Systems 2016 (1), 8793025, 2016
492016
SmartMTra: Robust indoor trajectory tracing using smartphones
P Zhang, X Chen, X Ma, Y Wu, H Jiang, D Fang, Z Tang, Y Ma
IEEE Sensors Journal 17 (12), 3613-3624, 2017
462017
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
K Kuang, Z Tang, X Gong, D Fang, X Chen, Z Wang
Computers & Security 74, 202-220, 2018
382018
Deep program structure modeling through multi-relational graph-based learning
G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang
Proceedings of the ACM International conference on parallel architectures …, 2020
362020
CrossGR: Accurate and low-cost cross-target gesture recognition using Wi-Fi
X Li, L Chang, F Song, J Wang, X Chen, Z Tang, Z Wang
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2021
342021
Using generative adversarial networks to break and protect text captchas
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, J Han, Z Wang
ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-29, 2020
282020
Appis: Protect android apps against runtime repackaging attacks
L Song, Z Tang, Z Li, X Gong, X Chen, D Fang, Z Wang
2017 IEEE 23rd International Conference on Parallel and Distributed Systems …, 2017
262017
Evaluation of code obfuscating transformation
赵玉洁, 汤战勇, 王妮, 房鼎益, 顾元祥
Journal of Software 23 (3), 700-711, 2012
232012
The system can't perform the operation now. Try again later.
Articles 1–20