Combining graph-based learning with automated data collection for code vulnerability detection H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ... IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020 | 266 | 2020 |
Yet another text captcha solver: A generative adversarial network based approach G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, Z Wang Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 172 | 2018 |
Cracking android pattern lock in five attempts G Ye, Z Tang, D Fang, X Chen, KI Kim, B Taylor, Z Wang Proceedings of the 2017 Network and Distributed System Security Symposium …, 2017 | 146 | 2017 |
Automated conformance testing for JavaScript engines via deep compiler fuzzing G Ye, Z Tang, SH Tan, S Huang, D Fang, X Sun, L Bian, H Wang, Z Wang Proceedings of the 42nd ACM SIGPLAN international conference on programming …, 2021 | 74 | 2021 |
A video-based attack for android pattern lock G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018 | 60 | 2018 |
Deep program structure modeling through multi-relational graph-based learning G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang Proceedings of the ACM International conference on parallel architectures …, 2020 | 36 | 2020 |
Using generative adversarial networks to break and protect text captchas G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, J Han, Z Wang ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-29, 2020 | 28 | 2020 |
Exploiting dynamic scheduling for VM-based code obfuscation K Kuang, Z Tang, X Gong, D Fang, X Chen, T Xing, G Ye, J Zhang, ... 2016 IEEE Trustcom/BigDataSE/ISPA, 489-496, 2016 | 18 | 2016 |
Compile-time code virtualization for android applications Y Zhao, Z Tang, G Ye, D Peng, D Fang, X Chen, Z Wang Computers & Security 94, 101821, 2020 | 16 | 2020 |
BugPre: an intelligent software version-to-version bug prediction system using graph convolutional neural networks Z Wang, W Tong, P Li, G Ye, H Chen, X Gong, Z Tang Complex & Intelligent Systems 9 (4), 3835-3855, 2023 | 14 | 2023 |
Semantics-aware obfuscation scheme prediction for binary Y Zhao, Z Tang, G Ye, D Peng, D Fang, X Chen, Z Wang Computers & Security 99, 102072, 2020 | 13 | 2020 |
Exploiting binary-level code virtualization to protect Android applications against app repackaging Z He, G Ye, L Yuan, Z Tang, X Wang, J Ren, W Wang, J Yang, D Fang, ... IEEE Access 7, 115062-115074, 2019 | 13 | 2019 |
Exploiting code diversity to enhance code virtualization protection C Xue, Z Tang, G Ye, G Li, X Gong, W Wang, D Fang, Z Wang 2018 IEEE 24th International Conference on Parallel and Distributed Systems …, 2018 | 11 | 2018 |
VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern Z Tang, M Li, G Ye, S Cao, M Chen, X Gong, D Fang, Z Wang Applied Sciences 8 (5), 771, 2018 | 11 | 2018 |
Anonymous, secure, traceable, and efficient decentralized digital forensics M Li, Y Shen, G Ye, J He, X Zheng, Z Zhang, L Zhu, M Conti IEEE Transactions on Knowledge and Data Engineering, 2023 | 9 | 2023 |
Detecting code vulnerabilities by learning from large-scale open source repositories R Xu, Z Tang, G Ye, H Wang, X Ke, D Fang, Z Wang Journal of Information Security and Applications 69, 103293, 2022 | 8 | 2022 |
Input‐Output Example‐Guided Data Deobfuscation on Binary Y Zhao, Z Tang, G Ye, X Gong, D Fang Security and Communication Networks 2021 (1), 4646048, 2021 | 8 | 2021 |
Leveraging WebAssembly for numerical JavaScript code virtualization S Wang, G Ye, M Li, L Yuan, Z Tang, H Wang, W Wang, F Wang, J Ren, ... IEEE Access 7, 182711-182724, 2019 | 8 | 2019 |
Invalidating analysis knowledge for code virtualization protection through partition diversity W Wang, M Li, Z Tang, H Wang, G Ye, F Wang, J Ren, X Gong, D Fang, ... IEEE Access 7, 169160-169173, 2019 | 7 | 2019 |
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing G Ye, T Hu, Z Tang, Z Fan, SH Tan, B Zhang, W Qian, Z Wang Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 6 | 2023 |