Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Ren C. Luo
Dan Graur
Kavya Gupta
Aaron David Price
Barbara Aquilani
Roland Zumkeller
Maximilian Dürr
Liangliang Shang
Chen Ma
Home
/
Author
/
ZHANYONG TANG
Author Info
Open Visualization
Name
Affiliation
Papers
ZHANYONG TANG
School of Information Science and Technology,Northwest University,Xi’an,China
34
Collaborators
Citations
PageRank
105
55
12.76
Referers
Referees
References
248
971
357
Search Limit
100
971
Publications (34 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program
0
0.34
2022
Detecting code vulnerabilities by learning from large-scale open source repositories
0
0.34
2022
Towards Practical 3d Ultrasound Sensing On Commercial-Off-The-Shelf Mobile Devices
0
0.34
2021
Combining Graph-Based Learning With Automated Data Collection For Code Vulnerability Detection
0
0.34
2021
Improving human action recognition by jointly exploiting video and WiFi clues
1
0.35
2021
Multi Modal Human Action Recognition For Video Content Matching
0
0.34
2020
Using Generative Adversarial Networks to Break and Protect Text Captchas
0
0.34
2020
Semantics-Aware Obfuscation Scheme Prediction For Binary
0
0.34
2020
Compile-time Code Virtualization for Android Applications
0
0.34
2020
WisDriver:A WiFi and Smartphone Sensing System for Safely Driving
0
0.34
2019
Find me a safe zone: A countermeasure for channel state information based attacks.
2
0.37
2019
Invalidating Analysis Knowledge For Code Virtualization Protection Through Partition Diversity
0
0.34
2019
Exploiting Binary-level Code Virtualization to Protect Android Applications Against App Repackaging
0
0.34
2019
Leveraging Webassembly For Numerical Javascript Code Virtualization
0
0.34
2019
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network.
0
0.34
2019
Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery.
0
0.34
2018
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
1
0.36
2018
CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.
16
0.51
2018
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.
10
0.86
2018
A Video-based Attack for Android Pattern Lock.
3
0.36
2018
AppIS: Protect Android Apps Against Runtime Repackaging Attacks
1
0.35
2017
Protect Sensitive Information against Channel State Information Based Attacks
1
0.35
2017
Exploit Dynamic Data Flows To Protect Software Against Semantic Attacks
0
0.34
2017
Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization
0
0.34
2017
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
5
0.43
2017
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
8
0.57
2016
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments.
2
0.39
2016
DE 2: localization based on the rotating RSS using a single beacon.
1
0.35
2016
FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort
3
0.40
2015
Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger
1
0.35
2015
Multi-link Passive Localization with Low Cost in Wireless Sensor Networks
0
0.34
2015
Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks
0
0.34
2015
RPC: A Localization Method Based on Regional Partition and Cooperation
0
0.34
2014
Who Move the Treasures: A RFID-based Approach for the Treasures
0
0.34
2014
1