Name
Affiliation
Papers
ZHANYONG TANG
School of Information Science and Technology,Northwest University,Xi’an,China
34
Collaborators
Citations 
PageRank 
105
55
12.76
Referers 
Referees 
References 
248
971
357
Search Limit
100971
Title
Citations
PageRank
Year
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program00.342022
Detecting code vulnerabilities by learning from large-scale open source repositories00.342022
Towards Practical 3d Ultrasound Sensing On Commercial-Off-The-Shelf Mobile Devices00.342021
Combining Graph-Based Learning With Automated Data Collection For Code Vulnerability Detection00.342021
Improving human action recognition by jointly exploiting video and WiFi clues10.352021
Multi Modal Human Action Recognition For Video Content Matching00.342020
Using Generative Adversarial Networks to Break and Protect Text Captchas00.342020
Semantics-Aware Obfuscation Scheme Prediction For Binary00.342020
Compile-time Code Virtualization for Android Applications00.342020
WisDriver:A WiFi and Smartphone Sensing System for Safely Driving00.342019
Find me a safe zone: A countermeasure for channel state information based attacks.20.372019
Invalidating Analysis Knowledge For Code Virtualization Protection Through Partition Diversity00.342019
Exploiting Binary-level Code Virtualization to Protect Android Applications Against App Repackaging00.342019
Leveraging Webassembly For Numerical Javascript Code Virtualization00.342019
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network.00.342019
Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery.00.342018
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.10.362018
CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.160.512018
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.100.862018
A Video-based Attack for Android Pattern Lock.30.362018
AppIS: Protect Android Apps Against Runtime Repackaging Attacks10.352017
Protect Sensitive Information against Channel State Information Based Attacks10.352017
Exploit Dynamic Data Flows To Protect Software Against Semantic Attacks00.342017
Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization00.342017
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.50.432017
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.80.572016
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments.20.392016
DE 2: localization based on the rotating RSS using a single beacon.10.352016
FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort30.402015
Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger10.352015
Multi-link Passive Localization with Low Cost in Wireless Sensor Networks00.342015
Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks00.342015
RPC: A Localization Method Based on Regional Partition and Cooperation00.342014
Who Move the Treasures: A RFID-based Approach for the Treasures00.342014