Items where Author is "Fang, Dingyi"

Group by: Item Type | No Grouping
Number of items: 23.

He, Zhongkai and Ye, Guixin and Yuan, Lu and Tang, Zhanyong and Wang, Xiaofeng and Ren, Jie and Wang, Wei and Yang, Jianfeng and Fang, Dingyi and Wang, Zheng (2019) Exploiting Binary-level Code Virtualization to Protect Android Applications Against App Repackaging. IEEE Access, 7. 115062 - 115074. ISSN 2169-3536

Zhang, Jie and Tang, Zhanyong and Li, Meng and Fang, Dingyi and Chen, Xiaojiang and Wang, Zheng (2019) Find Me A Safe Zone : A Countermeasure for Channel State Information Based Attacks. Computers and Security, 80. pp. 273-290. ISSN 0167-4048

Xue, Chao and Tang, Zhanyong and Ye, Guixin and Li, Guanghui and Gong, Xiaoqing and Wang, Wei and Fang, Dingyi and Wang, Zheng (2018) Exploiting Code Diversity to Enhance Code Virtualization Protection. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) :. IEEE, pp. 620-627. ISBN 9781538673089

Zhang, Jie and Tang, Zhanyong and Li, Meng and Fang, Dingyi and Nurmi, Petteri Tapio and Wang, Zheng (2018) CrossSense : towards cross-site and large-scale WiFi sensing. In: The 24th ACM International Conference on Mobile Computing and Networking (MobiCom) :. ACM, IND, pp. 305-320. ISBN 9781450359030

Ye, Guixin and Tang, Zhanyong and Fang, Dingyi and Zhu, Zhanxing and Feng, Yansong and Xu, Pengfei and Chen, Xiaojiang and Wang, Zheng (2018) Yet Another Text Captcha Solver : A Generative Adversarial Network Based Approach. In: 25th ACM Conference on Computer and Communications Security (CCS) :. ACM, New York, pp. 332-348. ISBN 9781450356930

Chang, Liqiong and Lu, Jiaqi and Wang, Ju and Chen, Xiaojiang and Fang, Dingyi and Tang, Zhanyong and Nurmi, Petteri Tapio and Wang, Zheng (2018) SleepGuard : capturing rich sleep information using smartwatch sensing data. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2 (3): 98. ISSN 2474-9567

Chang, Liqiong and Lu, Jiaqi and Wang, Ju and Chen, Xiaojiang and Fang, Dingyi and Tang, Zhanyong and Nurmi, Petteri Tapio and Wang, Zheng (2018) SleepGuard : capturing rich sleep information using smartwatch sensing data. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) : ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp). ACM. (In Press)

Xu, Pengfei and Wang, Lei and Guan, Ziyu and Zheng, Xia and Chen, Xiaojiang and Tang, Zhanyong and Fang, Dingyi and Gong, Xiaoqing and Wang, Zheng (2018) Evaluating Brush Movements for Chinese Calligraphy : A Computer Vision Based Approach. In: 27th International Joint Conference on Artificial Intelligence, IJCAI 2018, 2018-07-13 - 2018-07-19.

Ye, Guixin and Tang, Zhanyong and Fang, Dingyi and Chen, Xiaojiang and Wolff, Willy and Aviv, Adam and Wang, Zheng (2018) A Video-based Attack for Android Pattern Lock. ACM Transactions on Privacy and Security, 21 (4): 19.

Tang, Zhanyong and Li, Meng and Cao, Shuai and Chen, Meiling and Ye, Guixin and Gong, Xiaoqing and Fang, Dingyi and Wang, Zheng (2018) VMGuards : A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern. Applied Sciences, 8 (5): 771. ISSN 2076-3417

Kuang, Kaiyuan and Tang, Zhanyong and Gong, Xiaoqing and Fang, Dingyi and Chen, Xiaojiang and Wang, Zheng (2018) Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. Computers and Security, 74. pp. 202-220. ISSN 0167-4048

Zhang, Jie and Tang, Zhanyong and Li, Meng and Chen, Xiaojiang and Fang, Dingyi and Wang, Zheng (2018) Defeat Your Enemy Hiding Behind Public WiFi : WiGuard Can Protect Your Sensitive information from CSI-based Attack. Applied Sciences, 8 (4): 515. ISSN 2076-3417

Chang, Liqiong and Li, Xinyi and Wang, Ju and Meng, Haining and Chen, Xiaojiang and Fang, Dingyi and Tang, Zhanyong and Wang, Zheng (2018) Towards Large-Scale RFID Positioning : A Low-cost, High-precision Solution Based on Compressive Sensing. In: 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom) :. IEEE. ISBN 9781538632246

Zhai, Shuangjiao and Tang, Zhanyong and Wang, Dajin and Li, Qingpei and Li, Zhanglei and Chen, Xiaojiang and Fang, Dingyi and Chen, Feng and Wang, Zheng (2018) Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery. Sensors, 18 (7): 2075. ISSN 1424-8220

Song, Lina and Tang, Zhanyong and Li, Zhen and Gong, Xiaoqing and Chen, Xiaojiang and Fang, Dingyi and Wang, Zheng (2017) AppIS : Protect Android Apps Against Runtime Repackaging Attacks. In: 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) :. 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) . IEEE, pp. 25-32. ISBN 9781538621295

Zhao, Beibei and Tang, Zhanyong and Li, Zhen and Song, Lina and Gong, Xiaoqing and Fang, Dingyi and Liu, Fangyuan and Wang, Zheng (2017) DexPro : A Bytecode Level Code Protection System for Android Applications. In: Cyberspace Safety and Security :. Lecture Notes in Computer Science . Springer, Cham, pp. 367-382. ISBN 9783319694702

Tang, Zhanyong and Wang, Lei and Kuang, Kaiyuan and Xue, Chao and Gong, Xiaoqing and Chen, Xiaojiang and Fang, Dingyi and Wang, Zheng (2017) SEEAD : A Semantic-based Approach for Automatic Binary Code De-obfuscation. In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17) :. IEEE, pp. 261-268. ISBN 9781509049073

Zhang, Jie and Tang, Zhanyong and Chen, Xiaojiang and Fang, Dingyi and Li, Rong and Wang, Zheng (2017) Protect sensitive information against channel state information based attacks. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC) :. IEEE, CHN. ISBN 9781538632208

Kuang, Kaiyuan and Tang, Zhanyong and Gong, Xiaoqing and Fang, Dingyi and Chen, Xiaojiang and Zhang, Heng and Wang, Zheng (2017) Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks. In: 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) :. IEEE. ISBN 9781538604359

Ye, Guixin and Tang, Zhanyong and Fang, Dingyi and Chen, Xiaojiang and Kim, Kwang In and Taylor, Ben and Wang, Zheng (2017) Cracking Android pattern lock in five attempts. In: Proceedings 2017 Network and Distributed System Security Symposium 2017 (NDSS'17) :. Internet Society, Reston VA, 0-0. ISBN 1891562460

Tang, Zhanyong and Zhao, Yujie and Yang, Lei and Qi, Shengde and Fang, Dingyi and Chen, Xiaojiang and Gong, Xiaoqing and Wang, Zheng (2017) Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. Mobile Information Systems, 2017: 1248578. ISSN 1574-017X

Kuang, Kaiyuan and Tang, Zhanyong and Gong, Xiaoqing and Fang, Dingyi and Chen, Xiaojiang and Xing, Tianzhang and Ye, Guixin and Zhang, Jie and Wang, Zheng (2016) Exploiting dynamic scheduling for VM-based code obfuscation. In: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) :. 2016 IEEE Trustcom/BigDataSE/I​SPA . IEEE, CHN, pp. 489-496. ISBN 9781509032068

Tang, Zhanyong and Zhao, Yujie and Yang, Lei and Qi, Shengde and Fang, Dingyi and Chen, Xiaojiang and Gong, Xiaoqing and Wang, Zheng (2016) DRET : a system for detecting evil-twin attacks in smart homes. In: Smart X 2016, 2016-07-29 - 2016-07-31.

This list was generated on Thu Apr 24 19:01:25 2025 UTC.