Items where Author is "Gong, Xiaoqing"

Group by: Item Type | No Grouping
Number of items: 11.

Journal Article

Tang, Zhanyong and Li, Meng and Cao, Shuai and Chen, Meiling and Ye, Guixin and Gong, Xiaoqing and Fang, Dingyi and Wang, Zheng (2018) VMGuards : A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern. Applied Sciences, 8 (5): 771. ISSN 2076-3417

Kuang, Kaiyuan and Tang, Zhanyong and Gong, Xiaoqing and Fang, Dingyi and Chen, Xiaojiang and Wang, Zheng (2018) Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. Computers and Security, 74. pp. 202-220. ISSN 0167-4048

Tang, Zhanyong and Zhao, Yujie and Yang, Lei and Qi, Shengde and Fang, Dingyi and Chen, Xiaojiang and Gong, Xiaoqing and Wang, Zheng (2017) Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. Mobile Information Systems, 2017: 1248578. ISSN 1574-017X

Contribution in Book/Report/Proceedings

Xue, Chao and Tang, Zhanyong and Ye, Guixin and Li, Guanghui and Gong, Xiaoqing and Wang, Wei and Fang, Dingyi and Wang, Zheng (2018) Exploiting Code Diversity to Enhance Code Virtualization Protection. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) :. IEEE, pp. 620-627. ISBN 9781538673089

Song, Lina and Tang, Zhanyong and Li, Zhen and Gong, Xiaoqing and Chen, Xiaojiang and Fang, Dingyi and Wang, Zheng (2017) AppIS : Protect Android Apps Against Runtime Repackaging Attacks. In: 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) :. 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS) . IEEE, pp. 25-32. ISBN 9781538621295

Zhao, Beibei and Tang, Zhanyong and Li, Zhen and Song, Lina and Gong, Xiaoqing and Fang, Dingyi and Liu, Fangyuan and Wang, Zheng (2017) DexPro : A Bytecode Level Code Protection System for Android Applications. In: Cyberspace Safety and Security :. Lecture Notes in Computer Science . Springer, Cham, pp. 367-382. ISBN 9783319694702

Tang, Zhanyong and Wang, Lei and Kuang, Kaiyuan and Xue, Chao and Gong, Xiaoqing and Chen, Xiaojiang and Fang, Dingyi and Wang, Zheng (2017) SEEAD : A Semantic-based Approach for Automatic Binary Code De-obfuscation. In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17) :. IEEE, pp. 261-268. ISBN 9781509049073

Kuang, Kaiyuan and Tang, Zhanyong and Gong, Xiaoqing and Fang, Dingyi and Chen, Xiaojiang and Zhang, Heng and Wang, Zheng (2017) Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks. In: 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) :. IEEE. ISBN 9781538604359

Kuang, Kaiyuan and Tang, Zhanyong and Gong, Xiaoqing and Fang, Dingyi and Chen, Xiaojiang and Xing, Tianzhang and Ye, Guixin and Zhang, Jie and Wang, Zheng (2016) Exploiting dynamic scheduling for VM-based code obfuscation. In: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) :. 2016 IEEE Trustcom/BigDataSE/I​SPA . IEEE, CHN, pp. 489-496. ISBN 9781509032068

Contribution to Conference

Xu, Pengfei and Wang, Lei and Guan, Ziyu and Zheng, Xia and Chen, Xiaojiang and Tang, Zhanyong and Fang, Dingyi and Gong, Xiaoqing and Wang, Zheng (2018) Evaluating Brush Movements for Chinese Calligraphy : A Computer Vision Based Approach. In: 27th International Joint Conference on Artificial Intelligence, IJCAI 2018, 2018-07-13 - 2018-07-19.

Tang, Zhanyong and Zhao, Yujie and Yang, Lei and Qi, Shengde and Fang, Dingyi and Chen, Xiaojiang and Gong, Xiaoqing and Wang, Zheng (2016) DRET : a system for detecting evil-twin attacks in smart homes. In: Smart X 2016, 2016-07-29 - 2016-07-31.

This list was generated on Thu Apr 24 12:23:14 2025 UTC.