Items where Author is "Ye, Guixin"

Group by: Item Type | No Grouping
Number of items: 7.

Journal Article

He, Zhongkai and Ye, Guixin and Yuan, Lu and Tang, Zhanyong and Wang, Xiaofeng and Ren, Jie and Wang, Wei and Yang, Jianfeng and Fang, Dingyi and Wang, Zheng (2019) Exploiting Binary-level Code Virtualization to Protect Android Applications Against App Repackaging. IEEE Access, 7. 115062 - 115074. ISSN 2169-3536

Ye, Guixin and Tang, Zhanyong and Fang, Dingyi and Chen, Xiaojiang and Wolff, Willy and Aviv, Adam and Wang, Zheng (2018) A Video-based Attack for Android Pattern Lock. ACM Transactions on Privacy and Security, 21 (4): 19.

Tang, Zhanyong and Li, Meng and Cao, Shuai and Chen, Meiling and Ye, Guixin and Gong, Xiaoqing and Fang, Dingyi and Wang, Zheng (2018) VMGuards : A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern. Applied Sciences, 8 (5): 771. ISSN 2076-3417

Contribution in Book/Report/Proceedings

Xue, Chao and Tang, Zhanyong and Ye, Guixin and Li, Guanghui and Gong, Xiaoqing and Wang, Wei and Fang, Dingyi and Wang, Zheng (2018) Exploiting Code Diversity to Enhance Code Virtualization Protection. In: 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) :. IEEE, pp. 620-627. ISBN 9781538673089

Ye, Guixin and Tang, Zhanyong and Fang, Dingyi and Zhu, Zhanxing and Feng, Yansong and Xu, Pengfei and Chen, Xiaojiang and Wang, Zheng (2018) Yet Another Text Captcha Solver : A Generative Adversarial Network Based Approach. In: 25th ACM Conference on Computer and Communications Security (CCS) :. ACM, New York, pp. 332-348. ISBN 9781450356930

Ye, Guixin and Tang, Zhanyong and Fang, Dingyi and Chen, Xiaojiang and Kim, Kwang In and Taylor, Ben and Wang, Zheng (2017) Cracking Android pattern lock in five attempts. In: Proceedings 2017 Network and Distributed System Security Symposium 2017 (NDSS'17) :. Internet Society, Reston VA, 0-0. ISBN 1891562460

Kuang, Kaiyuan and Tang, Zhanyong and Gong, Xiaoqing and Fang, Dingyi and Chen, Xiaojiang and Xing, Tianzhang and Ye, Guixin and Zhang, Jie and Wang, Zheng (2016) Exploiting dynamic scheduling for VM-based code obfuscation. In: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) :. 2016 IEEE Trustcom/BigDataSE/I​SPA . IEEE, CHN, pp. 489-496. ISBN 9781509032068

This list was generated on Fri Apr 25 00:49:21 2025 UTC.