2024
Auto-tuning for HPC storage stack: an optimization perspective.
CCF Trans. High Perform. Comput., December, 2024
Advanced intelligent monitoring technologies for animals: A survey.
Neurocomputing, 2024
Accelerating Private Large Transformers Inference through Fine-grained Collaborative Computation.
CoRR, 2024
UPBEAT: Test Input Checks of Q# Quantum Libraries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
History-driven Compiler Fuzzing via Assembling and Scheduling Bug-triggering Code Segments.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Toward Wide-Area Contactless Wireless Sensing.
IEEE/ACM Trans. Netw., April, 2023
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Optimizing HPC I/O Performance with Regression Analysis and Ensemble Learning.
Proceedings of the IEEE International Conference on Cluster Computing, 2023
2022
Detecting code vulnerabilities by learning from large-scale open source repositories.
J. Inf. Secur. Appl., 2022
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program.
J. Inf. Secur. Appl., 2022
Automating reinforcement learning architecture design for code optimization.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022
2021
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2021
CrossGR: Accurate and Low-cost Cross-target Gesture Recognition Using Wi-Fi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Improving human action recognition by jointly exploiting video and WiFi clues.
Neurocomputing, 2021
Towards practical 3D ultrasound sensing on commercial-off-the-shelf mobile devices.
Comput. Networks, 2021
Automated conformance testing for JavaScript engines via deep compiler fuzzing.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021
RISE: robust wireless sensing using probabilistic and statistical assessments.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
2020
Using Generative Adversarial Networks to Break and Protect Text Captchas.
ACM Trans. Priv. Secur., 2020
Multi modal human action recognition for video content matching.
Multim. Tools Appl., 2020
Smart, Adaptive Energy Optimization for Mobile Web Interactions.
CoRR, 2020
Semantics-aware obfuscation scheme prediction for binary.
Comput. Secur., 2020
Compile-time code virtualization for android applications.
Comput. Secur., 2020
Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Deep Program Structure Modeling Through Multi-Relational Graph-based Learning.
Proceedings of the PACT '20: International Conference on Parallel Architectures and Compilation Techniques, 2020
2019
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network.
ACM Trans. Sens. Networks, 2019
Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Multi-cores.
CoRR, 2019
Find me a safe zone: A countermeasure for channel state information based attacks.
Comput. Secur., 2019
Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Systems.
IEEE Access, 2019
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity.
IEEE Access, 2019
Leveraging WebAssembly for Numerical JavaScript Code Virtualization.
,
,
,
,
,
,
,
,
,
,
IEEE Access, 2019
Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging.
IEEE Access, 2019
Tagtag: material sensing with commodity RFID.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019
Towards wide-area contactless human sensing: poster abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019
WideSee: towards wide-area contactless wireless sensing.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019
WisDriver: A WiFi and Smartphone Sensing System for Safely Driving.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019
WiMi: Target Material Identification with Commodity Wi-Fi Devices.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
A Video-based Attack for Android Pattern Lock.
ACM Trans. Priv. Secur., 2018
Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery.
Sensors, 2018
SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Comput. Secur., 2018
Maximizing throughput for low duty-cycled sensor networks.
Comput. Networks, 2018
Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018
CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Exploiting Code Diversity to Enhance Code Virtualization Protection.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas.
IEEE/ACM Trans. Netw., 2017
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
Mob. Inf. Syst., 2017
RF-Copybook: A Millimeter Level Calligraphy Copybook based on commodity RFID.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Thwarting Android app repackaging by executable code fragmentation.
Int. J. High Perform. Comput. Netw., 2017
Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017
Exploit dynamic data flows to protect software against semantic attacks.
Proceedings of the 2017 IEEE SmartWorld, 2017
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Cracking Android Pattern Lock in Five Attempts.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
AppIS: Protect Android Apps Against Runtime Repackaging Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
DexPro: A Bytecode Level Code Protection System for Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Protect Sensitive Information against Channel State Information Based Attacks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments.
Wirel. Networks, 2016
DE 2: localization based on the rotating RSS using a single beacon.
Wirel. Networks, 2016
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
Mob. Inf. Syst., 2016
Artistic information extraction from Chinese calligraphy works via Shear-Guided filter.
J. Vis. Commun. Image Represent., 2016
SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Poster: A Device-free Evaluation System for Gymnastics using Passive RFID Tags.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
2015
NDSL: Node Density-Based Subregional Localization in Large Scale Anisotropy Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Multi-link Passive Localization with Low Cost in Wireless Sensor Networks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015
Low-cost Device-Free Localization using Detection Probability Model in Outdoors.
Proceedings of the 3rd International Workshop on Energy Harvesting & Energy Neutral Sensing Systems, 2015
LIPS: Bring LIght Propagation Selection to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015
Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Poster: On the Low-Cost and Distance-Adaptive Device-free Localization.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
TaLc: Time Adaptive Indoor Localization with Little Cost.
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015
2014
RPC: A Localization Method Based on Regional Partition and Cooperation.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Who Move the Treasures: A RFID-based Approach for the Treasures.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
A Novel Method for Protritage Site with WSN.
Proceedings of the Human Centered Computing - First International Conference, 2014
2013
Method to Evaluate Software Protection Based on Attack Modeling.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2011
A tamper-proof software watermark using code encryption.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
2009
W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009