Gang Shi

Orcid: 0009-0006-7152-9210

According to our database1, Gang Shi authored at least 147 papers between 1999 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
LightUAV-YOLO: a lightweight object detection model for unmanned aerial vehicle image.
J. Supercomput., January, 2025

2024
A gate-tunable memristor emulator for motion detection.
Int. J. Circuit Theory Appl., May, 2024

Sparsity-Assisted Variational Nonlinear Component Decomposition.
IEEE Trans. Ind. Informatics, March, 2024

An Embedded DC Power Flow Controller Based on Full-Bridge Modular Multilevel Converter.
IEEE Trans. Ind. Electron., March, 2024

The α-path of multi-dimensional uncertain differential equations and its applications.
J. Intell. Fuzzy Syst., February, 2024

UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2024

A Novel Multiple-Medium-AC-Port Power Electronic Transformer.
IEEE Trans. Ind. Electron., 2024

Delta-Type Serial Shunt Soft Normally-Open Points With Wide Power Flow Regulation Range in Distributed Network.
IEEE Trans. Ind. Electron., 2024

DIAFNet: A Dynamic Interactive Adaptive Fusion Network Based on Enhanced Differential Features.
IEEE Geosci. Remote. Sens. Lett., 2024

Top in Chinese Data Processing: English Code Models.
CoRR, 2024

SCFI: Efficient forward fine-grained control flow integrity based on coarse-grained ISA extensions.
Comput. Secur., 2024

Vulnerability Localization Based On Intermediate Code Representation and Feature Fusion.
Comput. J., 2024

CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection.
Comput. J., 2024

Prospector: Boosting Directed Greybox Fuzzing for Large-Scale Target Sets with Iterative Prioritization.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Sleuth: A Switchable Dual-Mode Fuzzer to Investigate Bug Impacts Following a Single PoC.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Code Property Graph based Cross-Domain Vulnerability Detection via Deep Fused Feature.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2024

CPMSVD: Cross-Project Multiclass Software Vulnerability Detection Via Fused Deep Feature and Domain Adaptation.
Proceedings of the IEEE International Conference on Acoustics, 2024

SSFuzz: Generating syntactic and semantic seeds for RISC-V processors.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

Research on Methodology of Intelligent Traffic Accident Detection based on Enhanced YOLOv8 Algorithm.
Proceedings of the 2024 International Conference on Generative Artificial Intelligence and Information Security, 2024

Scheduled Execution-Based Binary Indirect Call Targets Refinement.
Proceedings of the Computer Security - ESORICS 2024, 2024

ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Implementing Fuzz-Based Technology for Detecting Spectre-Style Vulnerabilities.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Anti-Aliasing and Anti-Color-Artifact Demosaicing for High-Resolution CMOS Image Sensor.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Series-Shunt Multiport Soft Normally Open Points.
IEEE Trans. Ind. Electron., November, 2023

A Spatio-Temporal Video Denoising Co-Processor With Adaptive Codec.
IEEE Trans. Circuits Syst. I Regul. Pap., November, 2023

A Modular Multilevel Converter Station With Multiple MVac Ports.
IEEE Trans. Ind. Electron., September, 2023

KPDFI: Efficient data flow integrity based on key property against data corruption attack.
Comput. Secur., May, 2023

Detection and Recognition Algorithm of Arbitrary-Oriented Oil Replenishment Target in Remote Sensing Image.
Sensors, January, 2023

Adaptive Time-Frequency-Supported Chirp Component Decomposition.
IEEE Trans. Instrum. Meas., 2023

Control of a Hybrid Modular Solid-State Transformer for Uninterrupted Power Supply Under MVdc Short-Circuit Fault.
IEEE Trans. Ind. Electron., 2023

A Multiport DC Power Flow Controller Embedded in Modular Multilevel DC Transformer.
IEEE Trans. Ind. Electron., 2023

A 400-V Half Bridge Gate Driver for Normally-Off GaN HEMTs With Effective Dv/Dt Control and High Dv/Dt Immunity.
IEEE Trans. Ind. Electron., 2023

A Model for Infrastructure Detection along Highways Based on Remote Sensing Images from UAVs.
Sensors, 2023

Modified Passivity-Based Control for LCL-Filtered Grid-Tied Inverter with Output Admittance Reshaping.
J. Control. Sci. Eng., 2023

DAHT-Net: Deformable Attention-Guided Hierarchical Transformer Network Based on Remote Sensing Image Change Detection.
IEEE Access, 2023

Correct and Crisp Edge Detection Approach Based on Dense Network.
IEEE Access, 2023

Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Multiport Embedded DC Power Flow Controller with Fault Current Limiting Capability.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

A Novel High-Voltage Thyristor-Based Unipolar to Bipolar DC Power Grid Interface Converter.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

Capacity Allocation of Multifunctional Electrichydrogen Hybrid Energy Storage for Flexible Interconnected Distribution Grids.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

Topology Comparison for Power Flow Controller in AC Grid.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

Current Harmonic Compensation Strategy for Series-Shunt Multiport Soft Normally Open Points.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Identify Vulnerability Types: A Cross-Project Multiclass Vulnerability Classification System Based on Deep Domain Adaptation.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Code Property Graph based Vulnerability Type Identification with Fusion Representation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain Adaptation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

DPFCFI: A Hardware-Based Forward Control-Flow Integrity for Architecture and Microarchitecture.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

A Dynamic Codec with Adaptive Quantization for Convolution Neural Network.
Proceedings of the 15th IEEE International Conference on ASIC, 2023

2022
A Multiport Embedded DC Power Flow Controller for Meshed DC Distribution Grids.
IEEE Trans. Ind. Electron., 2022

CLHF-Net: A Channel-Level Hierarchical Feature Fusion Network for Remote Sensing Image Change Detection.
Symmetry, 2022

M-YOLO: Traffic Sign Detection Algorithm Applicable to Complex Scenarios.
Symmetry, 2022

Lightweight Hot-Spot Fault Detection Model of Photovoltaic Panels in UAV Remote-Sensing Image.
Sensors, 2022

CGR-Block: Correlated Feature Extractor and Geometric Feature Fusion for Point Cloud Analysis.
Sensors, 2022

MAFF-Net: Multi-Attention Guided Feature Fusion Network for Change Detection in Remote Sensing Images.
Sensors, 2022

Lane Departure Assessment via Enhanced Single Lane-Marking.
Sensors, 2022

3D Object Detection Based on Attention and Multi-Scale Feature Fusion.
Sensors, 2022

A Novel Approach for UAV Image Crack Detection.
Sensors, 2022

R-YOLO: A YOLO-Based Method for Arbitrary-Oriented Target Detection in High-Resolution Remote Sensing Images.
Sensors, 2022

EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application.
Secur. Commun. Networks, 2022

A multiplicative maximin-based evaluation approach for evolutionary many-objective optimization.
Appl. Soft Comput., 2022

Separable Self-Attention Mechanism for Point Cloud Local and Global Feature Modeling.
IEEE Access, 2022

BERT-Based Vulnerability Type Identification with Effective Program Representation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection.
Proceedings of the IEEE International Conference on Trust, 2022

Binary-level Directed Symbolic Execution Through Pattern Learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

An Effective Buffer Overflow Detection With Super Data-Flow Graphs.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

An Efficient Metric-Based Approach for Static Use-After-Free Detection.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

MVDetecter: Vulnerability Primitive-based General Memory Vulnerability Detection.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Automated Vulnerable Codes Mutation through Deep Learning for Variability Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

Inductive Vulnerability Detection via Gated Graph Neural Network.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Gadgets Splicing: Dynamic Binary Transformation for Precise Rewriting.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2022

PointerChecker: Tag-Based and Hardware-Assisted Memory Safety against Memory Corruption.
Proceedings of the IEEE 31st Asian Test Symposium, 2022

GRIN: Make Rewriting More Precise.
Proceedings of the ASSE 2022: 3rd Asia Service Sciences and Software Engineering Conference, Macao, February 24, 2022

A Dynamic JPEG CODEC with Adaptive Quantization Table for Frame Storage Compression.
Proceedings of the IEEE Asia Pacific Conference on Circuit and Systems, 2022

2021
Delayed Renewal Process with Uncertain Random Inter-Arrival Times.
Symmetry, 2021

Sine Entropy of Uncertain Random Variables.
Symmetry, 2021

A VMD-EWT-LSTM-based multi-step prediction approach for shield tunneling machine cutterhead torque.
Knowl. Based Syst., 2021

An uncertain SEIR rumor model.
J. Intell. Fuzzy Syst., 2021

A Novel Maximin-Based Multi-Objective Evolutionary Algorithm Using One-by-One Update Scheme for Multi-Robot Scheduling Optimization.
IEEE Access, 2021

33.2 A 600V GaN Active Gate Driver with Dynamic Feedback Delay Compensation Technique Achieving 22.5% Turn-On Energy Saving.
Proceedings of the IEEE International Solid-State Circuits Conference, 2021

Accelerating Data-Flow Analysis with Full-Partitioning.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Finding Runtime Usable Gadgets: On the Security of Return Address Authentication.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Self-Attention based Automated Vulnerability Detection with Effective Data Representation.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021

Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection.
Proceedings of the 30th IEEE Asian Test Symposium, 2021

2020
Efficient Return Address Verification Based on Dislocated Stack.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

Stability in <i>p</i>-th moment of multi-dimensional uncertain differential equation.
J. Intell. Fuzzy Syst., 2020

An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Zipper Stack: Shadow Stacks Without Shadow.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Stability in uncertain distribution for backward uncertain differential equation.
J. Intell. Fuzzy Syst., 2019

A formally verified transformation to unify multiple nested clocks for a Lustre-like language.
Sci. China Inf. Sci., 2019

Stability in mean of multi-dimensional uncertain differential equation.
Appl. Math. Comput., 2019

Suppression of Reactive Power in Isolated Modular Multilevel DC-DC Converter Under Quasi Square-Wave Modulation.
IEEE Access, 2019

A Robust Adversarial Reinforcement Framework for Reading Comprehension.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

A Multi-channel Neural Network for Imbalanced Emotion Recognition.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Multi-perspective Denoising Reader for Multi-paragraph Reading Comprehension.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Euler Recurrent Neural Network: Tracking the Input Contribution to Prediction on Sequential Data.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

EmoMix: Building an Emotion Lexicon for Compound Emotion Analysis.
Proceedings of the Computational Science - ICCS 2019, 2019

Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
A stronger law of large numbers for uncertain random variables.
Soft Comput., 2018

An Improved Yaw Estimation Algorithm for Land Vehicles Using MARG Sensors.
Sensors, 2018

Stability in p-th moment for multifactor uncertain differential equation.
J. Intell. Fuzzy Syst., 2018

Mean-reverting stock model and pricing rules for Asian currency option.
J. Intell. Fuzzy Syst., 2018

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

TMDFI: Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software Exploitation.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

A Method of Personnel Location Based on Monocular Camera in Complex Terrain.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018

2017
Minimum spanning tree problem of uncertain random network.
J. Intell. Manuf., 2017

Valuation of stock loan under uncertain mean-reverting stock model.
J. Intell. Fuzzy Syst., 2017

Almost sure stability for multifactor uncertain differential equation.
J. Intell. Fuzzy Syst., 2017

The maximum flow problem of uncertain random network.
J. Ambient Intell. Humaniz. Comput., 2017

Entropy of Uncertain Random Variables wi h Application to Minimum Spanning Tree Problem.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2017

Gadget Weighted Tagging: A Flexible Framework to Protect Against Code Reuse Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

A formally verified sequentializer for lustre-like concurrent synchronous data-flow programs.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Secure Mobile Payment Employing Trusted Computing on TrustZone Enabled Platforms.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment.
Proceedings of the Security and Privacy in Communication Networks, 2016

TrustPAY: Trusted mobile payment on security enhanced ARM TrustZone platforms.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Multiple scattering effects on the localization of two point scatterers.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

TZ-KPM: Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
基于用户间动态信任关系的推荐算法研究 (Recommender Algorithm Based on Dynamical Trust Relationship between Users).
计算机科学, 2015

Classification of Hemodynamic Responses Associated With Force and Speed Imagery for a Brain-Computer Interface.
J. Medical Syst., 2015

Development of one-channel fNIRS system and physiological noise reduction in brain hemodynamic responses.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

Wide voltage range operation of isolated modular multilevel DC-DC converter.
Proceedings of the IECON 2015, 2015

Analysis and design of a MMC based wind power converter for offshore dc grids.
Proceedings of the IECON 2015, 2015

2013
Recognition of hemodynamic responses for mental arithmetic using support vector machine.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Generalized average model of DC wind turbine with consideration of electromechanical transients.
Proceedings of the IECON 2013, 2013

2012
Genome-wide meta-regression of gene-environment interaction.
Proceedings of the Proceedings 2012 IEEE International Workshop on Genomic Signal Processing and Statistics, 2012

2010
Adaptive threshold algorithm for multi-marker augmented reality system.
Proceedings of the 9th International Conference on Virtual Reality Continuum and its Applications in Industry, 2010

A safety related analog input module based on diagnosis and redundancy.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

2009
Evolutionary Design of Combinational Logic Circuits Using an Improved Gene Expression-Based Clonal Selection Algorithm.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Low-Crosstalk and Low-Dark-Current CMOS Image-Sensor Technology Using a Hole-Based Detector.
Proceedings of the 2008 IEEE International Solid-State Circuits Conference, 2008

Automatic Synthesis of Combinational Logic Circuit with Gene Expression-Based Clonal Selection Algorithm.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
A Relationship Between Time-Reversal Imaging and Maximum-Likelihood Scattering Estimation.
IEEE Trans. Signal Process., 2007

Cramér-Rao Bound Analysis on Multiple Scattering in Multistatic Point-Scatterer Estimation.
IEEE Trans. Signal Process., 2007

2006
Macrocell multiple-input multiple-output system analysis.
IEEE Trans. Wirel. Commun., 2006

Study and Simulation of Based-fuzzy-logic Parallel Hybrid Electric Vehicles Control Strategy.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

2005
Maximum likelihood estimation of point scatterers for computational time-reversal imaging.
Commun. Inf. Syst., 2005

2004
Macrocell multiple-input multiple-output system with local-to-mobile and local-to-base scatterers.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

A shared virtual memory network with fast remote direct memory access and message passing.
Proceedings of the 2004 IEEE International Conference on Cluster Computing (CLUSTER 2004), 2004

2001
Communication with Threads in Software DSM.
Proceedings of the 2001 IEEE International Conference on Cluster Computing (CLUSTER 2001), 2001

1999
Self-creating and adaptive learning of RBF networks: merging soft-competition clustering algorithm with network growth technique.
Proceedings of the International Joint Conference Neural Networks, 1999


  Loading...