Guojun Peng

Orcid: 0000-0001-5731-8958

According to our database1, Guojun Peng authored at least 34 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A survey on the evolution of fileless attacks and detection techniques.
Comput. Secur., February, 2024

E<sup>2</sup>CFD: Towards Effective and Efficient Cost Function Design for Safe Reinforcement Learning via Large Language Model.
CoRR, 2024

LLaMoCo: Instruction Tuning of Large Language Models for Optimization Code Generation.
CoRR, 2024

2023
Indoor Semantic Location Privacy Protection With Safe Reinforcement Learning.
IEEE Trans. Cogn. Commun. Netw., October, 2023

Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing.
IEEE Trans. Inf. Forensics Secur., 2023

PointerScope: Understanding Pointer Patching for Code Randomization.
IEEE Trans. Dependable Secur. Comput., 2023

MetaBox: A Benchmark Platform for Meta-Black-Box Optimization with Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Ship Path Optimization That Accounts for Geographical Traffic Characteristics to Increase Maritime Port Safety.
IEEE Trans. Intell. Transp. Syst., 2022

Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022

Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning.
Appl. Soft Comput., 2022

2021
A Direction-Constrained Space-Time Prism-Based Approach for Quantifying Possible Multi-Ship Collision Risks.
IEEE Trans. Intell. Transp. Syst., 2021

Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT.
IEEE Internet Things J., 2021

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.
Proceedings of the 30th USENIX Security Symposium, 2021

App's Auto-Login Function Security Testing via Android OS-Level Virtualization.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Detection of Repackaged Android Malware with Code-Heterogeneity Features.
IEEE Trans. Dependable Secur. Comput., 2020

Android Data-Clone Attack via Operating System Customization.
IEEE Access, 2020

VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

JTaint: Finding Privacy-Leakage in Chrome Extensions.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Automatic Identification System-Based Approach for Assessing the Near-Miss Collision Risk Dynamics of Ships in Ports.
IEEE Trans. Intell. Transp. Syst., 2019

Web Scanner Detection Based on Behavioral Differences.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

2018
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation.
IEEE Trans. Inf. Forensics Secur., 2018

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2015
Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
Computation of universal unfolding of the double zero bifurcation in the Z<sub>2</sub>-symmetric system.
Int. J. Comput. Math., 2014

2009
Bifurcations of a Holling-Type II predator-prey System with Constant Rate Harvesting.
Int. J. Bifurc. Chaos, 2009

2008
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Research on Navigation-Aids Information System.
Proceedings of the International Conference on Cyberworlds 2008, 2008

Research on 3D Simulation Technology Applied in Navigation-Aid Management.
Proceedings of the International Conference on Cyberworlds 2008, 2008

Further Research of RFID Applying on Exhibition Logistics.
Proceedings of the International Conference on Cyberworlds 2008, 2008

2006
Research on Sea Digital Map used for Ship Navigation.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

Geometry Compression Using Spherical Wavelet.
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006

2005
Research on WEBGIS real-time distribution system of port navigation-supporting information.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Research on Sea Digital Map based on WEBGIS.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...