Shaoyin Cheng

Orcid: 0000-0002-3992-9509

According to our database1, Shaoyin Cheng authored at least 32 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Binary Code Similarity Detection via Graph Contrastive Learning on Intermediate Representations.
CoRR, 2024

How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models.
CoRR, 2024

FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs.
CoRR, 2024

2023
Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

HexT5: Unified Pre-Training for Stripped Binary Code Information Inference.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

2022
An Asynchronous Entanglement Distribution Protocol for Quantum Networks.
IEEE Netw., 2022

2021
GDroid: Android malware detection and classification with graph convolutional network.
Comput. Secur., 2021

A lightweight framework for function name reassignment based on large-scale stripped binaries.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

2020
From Image to Code: Executable Adversarial Examples of Android Applications.
Proceedings of the ICCAI '20: 2020 6th International Conference on Computing and Artificial Intelligence, 2020

2019
Behavior Recognition Based on RBAC-Ensemble Model.
Proceedings of the 11th International Conference on Knowledge and Smart Technology, 2019

Image steganography using texture features and GANs.
Proceedings of the International Joint Conference on Neural Networks, 2019

Detecting and Resolving Flow Entries Collisions in Software Defined Networks.
Proceedings of the CSAI 2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence, 2019

2018
A Novel Android Malware Detection Approach Using Operand Sequences.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

PU Learning in Payload-based Web Anomaly Detection.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

2017
An Ensemble Model for Diabetes Diagnosis in Large-scale and Imbalanced Dataset.
Proceedings of the Computing Frontiers Conference, 2017

FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Strengthen Software-Defined Network in Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

AALRSMF: An Adaptive Learning Rate Schedule for Matrix Factorization.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Find Referral Social Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

ADKAM: A-Diversity K-Anonymity Model via Microaggregation.
Proceedings of the Information Security Practice and Experience, 2015

An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Awareness and Control of Personal Data Based on the Cyber-I Privacy Model.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

2013
Effective Method for Promoting Viral Marketing in Microblog.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Static Detection of Dangerous Behaviors in Android Apps.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Novel user influence measurement based on user interaction in microblog.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An efficient SVM-based method for multi-class network traffic classification.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

2010
PDVDS: A Pattern-Driven Software Vulnerability Detection System.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2008
DBTG: Demand-Driven Backtracking Test Generation.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...