Shize Guo
Orcid: 0009-0007-9678-6632
According to our database1,
Shize Guo
authored at least 78 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Computers, September, 2024
Intrusion Detection for Encrypted Flows Using Single Feature Based on Graph Integration Theory.
IEEE Internet Things J., May, 2024
IEEE Trans. Sustain. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Integr., 2024
GraphMoCo: A graph momentum contrast model for large-scale binary function representation learning.
Neurocomputing, 2024
2023
Towards robust CNN-based malware classifiers using adversarial examples generated based on two saliency similarities.
Neural Comput. Appl., August, 2023
AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation.
Comput. Secur., April, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection.
PeerJ Comput. Sci., 2023
GraphMoco: a Graph Momentum Contrast Model that Using Multimodel Structure Information for Large-scale Binary Function Representation Learning.
CoRR, 2023
Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 32nd IEEE Asian Test Symposium, 2023
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.
World Wide Web, 2022
A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient.
Secur. Commun. Networks, 2022
A unified semantic description and user's permissions knowledge reasoning for multiple domain cyberspace based on knowledge graph.
J. Intell. Fuzzy Syst., 2022
Instance Attack: An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware Detection.
CoRR, 2022
Fun2Vec: a Contrastive Learning Framework of Function-level Representation for Binary.
CoRR, 2022
A DNS Tunnel Sliding Window Differential Detection Method Based on Normal Distribution Reasonable Range Filtering.
CoRR, 2022
2021
IEEE Trans. Emerg. Top. Comput., 2021
2020
Secur. Commun. Networks, 2020
CoRR, 2020
2019
IEEE Trans. Ind. Informatics, 2019
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
IEEE Internet Things J., 2019
MDC-Checker: A novel network risk assessment framework for multiple domain configurations.
Comput. Secur., 2019
IEEE Access, 2019
IEEE Access, 2019
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Frontiers Inf. Technol. Electron. Eng., 2018
社交网络用户认知域特征预测研究综述 (Survey on Cognitive Domain Feature Prediction of Social Network Users).
计算机科学, 2018
Efficient flush-reload cache attack on scalar multiplication based signature algorithm.
Sci. China Inf. Sci., 2018
Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2018
Deep learning-based personality recognition from text posts of online social networks.
Appl. Intell., 2018
Improved Differential Fault Analysis on LED with Constraint Equations: Towards Reaching Its Limit.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
IEEE Access, 2017
Proceedings of the 9th International Conference on Machine Learning and Computing, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016
2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
2013
J. Syst. Softw., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables.
IEICE Trans. Commun., 2013
IEICE Trans. Inf. Syst., 2013
IEICE Trans. Inf. Syst., 2013
IEICE Trans. Inf. Syst., 2013
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
Secur. Commun. Networks, 2012
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus.
J. Networks, 2012
IACR Cryptol. ePrint Arch., 2012
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2011
Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis.
IEICE Trans. Inf. Syst., 2011
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher.
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
Extracting Invariable Features Using Geometry Projection Based Histogram Model for 3D Object Description.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009
Speech Synthesis Algorithm of Co-articulation Based on the Continuous Transition of Energy.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008