Zhanyong Tang
Orcid: 0000-0002-4333-2334
According to our database1,
Zhanyong Tang
authored at least 79 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Neurocomputing, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the IEEE International Conference on Cluster Computing, 2023
2022
Detecting code vulnerabilities by learning from large-scale open source repositories.
J. Inf. Secur. Appl., 2022
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program.
J. Inf. Secur. Appl., 2022
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022
2021
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection.
IEEE Trans. Inf. Forensics Secur., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Neurocomputing, 2021
Comput. Networks, 2021
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
2020
ACM Trans. Priv. Secur., 2020
Multim. Tools Appl., 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the PACT '20: International Conference on Parallel Architectures and Compilation Techniques, 2020
2019
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network.
ACM Trans. Sens. Networks, 2019
Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Multi-cores.
CoRR, 2019
Comput. Secur., 2019
IEEE Access, 2019
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity.
IEEE Access, 2019
IEEE Access, 2019
Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging.
IEEE Access, 2019
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery.
Sensors, 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling.
Comput. Secur., 2018
Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018
Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas.
IEEE/ACM Trans. Netw., 2017
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes.
Mob. Inf. Syst., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Int. J. High Perform. Comput. Netw., 2017
Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments.
Wirel. Networks, 2016
Wirel. Networks, 2016
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality.
Mob. Inf. Syst., 2016
Artistic information extraction from Chinese calligraphy works via Shear-Guided filter.
J. Vis. Commun. Image Represent., 2016
SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
2015
NDSL: Node Density-Based Subregional Localization in Large Scale Anisotropy Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015
Proceedings of the 3rd International Workshop on Energy Harvesting & Energy Neutral Sensing Systems, 2015
LIPS: Bring LIght Propagation Selection to Geographic Opportunistic Routing in Strip WSNs.
Proceedings of the Second Workshop on Mobile Sensing, Computing and Communication, 2015
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015
2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Proceedings of the Human Centered Computing - First International Conference, 2014
2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009