Search

Your search keyword '"Dingyi Fang"' showing total 76 results

Search Constraints

Start Over You searched for: Author "Dingyi Fang" Remove constraint Author: "Dingyi Fang" Topic computer Remove constraint Topic: computer
76 results on '"Dingyi Fang"'

Search Results

1. RF-Identity

2. Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection

3. Coverage-Oriented Task Assignment for Mobile Crowdsensing

4. Plant Keeper

5. Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing

6. Deep Program Structure Modeling Through Multi-Relational Graph-based Learning

7. Automatic Identification of Individual Primates with Deep Learning Techniques

8. Leveraging WebAssembly for Numerical JavaScript Code Virtualization

9. Using Generative Adversarial Networks to Break and Protect Text Captchas

10. Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

11. Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity

12. Exploiting Binary-level Code Virtualization to Protect Android Applications Against App Repackaging

13. RSS Distribution-Based Passive Localization and Its Application in Sensor Networks

14. Semantics-aware obfuscation scheme prediction for binary

15. Compile-time code virtualization for android applications

16. Find Me A Safe Zone:A Countermeasure for Channel State Information Based Attacks

17. Time Context-Aware IPTV Program Recommendation Based on Tensor Learning

18. Exploiting Code Diversity to Enhance Code Virtualization Protection

19. DeepAid: A Mobile Cognitive Aid System with Compacted Deep Learning

20. Defeat Your Enemy Hiding Behind Public WiFi:WiGuard Can Protect Your Sensitive information from CSI-based Attack

21. Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing

22. DE 2: localization based on the rotating RSS using a single beacon

23. Transferring Compressive-Sensing-Based Device-Free Localization Across Target Diversity

24. AppIS: Protect Android Apps Against Runtime Repackaging Attacks

25. Target Material Identification with Commodity RFID Devices

26. Demo

27. TagScan

28. SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation

29. Exploit dynamic data flows to protect software against semantic attacks

30. Protect Sensitive Information against Channel State Information Based Attacks

31. iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization

32. iGuard: A real-time anti-theft system for smartphones

34. DexPro: A Bytecode Level Code Protection System for Android Applications

35. Cracking Android Pattern Lock in Five Attempts

36. Node Immunization with Time-Sensitive Restrictions

37. The Research and Discussion on Effectiveness Evaluation of Software Protection

38. LiFS

39. A novel CSI pre-processing scheme for device-free localization indoors

40. Artistic information extraction from Chinese calligraphy works via Shear-Guided filter

41. Exploiting Dynamic Scheduling for VM-Based Code Obfuscation

42. DEDV: A Data Collection Method for Mobile Sink Based on Dynamic Estimation of Data Value in WSN

43. Poster

44. FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas

46. VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern

47. A Data Cleaning Method and Its Application for Earthen Site Data Monitored by WSN

48. Low-cost Device-Free Localization using Detection Probability Model in Outdoors

49. TaLc

50. Accurate Device-Free Localization with Little Human Cost

Catalog

Books, media, physical & digital resources