default search action
Shaoyin Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Guoqiang Chen, Xiuwei Shang, Shaoyin Cheng, Yanming Zhang, Weiming Zhang, Nenghai Yu:
FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs. CoRR abs/2403.18403 (2024) - [i2]Xiuwei Shang, Shaoyin Cheng, Guoqiang Chen, Yanming Zhang, Li Hu, Xiao Yu, Gangyang Li, Weiming Zhang, Nenghai Yu:
How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models. CoRR abs/2404.09836 (2024) - [i1]Xiuwei Shang, Li Hu, Shaoyin Cheng, Guoqiang Chen, BenLong Wu, Weiming Zhang, Nenghai Yu:
Binary Code Similarity Detection via Graph Contrastive Learning on Intermediate Representations. CoRR abs/2410.18561 (2024) - 2023
- [c27]Jiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng, Weiming Zhang:
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference. ASE 2023: 774-786 - [c26]Guoqiang Chen, Han Gao, Jie Zhang, Yanru He, Shaoyin Cheng, Weiming Zhang:
Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation. PST 2023: 1-11 - 2022
- [j2]Zhaoying Wang, Jian Li, Kaiping Xue, Shaoyin Cheng, Nenghai Yu, Qibin Sun, Jun Lu:
An Asynchronous Entanglement Distribution Protocol for Quantum Networks. IEEE Netw. 36(5): 40-47 (2022) - 2021
- [j1]Han Gao, Shaoyin Cheng, Weiming Zhang:
GDroid: Android malware detection and classification with graph convolutional network. Comput. Secur. 106: 102264 (2021) - [c25]Han Gao, Shaoyin Cheng, Yinxing Xue, Weiming Zhang:
A lightweight framework for function name reassignment based on large-scale stripped binaries. ISSTA 2021: 607-619 - 2020
- [c24]Shangyu Gu, Shaoyin Cheng, Weiming Zhang:
From Image to Code: Executable Adversarial Examples of Android Applications. ICCAI 2020: 261-268
2010 – 2019
- 2019
- [c23]Guangyu Zhang, Shaoyin Cheng, Xiang Song, Fan Jiang:
Detecting and Resolving Flow Entries Collisions in Software Defined Networks. CSAI 2019: 245-251 - [c22]Jinjing Huang, Shaoyin Cheng, Songhao Lou, Fan Jiang:
Image steganography using texture features and GANs. IJCNN 2019: 1-8 - [c21]Chong Liu, Shaoyin Cheng, Yuxuan Luo, Fan Jiang:
Behavior Recognition Based on RBAC-Ensemble Model. KST 2019: 29-34 - 2018
- [c20]Yuxuan Luo, Shaoyin Cheng, Chong Liu, Fan Jiang:
PU Learning in Payload-based Web Anomaly Detection. SSIC 2018: 1-5 - [c19]Peng Zhang, Shaoyin Cheng, Songhao Lou, Fan Jiang:
A Novel Android Malware Detection Approach Using Operand Sequences. SSIC 2018: 1-5 - 2017
- [c18]Fan Jiang, Cen Zhang, Shaoyin Cheng:
FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability. ACISP (2) 2017: 61-79 - [c17]Xun Wei, Fan Jiang, Feng Wei, Jiekui Zhang, Weiwei Liao, Shaoyin Cheng:
An Ensemble Model for Diabetes Diagnosis in Large-scale and Imbalanced Dataset. Conf. Computing Frontiers 2017: 71-78 - 2016
- [c16]Feng Wei, Hao Guo, Shaoyin Cheng, Fan Jiang:
AALRSMF: An Adaptive Learning Rate Schedule for Matrix Factorization. APWeb (2) 2016: 410-413 - [c15]Guoyou Sun, Shaoyin Cheng, Fan Jiang:
Strengthen Software-Defined Network in Cloud. HPCC/SmartCity/DSS 2016: 385-392 - 2015
- [c14]Xin Ye, Feng Wei, Fan Jiang, Shaoyin Cheng:
An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets. CIT/IUCC/DASC/PICom 2015: 226-235 - [c13]Liang Cheng, Shaoyin Cheng, Fan Jiang:
ADKAM: A-Diversity K-Anonymity Model via Microaggregation. ISPEC 2015: 533-547 - [c12]Hao Guo, Feng Wei, Shaoyin Cheng, Fan Jiang:
Find Referral Social Networks. SocialSec 2015: 58-63 - 2014
- [c11]Li Tang, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, He Li, Shaoyin Cheng:
Awareness and Control of Personal Data Based on the Cyber-I Privacy Model. UIC/ATC/ScalCom 2014: 456-463 - 2013
- [c10]Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang:
Novel user influence measurement based on user interaction in microblog. ASONAM 2013: 615-619 - [c9]Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang:
Static Detection of Dangerous Behaviors in Android Apps. CSS 2013: 363-376 - [c8]Hui Ye, Shaoyin Cheng, Lanbo Zhang, Fan Jiang:
DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag. MoMM 2013: 68 - [c7]Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang:
Effective Method for Promoting Viral Marketing in Microblog. SocialCom 2013: 665-670 - 2012
- [c6]Guangyu Yin, Fan Jiang, Shaoyin Cheng, Xiang Li, Xing He:
AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks. CGC 2012: 360-367 - [c5]Wenlong Chen, Shaoyin Cheng, Xing He, Fan Jiang:
InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog. CGC 2012: 563-570 - 2011
- [c4]Ning Jing, Ming Yang, Shaoyin Cheng, Qunfeng Dong, Hui Xiong:
An efficient SVM-based method for multi-class network traffic classification. IPCCC 2011: 1-8 - [c3]Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang:
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code. TrustCom 2011: 150-159 - 2010
- [c2]Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang:
PDVDS: A Pattern-Driven Software Vulnerability Detection System. EUC 2010: 536-541
2000 – 2009
- 2008
- [c1]Shaoyin Cheng, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing:
DBTG: Demand-Driven Backtracking Test Generation. ICYCS 2008: 1944-1950
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint