default search action
Shanqing Guo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Guiyun Qin, Limin Li, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j30]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting. IEEE Internet Things J. 11(1): 403-417 (2024) - [j29]Zhaoxing Han, Chengyu Hu, Tongyaqi Li, Qingqiang Qi, Peng Tang, Shanqing Guo:
Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning. Neural Networks 179: 106574 (2024) - [j28]Libo Chen, Yanhao Wang, Jiaqi Linghu, Qinsheng Hou, Quanpu Cai, Shanqing Guo, Zhi Xue:
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 2421-2433 (2024) - [j27]Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, Shanqing Guo:
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models. ACM Trans. Priv. Secur. 27(1): 10:1-10:34 (2024) - [c88]Yunruo Zhang, Lujia Shen, Shanqing Guo, Shouling Ji:
GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers. AAAI 2024: 21797-21805 - [c87]Liwei Wang, Xiaofeng Liu, Ting Lei, Wenna Song, Shanqing Guo, Pengcheng Ren:
Security Research for Android Remote Assistance Apps. ACISP (3) 2024: 256-276 - [c86]Zidong Zhang, Qinsheng Hou, Lingyun Ying, Wenrui Diao, Yacong Gu, Rui Li, Shanqing Guo, Haixin Duan:
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs. CCS 2024: 525-539 - [c85]Ge Han, Ahmed Salem, Zheng Li, Shanqing Guo, Michael Backes, Yang Zhang:
Detection and Attribution of Models Trained on Generated Data. ICASSP 2024: 4875-4879 - [c84]Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu, Wenrui Diao, Qingchuan Zhao, Shanqing Guo:
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. ICSE 2024: 41:1-41:13 - [c83]Ge Han, Zheng Li, Shanqing Guo:
PRJack: Pruning-Resistant Model Hijacking Attack Against Deep Learning Models. IJCNN 2024: 1-8 - [c82]Jianing Wang, Shanqing Guo, Wenrui Diao, Yue Liu, Haixin Duan, Yichen Liu, Zhenkai Liang:
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning. RAID 2024: 579-593 - [c81]Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao:
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. SP 2024: 74-90 - [c80]Zhen Zhao, Xiangpu Song, Qiuyu Zhong, Yingpei Zeng, Chengyu Hu, Shanqing Guo:
TLS-DeepDiffer: Message Tuples-Based Deep Differential Fuzzing for TLS Protocol Implementations. SANER 2024: 918-928 - [c79]Xiaoyin Liu, Wenzhi Li, Qinsheng Hou, Shishuai Yang, Lingyun Ying, Wenrui Diao, Yanan Li, Shanqing Guo, Haixin Duan:
From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps. WWW 2024: 1561-1572 - [i8]Yu Bi, Mingshuo Yang, Yong Fang, Xianghang Mi, Shanqing Guo, Shujun Tang, Haixin Duan:
An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks. CoRR abs/2404.09681 (2024) - [i7]Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo:
Jailbreaking Text-to-Image Models with LLM-Based Agents. CoRR abs/2408.00523 (2024) - 2023
- [j26]Tian-Zi Niu, Shan-Shan Dong, Zhen-Duo Chen, Xin Luo, Zi Huang, Shanqing Guo, Xin-Shun Xu:
A multi-layer memory sharing network for video captioning. Pattern Recognit. 136: 109202 (2023) - [j25]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security. IEEE Syst. J. 17(4): 5519-5530 (2023) - [j24]Peng Tang, Rui Chen, Sen Su, Shanqing Guo, Lei Ju, Gaoyuan Liu:
Multi-Party Sequential Data Publishing Under Differential Privacy. IEEE Trans. Knowl. Data Eng. 35(9): 9562-9577 (2023) - [j23]Qinsheng Hou, Wenrui Diao, Yanhao Wang, Chenglin Mao, Lingyun Ying, Song Liu, Xiaofeng Liu, Yuanzhi Li, Shanqing Guo, Meining Nie, Haixin Duan:
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem. IEEE Trans. Software Eng. 49(7): 3901-3921 (2023) - [c78]Gaoyuan Liu, Peng Tang, Chengyu Hu, Chongshi Jin, Shanqing Guo:
Multi-Dimensional Data Publishing With Local Differential Privacy. EDBT 2023: 183-194 - [c77]Yilan Zhu, Xinyao Wang, Lei Ju, Shanqing Guo:
FxHENN: FPGA-based acceleration framework for homomorphic encrypted CNN inference. HPCA 2023: 896-907 - [c76]Fengyan Lv, Cheng Liu, Xiaofeng Liu, Chengyu Hu, Zhihao Chen, Shanqing Guo:
ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications. ICC 2023: 5234-5239 - [c75]Tengxiao Yang, Song Lian, Qiong Jia, Chengyu Hu, Shanqing Guo:
Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks. ICONIP (15) 2023: 152-164 - [c74]Hao Li, Yanbo Wu, Ronghong Huang, Xianghang Mi, Chengyu Hu, Shanqing Guo:
Demystifying Decentralized Matrix Communication Network: Ecosystem and Security. ICPADS 2023: 260-267 - [c73]Hao Li, Xianghang Mi, Yanzhi Dou, Shanqing Guo:
An Empirical Study of Storj DCS: Ecosystem, Performance, and Security. IWQoS 2023: 1-10 - [c72]Kuiliang Lin, Xiangpu Song, Yingpei Zeng, Shanqing Guo:
DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential Fuzzing. QRS 2023: 616-627 - [c71]Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang:
Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems. USENIX Security Symposium 2023: 5503-5520 - [c70]Kailun Yan, Jilian Zhang, Xiangyu Liu, Wenrui Diao, Shanqing Guo:
Bad Apples: Understanding the Centralized Security Risks in Decentralized Ecosystems. WWW 2023: 2274-2283 - [i6]Yunruo Zhang, Tianyu Du, Shouling Ji, Peng Tang, Shanqing Guo:
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks. CoRR abs/2304.07980 (2023) - [i5]Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao:
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. CoRR abs/2312.08675 (2023) - 2022
- [j22]Yong-Gang Li, Yeh-Ching Chung, Yu Bao, Yi Lu, Shanqing Guo, Guoyuan Lin:
KPointer: Keep the code pointers on the stack point to the right code. Comput. Secur. 120: 102781 (2022) - [j21]Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, Ting Wang:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. IEEE Trans. Dependable Secur. Comput. 19(6): 3987-4001 (2022) - [j20]Zhen-Duo Chen, Xin Luo, Yongxin Wang, Shanqing Guo, Xin-Shun Xu:
Fine-Grained Hashing With Double Filtering. IEEE Trans. Image Process. 31: 1671-1683 (2022) - [j19]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. ACM Trans. Priv. Secur. 25(3): 17:1-17:31 (2022) - [j18]Rui Li, Wenrui Diao, Zhou Li, Shishuai Yang, Shuang Li, Shanqing Guo:
Android Custom Permissions Demystified: A Comprehensive Security Evaluation. IEEE Trans. Software Eng. 48(11): 4465-4484 (2022) - [c69]Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue:
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. CCS 2022: 485-498 - [c68]Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan:
An Extensive Study of Residential Proxies in China. CCS 2022: 3049-3062 - [c67]Mingqin Han, Yilan Zhu, Qian Lou, Zimeng Zhou, Shanqing Guo, Lei Ju:
coxHE: A software-hardware co-design framework for FPGA acceleration of homomorphic computation. DATE 2022: 1353-1358 - [c66]Ge Han, Zheng Li, Peng Tang, Chengyu Hu, Shanqing Guo:
FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks. HPCC/DSS/SmartCity/DependSys 2022: 1601-1608 - [c65]Limin Li, Guiyun Qin, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Secure and Efficient Cloud Ciphertext Deduplication Based on SGX. ICPADS 2022: 696-703 - [c64]Shishuai Yang, Rui Li, Jiongyi Chen, Wenrui Diao, Shanqing Guo:
Demystifying Android Non-SDK APls: Measurement and Understanding. ICSE 2022: 647-658 - [c63]Qinsheng Hou, Wenrui Diao, Yanhao Wang, Xiaofeng Liu, Song Liu, Lingyun Ying, Shanqing Guo, Yuanzhi Li, Meining Nie, Haixin Duan:
Large-scale Security Measurements on the Android Firmware Ecosystem. ICSE 2022: 1257-1268 - [c62]Peng Tang, Rui Chen, Chongshi Jin, Gaoyuan Liu, Shanqing Guo:
Marginal Release Under Multi-party Personalized Differential Privacy. ECML/PKDD (4) 2022: 555-571 - [c61]Jianqi Du, Fenghao Xu, Chennan Zhang, Zidong Zhang, Xiaoyin Liu, Pengcheng Ren, Wenrui Diao, Shanqing Guo, Kehuan Zhang:
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps. SECON 2022: 343-351 - [c60]Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang:
Label Inference Attacks Against Vertical Federated Learning. USENIX Security Symposium 2022: 1397-1414 - [c59]Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang:
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. USENIX Security Symposium 2022: 2673-2690 - [c58]Chennan Zhang, Shuang Li, Wenrui Diao, Shanqing Guo:
PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis. WISEC 2022: 20-25 - [i4]Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang:
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. CoRR abs/2202.10673 (2022) - [i3]Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan:
An Extensive Study of Residential Proxies in China. CoRR abs/2209.06056 (2022) - 2021
- [j17]Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mob. Networks Appl. 26(6): 2490-2500 (2021) - [c57]Peng Tang, Rui Chen, Sen Su, Shanqing Guo, Lei Ju, Gaoyuan Liu:
Differentially Private Publication of Multi-Party Sequential Data. ICDE 2021: 145-156 - [c56]Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen:
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. ICICS (1) 2021: 260-275 - [c55]Jin Zhang, Chennan Zhang, Xiangyu Liu, Yuncheng Wang, Wenrui Diao, Shanqing Guo:
ShadowDroid: Practical Black-box Attack against ML-based Android Malware Detection. ICPADS 2021: 629-636 - [c54]Rui Li, Wenrui Diao, Zhou Li, Jianqi Du, Shanqing Guo:
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings. SP 2021: 70-86 - [i2]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. CoRR abs/2103.10651 (2021) - 2020
- [j16]Chengyu Hu, Yuqin Xu, Pengtao Liu, Jia Yu, Shanqing Guo, Minghao Zhao:
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Inf. Sci. 520: 15-30 (2020) - [j15]Yingpei Zeng, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng, Qiuhua Wang:
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols. Sensors 20(18): 5194 (2020) - [j14]Yingpei Zeng, Shanqing Guo, Ting Wu, Qiuhua Zheng:
DSM: Delayed Signature Matching in Deep Packet Inspection. Symmetry 12(12): 2011 (2020) - [c53]Zicheng Zhang, Wenrui Diao, Chengyu Hu, Shanqing Guo, Chaoshun Zuo, Li Li:
An empirical study of potentially malicious third-party libraries in Android apps. WISEC 2020: 144-154
2010 – 2019
- 2019
- [j13]Ziyu Guo, Shijun Liu, Li Pan, Shanqing Guo, Tingting Niu:
Psychological Gender Express via Mobile Social Network Activities: An Experimental Study on a Gay Network Data. IEEE Access 7: 12696-12704 (2019) - [c52]Zheng Li, Chengyu Hu, Yang Zhang, Shanqing Guo:
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. ACSAC 2019: 126-137 - [c51]Zheng Li, Ge Han, Shanqing Guo, Chengyu Hu:
DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks. HPCC/SmartCity/DSS 2019: 1937-1944 - [c50]Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang:
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. RAID 2019: 151-164 - 2018
- [j12]Yang Liu, Chaoshun Zuo, Zonghua Zhang, Shanqing Guo, Xin-Shun Xu:
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps. World Wide Web 21(1): 127-150 (2018) - [c49]Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo:
Mapping to Bits: Efficiently Detecting Type Confusion Errors. ACSAC 2018: 518-528 - [c48]Jia Chen, Ge Han, Shanqing Guo, Wenrui Diao:
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications. DSN 2018: 398-409 - [c47]Yingpei Zeng, Shanqing Guo:
Deep Packet Inspection with Delayed Signature Matching in Network Auditing. ICICS 2018: 75-91 - [c46]Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu:
DRLgencert: Deep Learning-Based Automated Testing of Certificate Verification in SSL/TLS Implementations. ICSME 2018: 48-58 - [c45]Fanghua Zhao, Linan Gao, Yang Zhang, Zeyu Wang, Bo Wang, Shanqing Guo:
You Are Where You App: An Assessment on Location Privacy of Social Applications. ISSRE 2018: 236-247 - [c44]Linan Gao, Zeyu Wang, Shanqing Guo:
WalkToTopics: Inferring Topic Relations from a Feature Learning Perspective. KSEM (1) 2018: 42-54 - [c43]Ye Wu, Xin Luo, Xin-Shun Xu, Shanqing Guo, Yuliang Shi:
Dictionary Learning based Supervised Discrete Hashing for Cross-Media Retrieval. ICMR 2018: 222-230 - [i1]Chao Chen, Wenrui Diao, Yingpei Zeng, Shanqing Guo, Chengyu Hu:
DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations. CoRR abs/1808.05444 (2018) - 2017
- [j11]Chengyu Hu, Pengtao Liu, Shanqing Guo, Qiuliang Xu:
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application. Int. J. High Perform. Comput. Netw. 10(3): 226-239 (2017) - [j10]Xin-Shun Xu, Xiao-Long Liang, Guan-Qun Yang, Xiaolin Wang, Shanqing Guo, Yuliang Shi:
SOMH: A self-organizing map based topology preserving hashing method. Neurocomputing 236: 56-64 (2017) - [j9]Yongfeng Li, Jinbin Ouyang, Bing Mao, Kai Ma, Shanqing Guo:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks. EAI Endorsed Trans. Security Safety 4(11): e2 (2017) - [c42]Hua-Junjie Huang, Rui Yang, Chuan-Xiang Li, Yuliang Shi, Shanqing Guo, Xin-Shun Xu:
Supervised cross-modal hashing without relaxation. ICME 2017: 1159-1164 - [c41]Junjie Tang, Xingmin Cui, Ziming Zhao, Shanqing Guo, Xin-Shun Xu, Chengyu Hu, Tao Ban, Bing Mao:
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps. ICST 2017: 492-499 - [c40]Guan-Qun Yang, Xin-Shun Xu, Shanqing Guo, Xiaolin Wang:
M3LH: Multi-modal Multi-label Hashing for Large Scale Data Search. MMM (1) 2017: 201-213 - [c39]Lu Feng, Xin-Shun Xu, Shanqing Guo, Xiaolin Wang:
Supervised Class Graph Preserving Hashing for Image Retrieval and Classification. MMM (1) 2017: 391-403 - 2016
- [j8]Jian Wang, Xin-Shun Xu, Shanqing Guo, Lizhen Cui, Xiaolin Wang:
Linear unsupervised hashing for ANN search in Euclidean space. Neurocomputing 171: 283-292 (2016) - [j7]Chengyu Hu, Pengtao Liu, Shanqing Guo:
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. J. Ambient Intell. Humaniz. Comput. 7(5): 681-692 (2016) - [j6]Chengyu Hu, Pengtao Liu, Yongbin Zhou, Shanqing Guo, Yilei Wang, Qiuliang Xu:
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput. 20(12): 4919-4932 (2016) - [c38]Yuliang Shi, Xudong Zhao, Shanqing Guo, Shijun Liu, Li-zhen Cui:
SRConfig: An Empirical Method of Interdependent Soft Configurations for Improving Performance in n-Tier Application. SCC 2016: 601-608 - [c37]Tao Ban, Takeshi Takahashi, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Integration of Multi-modal Features for Android Malware Detection Using Linear SVM. AsiaJCIS 2016: 141-146 - [c36]Ting-Kun Yan, Xin-Shun Xu, Shanqing Guo, Zi Huang, Xiaolin Wang:
Supervised Robust Discrete Multimodal Hashing for Cross-Media Retrieval. CIKM 2016: 1271-1280 - [c35]Changyuan Wang, Zongfei Lu, Yang Liu, Shanqing Guo, Xin-Shun Xu, Shijun Liu, Li-zhen Cui:
SpatialGraphx: A Distributed Graph Computing Framework for Spatial and Temporal Data at Scale. COMPSAC 2016: 608-613 - [c34]Jia Chen, Xingmin Cui, Ziming Zhao, Jie Liang, Shanqing Guo:
Toward Discovering and Exploiting Private Server-Side Web APIs. ICWS 2016: 420-427 - [c33]Xiao-Long Liang, Xin-Shun Xu, Li-zhen Cui, Shanqing Guo, Xiaolin Wang:
SOMH: A Self-Organizing Map Based Topology Preserving Hashing Method. MMM (1) 2016: 337-348 - [c32]Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao:
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. SecureComm 2016: 637-654 - [c31]Liu Yang, Xingmin Cui, Changyuan Wang, Shanqing Guo, Xin-Shun Xu:
Risk Analysis of Exposed Methods to JavaScript in Hybrid Apps. Trustcom/BigDataSE/ISPA 2016: 458-464 - 2015
- [j5]Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo, Lizhen Cui:
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications. Secur. Commun. Networks 8(13): 2338-2349 (2015) - [c30]Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang:
Anonymous Identity-Based Encryption with Bounded Leakage Resilience. AINA Workshops 2015: 287-292 - [c29]Yao Yang, Xin-Shun Xu, Xiaolin Wang, Shanqing Guo, Lizhen Cui:
Hashing Multi-Instance Data from Bag and Instance Level. APWeb 2015: 437-448 - [c28]Chaoshun Zuo, Jianliang Wu, Shanqing Guo:
Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps. AsiaCCS 2015: 591-596 - [c27]Cuixia Yang, Chaoshun Zuo, Shanqing Guo, Chengyu Hu, Lizhen Cui:
UI Ripping in Android: Reverse Engineering of Graphical User Interfaces and its Application. CIC 2015: 160-167 - [c26]Guangdong Bai, Jun Sun, Jianliang Wu, Quanqi Ye, Li Li, Jin Song Dong, Shanqing Guo:
All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android. ICECCS 2015: 60-69 - [c25]Kai Ma, Mengyang Liu, Shanqing Guo, Tao Ban:
MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications. ICONIP (3) 2015: 384-391 - [c24]Tao Ban, Masashi Eto, Shanqing Guo, Daisuke Inoue, Koji Nakao, Runhe Huang:
A study on association rule mining of darknet big data. IJCNN 2015: 1-7 - 2014
- [j4]Ryoichi Isawa, Tao Ban, Shanqing Guo, Daisuke Inoue, Koji Nakao:
An Accurate Packer Identification Method Using Support Vector Machine. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 253-263 (2014) - [c23]Haibo Zhang, Chaoshun Zuo, Shanqing Guo, Lizhen Cui, Jun Chen:
SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment. IOV 2014: 292-303 - 2013
- [c22]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel. AsiaJCIS 2013: 69-76 - [c21]Tao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao:
Application of string kernel based support vector machine for malware packer identification. IJCNN 2013: 1-8 - 2012
- [j3]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Towards Cost-Effective P2P Traffic Classification in Cloud Environment. IEICE Trans. Inf. Syst. 95-D(12): 2888-2897 (2012) - [c20]Shanqing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban:
A Fine-Grained Classification Approach for the Packed Malicious Code. ICICS 2012: 497-504 - [c19]Xiaoyan Yan, Bo Liang, Tao Ban, Shanqing Guo, Liming Wang:
TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality. ICONIP (4) 2012: 100-107 - [c18]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
A study on cost-effective P2P traffic classification. IJCNN 2012: 1-7 - 2011
- [c17]Shanqing Guo, Fengyu Wang, Bo Liang:
Identification of Network Applications with Co-training. CSE 2011: 401-404 - [c16]Tao Ban, Shanqing Guo, Masashi Eto, Daisuke Inoue, Koji Nakao:
Entropy Based Discriminators for P2P Teletraffic Characterization. ICONIP (2) 2011: 18-27 - [c15]Chuantong Chen, Fengyu Wang, Fengbo Lin, Shanqing Guo, Bin Gong:
Fast Protocol Recognition by Network Packet Inspection. ICONIP (2) 2011: 37-44 - [c14]Liangxiong Li, Fengyu Wang, Tao Ban, Shanqing Guo, Bin Gong:
Network Flow Classification Based on the Rhythm of Packets. ICONIP (2) 2011: 45-52 - [c13]Tao Ban, Shanqing Guo, Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Practical network traffic analysis in P2P environment. IWCMC 2011: 1801-1807 - 2010
- [j2]Mengbo Hou, Qiuliang Xu, Shanqing Guo, Han Jiang:
Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings. J. Networks 5(7): 855-862 (2010) - [j1]Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqing Guo, Li Xie:
Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J. Sel. Areas Commun. 28(5): 677-691 (2010) - [c12]Yongquan Shi, Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing. ICONIP (2) 2010: 143-151 - [c11]Shanqing Guo, Qixia Yuan, Fengbo Lin, Fengyu Wang, Tao Ban:
A Malware Detection Algorithm Based on Multi-view Fusion. ICONIP (2) 2010: 259-266 - [c10]Fengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang:
Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently. NSS 2010: 160-166
2000 – 2009
- 2009
- [c9]Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces. ICONIP (2) 2009: 729-737 - [c8]Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqing Guo, Li Xie:
Pollution attack: a new attack against localization in wireless sensor networks. WCNC 2009: 2038-2043 - [c7]Yingpei Zeng, Jiannong Cao, Shanqing Guo, Kai Yang, Li Xie:
SWCA: a secure weighted clustering algorithm in wireless ad hoc networks. WCNC 2009: 2426-2431 - 2008
- [c6]Qian Sun, Shanqing Guo, Qiuliang Xu:
Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN. EUC (2) 2008: 651-654 - [c5]Yuhai Liu, Zhiqiang Li, Shanqing Guo, Taiming Feng:
Efficient, Accurate Internet Traffic Classification using Discretization in Naive Bayes. ICNSC 2008: 1589-1592 - [c4]Zhonghua Zhao, Shanqing Guo, Qiuliang Xu, Tao Ban:
G-Means: A Clustering Algorithm for Intrusion Detection. ICONIP (1) 2008: 563-570 - [c3]Yan Yu, Shanqing Guo, Shaohua Lan, Tao Ban:
Anomaly Intrusion Detection for Evolving Data Stream Based on Semi-supervised Learning. ICONIP (1) 2008: 571-578 - [c2]Shanqing Guo, Chunhua Zhang:
Identity-based Broadcast Encryption Scheme with Untrusted PKG. ICYCS 2008: 1613-1618 - 2007
- [c1]Yingpei Zeng, Shigeng Zhang, Shanqing Guo, Xie Li:
Secure Hop-Count Based Localization in Wireless Sensor Networks. CIS 2007: 907-911
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint