default search action
Guixin Ye
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Meng Li, Yanzhe Shen, Guixin Ye, Jialing He, Xin Zheng, Zijian Zhang, Liehuang Zhu, Mauro Conti:
Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics. IEEE Trans. Knowl. Data Eng. 36(5): 1874-1888 (2024) - [c10]Zhenye Fan, Guixin Ye, Tianmin Hu, Zhanyong Tang:
History-driven Compiler Fuzzing via Assembling and Scheduling Bug-triggering Code Segments. ISSRE 2024: 331-342 - [c9]Tianmin Hu, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Huanting Wang, Meng Li, Zheng Wang:
UPBEAT: Test Input Checks of Q# Quantum Libraries. ISSTA 2024: 186-198 - 2023
- [c8]Zhangyu Liu, Cheng Zhang, Huijun Wu, Jianbin Fang, Lin Peng, Guixin Ye, Zhanyong Tang:
Optimizing HPC I/O Performance with Regression Analysis and Ensemble Learning. CLUSTER 2023: 234-246 - [c7]Guixin Ye, Tianmin Hu, Zhanyong Tang, Zhenye Fan, Shin Hwei Tan, Bo Zhang, Wenxiang Qian, Zheng Wang:
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing. ESEC/SIGSOFT FSE 2023: 1127-1139 - 2022
- [j13]Xiao Li, Yuanhai Chang, Guixin Ye, Xiaoqing Gong, Zhanyong Tang:
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program. J. Inf. Secur. Appl. 65: 103088 (2022) - [j12]Rongze Xu, Zhanyong Tang, Guixin Ye, Huanting Wang, Xin Ke, Dingyi Fang, Zheng Wang:
Detecting code vulnerabilities by learning from large-scale open source repositories. J. Inf. Secur. Appl. 69: 103293 (2022) - 2021
- [j11]Shuangjiao Zhai, Guixin Ye, Zhanyong Tang, Jie Ren, Dingyi Fang, Baoying Liu, Zheng Wang:
Towards practical 3D ultrasound sensing on commercial-off-the-shelf mobile devices. Comput. Networks 191: 107990 (2021) - [j10]Weiyuan Tong, Rong Li, Xiaoqing Gong, Shuangjiao Zhai, Xia Zheng, Guixin Ye:
Exploiting Serialized Fine-Grained Action Recognition Using WiFi Sensing. Mob. Inf. Syst. 2021: 4770143:1-4770143:17 (2021) - [j9]Huanting Wang, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Yansong Feng, Lizhong Bian, Zheng Wang:
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection. IEEE Trans. Inf. Forensics Secur. 16: 1943-1958 (2021) - [c6]Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Xiaoyang Sun, Lizhong Bian, Haibo Wang, Zheng Wang:
Automated conformance testing for JavaScript engines via deep compiler fuzzing. PLDI 2021: 435-450 - [i1]Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Xiaoyang Sun, Lizhong Bian, Haibo Wang, Zheng Wang:
Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing. CoRR abs/2104.07460 (2021) - 2020
- [j8]Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Compile-time code virtualization for android applications. Comput. Secur. 94: 101821 (2020) - [j7]Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Semantics-aware obfuscation scheme prediction for binary. Comput. Secur. 99: 102072 (2020) - [j6]Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Jungong Han, Zheng Wang:
Using Generative Adversarial Networks to Break and Protect Text Captchas. ACM Trans. Priv. Secur. 23(2): 7:1-7:29 (2020) - [c5]Guixin Ye, Zhanyong Tang, Huanting Wang, Dingyi Fang, Jianbin Fang, Songfang Huang, Zheng Wang:
Deep Program Structure Modeling Through Multi-Relational Graph-based Learning. PACT 2020: 111-123
2010 – 2019
- 2019
- [j5]Zhongkai He, Guixin Ye, Lu Yuan, Zhanyong Tang, Xiaofeng Wang, Jie Ren, Wei Wang, Jianfeng Yang, Dingyi Fang, Zheng Wang:
Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging. IEEE Access 7: 115062-115074 (2019) - [j4]Wei Wang, Zheng Wang, Meng Li, Zhanyong Tang, Huanting Wang, Guixin Ye, Fuwei Wang, Jie Ren, Xiaoqing Gong, Dingyi Fang:
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity. IEEE Access 7: 169160-169173 (2019) - [j3]Shuai Wang, Dingyi Fang, Zheng Wang, Guixin Ye, Meng Li, Lu Yuan, Zhanyong Tang, Huanting Wang, Wei Wang, Fuwei Wang, Jie Ren:
Leveraging WebAssembly for Numerical JavaScript Code Virtualization. IEEE Access 7: 182711-182724 (2019) - 2018
- [j2]Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam J. Aviv, Zheng Wang:
A Video-based Attack for Android Pattern Lock. ACM Trans. Priv. Secur. 21(4): 19:1-19:31 (2018) - [c4]Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang:
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. CCS 2018: 332-348 - [c3]Chao Xue, Zhanyong Tang, Guixin Ye, Guanghui Li, Xiaoqing Gong, Wei Wangg, Dingyi Fang, Zheng Wang:
Exploiting Code Diversity to Enhance Code Virtualization Protection. ICPADS 2018: 620-627 - 2017
- [c2]Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, Zheng Wang:
Cracking Android Pattern Lock in Five Attempts. NDSS 2017 - 2016
- [c1]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang:
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. Trustcom/BigDataSE/ISPA 2016: 489-496 - 2012
- [j1]Bing Yang, Yan Liu, Guixin Ye:
Research of ArtemiS in a Ring-Plate Cycloid Reducer. J. Softw. 7(12): 2671-2677 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint