CrossSense: towards cross-site and large-scale WiFi sensing J Zhang, Z Tang, M Li, D Fang, PT Nurmi, Z Wang The 24th ACM International Conference on Mobile Computing and Networking …, 2018 | 220 | 2018 |
Combining graph-based learning with automated data collection for code vulnerability detection H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ... IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020 | 199 | 2020 |
Yet another text captcha solver: A generative adversarial network based approach G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, Z Wang Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 165 | 2018 |
Cracking android pattern lock in five attempts G Ye, Z Tang, D Fang, X Chen, KI Kim, B Taylor, Z Wang Proceedings of the 2017 Network and Distributed System Security Symposium …, 2017 | 142 | 2017 |
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas L Chang, X Chen, Y Wang, D Fang, J Wang, T Xing, Z Tang IEEE/ACM Transactions on Networking 25 (4), 1994-2007, 2017 | 86 | 2017 |
Tagtag: material sensing with commodity rfid B Xie, J Xiong, X Chen, E Chai, L Li, Z Tang, D Fang Proceedings of the 17th conference on embedded networked sensor systems, 338-350, 2019 | 83 | 2019 |
WideSee: Towards wide-area contactless wireless sensing L Chen, J Xiong, X Chen, SI Lee, K Chen, D Han, D Fang, Z Tang, ... Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 258-270, 2019 | 78 | 2019 |
SleepGuard: Capturing rich sleep information using smartwatch sensing data L Chang, J Lu, J Wang, X Chen, D Fang, Z Tang, P Nurmi, Z Wang Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 64 | 2018 |
Automated conformance testing for javascript engines via deep compiler fuzzing G Ye, Z Tang, SH Tan, S Huang, D Fang, X Sun, L Bian, H Wang, Z Wang Proceedings of the 42nd ACM SIGPLAN international conference on programming …, 2021 | 62 | 2021 |
A video-based attack for android pattern lock G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018 | 55 | 2018 |
Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes Z Tang, Y Zhao, L Yang, S Qi, D Fang, X Chen, X Gong, Z Wang Mobile Information Systems 2017 (1), 1248578, 2017 | 50 | 2017 |
Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality J Zhang, X Zheng, Z Tang, T Xing, X Chen, D Fang, R Li, X Gong, F Chen Mobile Information Systems 2016 (1), 8793025, 2016 | 49 | 2016 |
WiMi: Target material identification with commodity Wi-Fi devices C Feng, J Xiong, L Chang, J Wang, X Chen, D Fang, Z Tang 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 47 | 2019 |
SmartMTra: Robust indoor trajectory tracing using smartphones P Zhang, X Chen, X Ma, Y Wu, H Jiang, D Fang, Z Tang, Y Ma IEEE Sensors Journal 17 (12), 3613-3624, 2017 | 45 | 2017 |
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling K Kuang, Z Tang, X Gong, D Fang, X Chen, Z Wang Computers & Security 74, 202-220, 2018 | 36 | 2018 |
Deep program structure modeling through multi-relational graph-based learning G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang Proceedings of the ACM International conference on parallel architectures …, 2020 | 35 | 2020 |
CrossGR: Accurate and low-cost cross-target gesture recognition using Wi-Fi X Li, L Chang, F Song, J Wang, X Chen, Z Tang, Z Wang Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2021 | 29 | 2021 |
Appis: Protect android apps against runtime repackaging attacks L Song, Z Tang, Z Li, X Gong, X Chen, D Fang, Z Wang 2017 IEEE 23rd International Conference on Parallel and Distributed Systems …, 2017 | 26 | 2017 |
Using generative adversarial networks to break and protect text captchas G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, J Han, Z Wang ACM Transactions on Privacy and Security (TOPS) 23 (2), 1-29, 2020 | 24 | 2020 |
RF-copybook: A millimeter level calligraphy copybook based on commodity RFID L Chang, J Xiong, J Wang, X Chen, Y Wang, Z Tang, D Fang Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 22 | 2018 |