default search action
Zhanyong Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Pengfei Xu, Yuanyuan Zhang, Minghao Ji, Songtao Guo, Zhanyong Tang, Xiang Wang, Jing Guo, Junjie Zhang, Ziyu Guan:
Advanced intelligent monitoring technologies for animals: A survey. Neurocomputing 585: 127640 (2024) - [c45]Huanting Wang, Zhanyong Tang, Shin Hwei Tan, Jie Wang, Yuzhe Liu, Hejun Fang, Chunwei Xia, Zheng Wang:
Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction. ICSE 2024: 169:1-169:13 - [c44]Zhenye Fan, Guixin Ye, Tianmin Hu, Zhanyong Tang:
History-driven Compiler Fuzzing via Assembling and Scheduling Bug-triggering Code Segments. ISSRE 2024: 331-342 - [c43]Tianmin Hu, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Huanting Wang, Meng Li, Zheng Wang:
UPBEAT: Test Input Checks of Q# Quantum Libraries. ISSTA 2024: 186-198 - 2023
- [j33]Lili Chen, Kai Chen, Jie Xiong, Ke Li, Sunghoon Ivan Lee, Fuwei Wang, Zhanyong Tang, Zheng Wang, Dingyi Fang, Xiaojiang Chen:
Toward Wide-Area Contactless Wireless Sensing. IEEE/ACM Trans. Netw. 31(2): 590-605 (2023) - [c42]Zhangyu Liu, Cheng Zhang, Huijun Wu, Jianbin Fang, Lin Peng, Guixin Ye, Zhanyong Tang:
Optimizing HPC I/O Performance with Regression Analysis and Ensemble Learning. CLUSTER 2023: 234-246 - [c41]Guixin Ye, Tianmin Hu, Zhanyong Tang, Zhenye Fan, Shin Hwei Tan, Bo Zhang, Wenxiang Qian, Zheng Wang:
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing. ESEC/SIGSOFT FSE 2023: 1127-1139 - 2022
- [j32]Xiao Li, Yuanhai Chang, Guixin Ye, Xiaoqing Gong, Zhanyong Tang:
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program. J. Inf. Secur. Appl. 65: 103088 (2022) - [j31]Rongze Xu, Zhanyong Tang, Guixin Ye, Huanting Wang, Xin Ke, Dingyi Fang, Zheng Wang:
Detecting code vulnerabilities by learning from large-scale open source repositories. J. Inf. Secur. Appl. 69: 103293 (2022) - [c40]Huanting Wang, Zhanyong Tang, Cheng Zhang, Jiaqi Zhao, Chris Cummins, Hugh Leather, Zheng Wang:
Automating reinforcement learning architecture design for code optimization. CC 2022: 129-143 - 2021
- [j30]Shuangjiao Zhai, Guixin Ye, Zhanyong Tang, Jie Ren, Dingyi Fang, Baoying Liu, Zheng Wang:
Towards practical 3D ultrasound sensing on commercial-off-the-shelf mobile devices. Comput. Networks 191: 107990 (2021) - [j29]Jun Guo, Mei Shi, Xingwu Zhu, Wei Huang, Yi He, Weiwei Zhang, Zhanyong Tang:
Improving human action recognition by jointly exploiting video and WiFi clues. Neurocomputing 458: 14-23 (2021) - [j28]Xinyi Li, Liqiong Chang, Fangfang Song, Ju Wang, Xiaojiang Chen, Zhanyong Tang, Zheng Wang:
CrossGR: Accurate and Low-cost Cross-target Gesture Recognition Using Wi-Fi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 21:1-21:23 (2021) - [j27]Huanting Wang, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Yansong Feng, Lizhong Bian, Zheng Wang:
Combining Graph-Based Learning With Automated Data Collection for Code Vulnerability Detection. IEEE Trans. Inf. Forensics Secur. 16: 1943-1958 (2021) - [c39]Shuangjiao Zhai, Zhanyong Tang, Petteri Nurmi, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
RISE: robust wireless sensing using probabilistic and statistical assessments. MobiCom 2021: 309-322 - [c38]Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Xiaoyang Sun, Lizhong Bian, Haibo Wang, Zheng Wang:
Automated conformance testing for JavaScript engines via deep compiler fuzzing. PLDI 2021: 435-450 - [i3]Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Xiaoyang Sun, Lizhong Bian, Haibo Wang, Zheng Wang:
Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing. CoRR abs/2104.07460 (2021) - 2020
- [j26]Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Compile-time code virtualization for android applications. Comput. Secur. 94: 101821 (2020) - [j25]Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Semantics-aware obfuscation scheme prediction for binary. Comput. Secur. 99: 102072 (2020) - [j24]Jun Guo, Hao Bai, Zhanyong Tang, Pengfei Xu, Daguang Gan, Baoying Liu:
Multi modal human action recognition for video content matching. Multim. Tools Appl. 79(45-46): 34665-34683 (2020) - [j23]Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Jungong Han, Zheng Wang:
Using Generative Adversarial Networks to Break and Protect Text Captchas. ACM Trans. Priv. Secur. 23(2): 7:1-7:29 (2020) - [c37]Guixin Ye, Zhanyong Tang, Huanting Wang, Dingyi Fang, Jianbin Fang, Songfang Huang, Zheng Wang:
Deep Program Structure Modeling Through Multi-Relational Graph-based Learning. PACT 2020: 111-123 - [c36]Jie Ren, Lu Yuan, Petteri Nurmi, Xiaoming Wang, Miao Ma, Ling Gao, Zhanyong Tang, Jie Zheng, Zheng Wang:
Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions. INFOCOM 2020: 119-128 - [i2]Jie Ren, Lu Yuan, Petteri Nurmi, Xiaoming Wang, Miao Ma, Ling Gao, Zhanyong Tang, Jie Zheng, Zheng Wang:
Smart, Adaptive Energy Optimization for Mobile Web Interactions. CoRR abs/2005.00749 (2020)
2010 – 2019
- 2019
- [j22]Zhongkai He, Guixin Ye, Lu Yuan, Zhanyong Tang, Xiaofeng Wang, Jie Ren, Wei Wang, Jianfeng Yang, Dingyi Fang, Zheng Wang:
Exploiting Binary-Level Code Virtualization to Protect Android Applications Against App Repackaging. IEEE Access 7: 115062-115074 (2019) - [j21]Lu Yuan, Jie Ren, Ling Gao, Zhanyong Tang, Zheng Wang:
Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Systems. IEEE Access 7: 139394-139408 (2019) - [j20]Wei Wang, Zheng Wang, Meng Li, Zhanyong Tang, Huanting Wang, Guixin Ye, Fuwei Wang, Jie Ren, Xiaoqing Gong, Dingyi Fang:
Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity. IEEE Access 7: 169160-169173 (2019) - [j19]Shuai Wang, Dingyi Fang, Zheng Wang, Guixin Ye, Meng Li, Lu Yuan, Zhanyong Tang, Huanting Wang, Wei Wang, Fuwei Wang, Jie Ren:
Leveraging WebAssembly for Numerical JavaScript Code Virtualization. IEEE Access 7: 182711-182724 (2019) - [j18]Jie Zhang, Zhanyong Tang, Meng Li, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Find me a safe zone: A countermeasure for channel state information based attacks. Comput. Secur. 80: 273-290 (2019) - [j17]Chen Liu, Dingyi Fang, Xinyan Liu, Dan Xu, Xiaojiang Chen, Chieh-Jan Mike Liang, Baoying Liu, Zhanyong Tang:
Low-Cost and Robust Geographic Opportunistic Routing in a Strip Topology Wireless Network. ACM Trans. Sens. Networks 15(2): 24:1-24:27 (2019) - [c35]Chao Feng, Jie Xiong, Liqiong Chang, Ju Wang, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang:
WiMi: Target Material Identification with Commodity Wi-Fi Devices. ICDCS 2019: 700-710 - [c34]Qingpei Li, Meng Li, Xin Ke, Weixing Kong, Lei Yang, Zhanyong Tang, Xiaojiang Chen, Dingyi Fang:
WisDriver: A WiFi and Smartphone Sensing System for Safely Driving. PACRIM 2019: 1-6 - [c33]Lili Chen, Jie Xiong, Xiaojiang Chen, Sunghoon Ivan Lee, Kai Chen, Dianhe Han, Dingyi Fang, Zhanyong Tang, Zheng Wang:
WideSee: towards wide-area contactless wireless sensing. SenSys 2019: 258-270 - [c32]Binbin Xie, Jie Xiong, Xiaojiang Chen, Eugene Chai, Liyao Li, Zhanyong Tang, Dingyi Fang:
Tagtag: material sensing with commodity RFID. SenSys 2019: 338-350 - [c31]Kai Chen, Lili Chen, Dianhe Han, Jie Xiong, Sunghoon Ivan Lee, Xiaojiang Chen, Zhanyong Tang, Dingyi Fang, Fuwei Wang, Zheng Wang:
Towards wide-area contactless human sensing: poster abstract. SenSys 2019: 442-443 - [i1]Lu Yuan, Jie Ren, Ling Gao, Zhanyong Tang, Zheng Wang:
Using Machine Learning to Optimize Web Interactions on Heterogeneous Mobile Multi-cores. CoRR abs/1906.08689 (2019) - 2018
- [j16]Dan Xu, Wenli Jiao, Zhuang Yin, Junjie Huang, Yao Peng, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang:
Maximizing throughput for low duty-cycled sensor networks. Comput. Networks 139: 48-59 (2018) - [j15]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. Comput. Secur. 74: 202-220 (2018) - [j14]Liqiong Chang, Jiaqi Lu, Ju Wang, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang, Petteri Nurmi, Zheng Wang:
SleepGuard: Capturing Rich Sleep Information Using Smartwatch Sensing Data. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 98:1-98:34 (2018) - [j13]Shuangjiao Zhai, Zhanyong Tang, Dajin Wang, Qingpei Li, Zhanglei Li, Xiaojiang Chen, Dingyi Fang, Feng Chen, Zheng Wang:
Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery. Sensors 18(7): 2075 (2018) - [j12]Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Willy Wolff, Adam J. Aviv, Zheng Wang:
A Video-based Attack for Android Pattern Lock. ACM Trans. Priv. Secur. 21(4): 19:1-19:31 (2018) - [c30]Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang:
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. CCS 2018: 332-348 - [c29]Chao Xue, Zhanyong Tang, Guixin Ye, Guanghui Li, Xiaoqing Gong, Wei Wangg, Dingyi Fang, Zheng Wang:
Exploiting Code Diversity to Enhance Code Virtualization Protection. ICPADS 2018: 620-627 - [c28]Pengfei Xu, Lei Wang, Ziyu Guan, Xia Zheng, Xiaojiang Chen, Zhanyong Tang, Dingyi Fang, Xiaoqing Gong, Zheng Wang:
Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach. IJCAI 2018: 1050-1056 - [c27]Jie Zhang, Zhanyong Tang, Meng Li, Dingyi Fang, Petteri Nurmi, Zheng Wang:
CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing. MobiCom 2018: 305-320 - [c26]Liqiong Chang, Xinyi Li, Ju Wang, Haining Meng, Xiaojiang Chen, Dingyi Fang, Zhanyong Tang, Zheng Wang:
Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing. PerCom 2018: 1-10 - 2017
- [j11]Zhaoqiang Wang, Jingjing Zhao, Xiaojiang Chen, Xiaoqing Gong, Zhanyong Tang, Chen Liu, Dingyi Fang:
Approximate Convex Decomposition Based on Connectivity in Large-scale 3DWireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(1-2): 41-66 (2017) - [j10]Ruxia Fan, Dingyi Fang, Zhanyong Tang, Xiaojiang Chen, Fangyuan Liu, Zhengqiao Li:
Thwarting Android app repackaging by executable code fragmentation. Int. J. High Perform. Comput. Netw. 10(4/5): 320-331 (2017) - [j9]Liqiong Chang, Jie Xiong, Ju Wang, Xiaojiang Chen, Yu Wang, Zhanyong Tang, Dingyi Fang:
RF-Copybook: A Millimeter Level Calligraphy Copybook based on commodity RFID. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 128:1-128:19 (2017) - [j8]Zhanyong Tang, Yujie Zhao, Lei Yang, Shengde Qi, Dingyi Fang, Xiaojiang Chen, Xiaoqing Gong, Zheng Wang:
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes. Mob. Inf. Syst. 2017: 1248578:1-1248578:14 (2017) - [j7]Liqiong Chang, Xiaojiang Chen, Yu Wang, Dingyi Fang, Ju Wang, Tianzhang Xing, Zhanyong Tang:
FitLoc: Fine-Grained and Low-Cost Device-Free Localization for Multiple Targets Over Various Areas. IEEE/ACM Trans. Netw. 25(4): 1994-2007 (2017) - [c25]Jie Zhang, Zhanyong Tang, Rong Li, Xiaojiang Chen, Xiaoqing Gong, Dingyi Fang, Zheng Wang:
Protect Sensitive Information against Channel State Information Based Attacks. CSE/EUC (2) 2017: 203-210 - [c24]Shuangjiao Zhai, Zhanyong Tang, Dajin Wang, Zhanglei Li, Xiaojiang Chen, Dingyi Fang, Feng Chen:
Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization. CSE/EUC (2) 2017: 250-257 - [c23]Beibei Zhao, Zhanyong Tang, Zhen Li, Lina Song, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu, Zheng Wang:
DexPro: A Bytecode Level Code Protection System for Android Applications. CSS 2017: 367-382 - [c22]Lina Song, Zhanyong Tang, Zhen Li, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Zheng Wang:
AppIS: Protect Android Apps Against Runtime Repackaging Attacks. ICPADS 2017: 25-32 - [c21]Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, Zheng Wang:
Cracking Android Pattern Lock in Five Attempts. NDSS 2017 - [c20]Zhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, Xiaojiang Chen, Dingyi Fang, Jie Liu, Zheng Wang:
SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscation. TrustCom/BigDataSE/ICESS 2017: 261-268 - [c19]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Heng Zhang, Jie Liu, Zheng Wang:
Exploit dynamic data flows to protect software against semantic attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [j6]Pengfei Xu, Xia Zheng, Xiaojun Chang, Qiguang Miao, Zhanyong Tang, Xiaojiang Chen, Dingyi Fang:
Artistic information extraction from Chinese calligraphy works via Shear-Guided filter. J. Vis. Commun. Image Represent. 40: 791-807 (2016) - [j5]Jie Zhang, Xiaolong Zheng, Zhanyong Tang, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Rong Li, Xiaoqing Gong, Feng Chen:
Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality. Mob. Inf. Syst. 2016: 8793025:1-8793025:14 (2016) - [j4]Liqing Ren, Xiaojiang Chen, Binbin Xie, Zhanyong Tang, Tianzhang Xing, Chen Liu, Weike Nie, Dingyi Fang:
DE 2: localization based on the rotating RSS using a single beacon. Wirel. Networks 22(2): 703-721 (2016) - [j3]Binbin Xie, Dingyi Fang, Tianzhang Xing, Lichao Zhang, Xiaojiang Chen, Zhanyong Tang, Anwen Wang:
FISCP: fine-grained device-free positioning system for multiple targets working in sparse deployments. Wirel. Networks 22(5): 1751-1766 (2016) - [c18]Liqiong Chang, Xiaojiang Chen, Yu Wang, Dingyi Fang, Ju Wang, Tianzhang Xing, Zhanyong Tang:
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas. INFOCOM 2016: 1-9 - [c17]Binbin Xie, Jie Xiong, Dingyi Fang, Xiaojiang Chen, Anwen Wang, Zhanyong Tang:
Poster: A Device-free Evaluation System for Gymnastics using Passive RFID Tags. MobiSys (Companion Volume) 2016: 89 - [c16]Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Tianzhang Xing, Guixin Ye, Jie Zhang, Zheng Wang:
Exploiting Dynamic Scheduling for VM-Based Code Obfuscation. Trustcom/BigDataSE/ISPA 2016: 489-496 - [c15]Pengyan Zhang, Xiaojiang Chen, Dingyi Fang, Wei Wang, Zhanyong Tang, Yang Ma:
SmartMTra: Put the Limit of the Inertial Sensor Based Indoor Motion Trajectory Tracing Using Smartphone. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 66-73 - 2015
- [j2]Zhanyong Tang, Jie Zhang, Xiaoqing Gong, Xiaohua Cheng, Xiaojiang Chen, Dingyi Fang, Wei Wang:
CTLL: A Cell-Based Transfer Learning Method for Localization in Large Scale Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 252653:1-252653:18 (2015) - [j1]Zhanyong Tang, Jie Zhang, Liang Wang, Jinzhi Han, Dingyi Fang, Anwen Wang:
NDSL: Node Density-Based Subregional Localization in Large Scale Anisotropy Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 821352:1-821352:16 (2015) - [c14]Liqiong Chang, Xiaojiang Chen, Ju Wang, Dingyi Fang, Chen Liu, Zhanyong Tang, Weike Nie:
TaLc: Time Adaptive Indoor Localization with Little Cost. CHANTS@MobiCom 2015: 49-54 - [c13]Chen Liu, Dingyi Fang, Hongbo Jiang, Xiaojiang Chen, Zhanyong Tang, Ju Wang, Weike Nie:
Poster: On the Low-Cost and Distance-Adaptive Device-free Localization. MobiCom 2015: 221-223 - [c12]Ju Wang, Dingyi Fang, Xiaojiang Chen, Liqiong Chang, Zhanyong Tang, Tianzhang Xing, Chen Liu:
Poster: A Low Cost People Flow Monitoring System For Sensing The Potential Danger. MobiCom 2015: 242-244 - [c11]Meng Jin, Dingyi Fang, Xiaojiang Chen, Lin Cai, Zhe Yang, Zhanyong Tang:
Poster: An Insomnia Therapy for Clock Synchronization in Wireless Sensor Networks. MobiCom 2015: 287-289 - [c10]Chen Liu, Xiaojiang Chen, Dingyi Fang, Dan Xu, Zhanyong Tang, Chieh-Jan Mike Liang:
LIPS: Bring LIght Propagation Selection to Geographic Opportunistic Routing in Strip WSNs. MSCC@MobiHoc 2015: 39-44 - [c9]Jianan Kou, Xiaojiang Chen, Zhanyong Tang, Juan He, Chao Qu, Tianzhang Xing, Dingyi Fang:
Low-cost Device-Free Localization using Detection Probability Model in Outdoors. ENSsys@SenSys 2015: 37-38 - [c8]Liqiong Chang, Xiaojiang Chen, Dingyi Fang, Ju Wang, Tianzhang Xing, Chen Liu, Zhanyong Tang:
FALE: Fine-grained Device Free Localization that can Adaptively work in Different Areas with Little Effort. SIGCOMM 2015: 601-602 - [c7]Zhanyong Tang, Jianan Kou, Chao Qu, Tianzhang Xing, Xiaojiang Chen, Dingyi Fang, Ruchen Wang:
Multi-link Passive Localization with Low Cost in Wireless Sensor Networks. UIC/ATC/ScalCom 2015: 344-347 - 2014
- [c6]Tianzhang Xing, Lichao Zhang, Zhanyong Tang, Chen Liu, Xiaojiang Chen, Dingyi Fang:
A Novel Method for Protritage Site with WSN. HCC 2014: 765-776 - [c5]Dan Xu, Xiaojiang Chen, Weike Nie, Zhanyong Tang, Zhanglei Li, Dingyi Fang, Na An:
RPC: A Localization Method Based on Regional Partition and Cooperation. UIC/ATC/ScalCom 2014: 58-65 - [c4]Tianzhang Xing, Binbin Xie, Zhanyong Tang, Xia Zheng, Liqing Ren, Xiaojiang Chen, Dingyi Fang, Na An:
Who Move the Treasures: A RFID-based Approach for the Treasures. UIC/ATC/ScalCom 2014: 154-162 - 2013
- [c3]Huaijun Wang, Dingyi Fang, Ni Wang, Zhanyong Tang, Feng Chen, Yuanxiang Gu:
Method to Evaluate Software Protection Based on Attack Modeling. HPCC/EUC 2013: 837-844 - 2011
- [c2]Zhanyong Tang, Dingyi Fang:
A tamper-proof software watermark using code encryption. ISI 2011: 156-160
2000 – 2009
- 2009
- [c1]Zhanyong Tang, Rui Qi, Dingyi Fang, Yangxia Luo:
W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks. IAS 2009: 158-162
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint