Random-walk based approach to detect clone attacks in wireless sensor networks Y Zeng, J Cao, S Zhang, S Guo, L Xie IEEE Journal on selected areas in communications 28 (5), 677-691, 2010 | 173 | 2010 |
How to prove your model belongs to you: A blind-watermark based framework to protect intellectual property of DNN Z Li, C Hu, Y Zhang, S Guo Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 111 | 2019 |
Label inference attacks against vertical federated learning C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang 31st USENIX Security Symposium (USENIX Security 22), 1397-1414, 2022 | 52 | 2022 |
Attribute-based re-encryption scheme in the standard model S Guo, Y Zeng, J Wei, Q Xu Wuhan University Journal of Natural Sciences 13 (5), 621-625, 2008 | 43 | 2008 |
A study on association rule mining of darknet big data T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang 2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015 | 37 | 2015 |
Integration of multi-modal features for android malware detection using linear SVM T Ban, T Takahashi, S Guo, D Inoue, K Nakao 2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016 | 29 | 2016 |
Linear unsupervised hashing for ANN search in Euclidean space J Wang, XS Xu, S Guo, L Cui, XL Wang Neurocomputing 171, 283-292, 2016 | 27 | 2016 |
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps C Zuo, J Wu, S Guo Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 26 | 2015 |
Supervised robust discrete multimodal hashing for cross-media retrieval TK Yan, XS Xu, S Guo, Z Huang, XL Wang Proceedings of the 25th ACM international on conference on information and …, 2016 | 25 | 2016 |
Paddyfrog: systematically detecting confused deputy vulnerability in android applications J Wu, T Cui, T Ban, S Guo, L Cui Security and Communication Networks 8 (13), 2338-2349, 2015 | 23 | 2015 |
An intrusion detection model based on improved random forests algorithm 郭山清, 高丛, 姚建, 谢立 Journal of software 16 (8), 1490-1498, 2005 | 23 | 2005 |
SWCA: A secure weighted clustering algorithm in wireless ad hoc networks Y Zeng, J Cao, S Guo, K Yang, L Xie 2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009 | 22 | 2009 |
Secure hop-count based localization in wireless sensor networks Y Zeng, S Zhang, S Guo, X Li 2007 International conference on computational intelligence and security …, 2007 | 22 | 2007 |
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang RAID, 151-164, 2019 | 21 | 2019 |
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo 2015 20th International Conference on Engineering of Complex Computer …, 2015 | 20 | 2015 |
G-means: a clustering algorithm for intrusion detection Z Zhao, S Guo, Q Xu, T Ban Advances in Neuro-Information Processing: 15th International Conference …, 2009 | 18 | 2009 |
DRLgencert: Deep learning-based automated testing of certificate verification in SSL/TLS implementations C Chen, W Diao, Y Zeng, S Guo, C Hu 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 15 | 2018 |
Identity-based broadcast encryption scheme with untrusted PKG S Guo, C Zhang 2008 The 9th International Conference for Young Computer Scientists, 1613-1618, 2008 | 15 | 2008 |
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage C Hu, Y Xu, P Liu, J Yu, S Guo, M Zhao Information Sciences 520, 15-30, 2020 | 14 | 2020 |
Application of string kernel based support vector machine for malware packer identification T Ban, R Isawa, S Guo, D Inoue, K Nakao The 2013 International Joint Conference on Neural Networks (IJCNN), 1-8, 2013 | 14 | 2013 |