Towards analyzing the input validation vulnerabilities associated with android system services C Cao, N Gao, P Liu, J Xiang Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 63 | 2015 |
SSteGAN: self-learning steganography based on generative adversarial networks Z Wang, N Gao, X Wang, X Qu, L Li Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018 | 43 | 2018 |
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 38 | 2017 |
Transgate: knowledge graph embedding with shared gate structure J Yuan, N Gao, J Xiang Proceedings of the AAAI conference on artificial intelligence 33 (01), 3100-3107, 2019 | 28 | 2019 |
STNet: A style transformation network for deep image steganography Z Wang, N Gao, X Wang, J Xiang, G Liu Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019 | 25 | 2019 |
Remotely wiping sensitive data on stolen smartphones X Yu, Z Wang, K Sun, WT Zhu, N Gao, J Jing Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 24 | 2014 |
A data-mining based DoS detection technique. N Gao, DG Feng, J Xiang Jisuanji Xuebao(Chinese Journal of Computers) 29 (6), 944-951, 2006 | 24 | 2006 |
HidingGAN: High capacity information hiding with generative adversarial network Z Wang, N Gao, X Wang, J Xiang, D Zha, L Li Computer Graphics Forum 38 (7), 393-401, 2019 | 22 | 2019 |
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang arXiv preprint arXiv:1706.05779, 2017 | 19 | 2017 |
CryptMe: Data leakage prevention for unmodified programs on ARM devices C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 17 | 2018 |
ARECA: a highly attack resilient certification authority J Jing, P Liu, D Feng, J Xiang, N Gao, J Lin Proceedings of the 2003 ACM workshop on Survivable and self-regenerative …, 2003 | 16 | 2003 |
Tainting-assisted and context-migrated symbolic execution of android framework for vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu IEEE Transactions on Mobile Computing 19 (12), 2946-2964, 2019 | 14 | 2019 |
DCAR: Deep collaborative autoencoder for recommendation with implicit feedback J Wang, N Gao, J Peng, J Mo Artificial Neural Networks and Machine Learning–ICANN 2019: Text and Time …, 2019 | 14 | 2019 |
Novel mitm attacks on security protocols in sdn: A feasibility study X Wang, N Gao, L Zhang, Z Liu, L Wang Information and Communications Security: 18th International Conference …, 2016 | 14 | 2016 |
HREC: heterogeneous graph embedding-based personalized point-of-interest recommendation Y Su, X Li, D Zha, W Tang, Y Jiang, J Xiang, N Gao Neural Information Processing: 26th International Conference, ICONIP 2019 …, 2019 | 13 | 2019 |
RIKE+: Using revocable identities to support key escrow in public key infrastructures with flexibility J Lin, WT Zhu, Q Wang, N Zhang, J Jing, N Gao IET Information Security 9 (2), 136-147, 2015 | 11 | 2015 |
Fgcrec: Fine-grained geographical characteristics modeling for point-of-interest recommendation Y Su, X Li, B Liu, D Zha, J Xiang, W Tang, N Gao ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 10 | 2020 |
Protecting data privacy in federated learning combining differential privacy and weak encryption C Wang, C Ma, M Li, N Gao, Y Zhang, Z Shen Science of Cyber Security: Third International Conference, SciSec 2021 …, 2021 | 9 | 2021 |
Cnn-based chinese character recognition with skeleton feature W Tang, Y Su, X Li, D Zha, W Jiang, N Gao, J Xiang Neural Information Processing: 25th International Conference, ICONIP 2018 …, 2018 | 9 | 2018 |
Personalized point-of-interest recommendation on ranking with poisson factorization Y Su, X Li, W Tang, D Zha, J Xiang, N Gao 2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019 | 7 | 2019 |