Follow
Shanqing Guo
Shanqing Guo
Unknown affiliation
Verified email at sdu.edu.cn
Title
Cited by
Cited by
Year
Random-walk based approach to detect clone attacks in wireless sensor networks
Y Zeng, J Cao, S Zhang, S Guo, L Xie
IEEE Journal on selected areas in communications 28 (5), 677-691, 2010
1832010
How to prove your model belongs to you: A blind-watermark based framework to protect intellectual property of DNN
Z Li, C Hu, Y Zhang, S Guo
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
1652019
Label inference attacks against vertical federated learning
C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang
31st USENIX security symposium (USENIX Security 22), 1397-1414, 2022
1412022
Attribute-based re-encryption scheme in the standard model
S Guo, Y Zeng, J Wei, Q Xu
Wuhan University Journal of Natural Sciences 13 (5), 621-625, 2008
442008
Windranger: A directed greybox fuzzer driven by deviation basic blocks
Z Du, Y Li, Y Liu, B Mao
Proceedings of the 44th International Conference on Software Engineering …, 2022
392022
A study on association rule mining of darknet big data
T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang
2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015
382015
{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices
L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
352019
Integration of multi-modal features for android malware detection using linear SVM
T Ban, T Takahashi, S Guo, D Inoue, K Nakao
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016
302016
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps
C Zuo, J Wu, S Guo
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
302015
Linear unsupervised hashing for ANN search in Euclidean space
J Wang, XS Xu, S Guo, L Cui, XL Wang
Neurocomputing 171, 283-292, 2016
282016
Supervised robust discrete multimodal hashing for cross-media retrieval
TK Yan, XS Xu, S Guo, Z Huang, XL Wang
Proceedings of the 25th ACM international on conference on information and …, 2016
272016
Paddyfrog: systematically detecting confused deputy vulnerability in android applications
J Wu, T Cui, T Ban, S Guo, L Cui
Security and Communication Networks 8 (13), 2338-2349, 2015
262015
Seeing is living? rethinking the security of facial liveness verification in the deepfake era
C Li, L Wang, S Ji, X Zhang, Z Xi, S Guo, T Wang
31st USENIX Security Symposium (USENIX Security 22), 2673-2690, 2022
242022
An empirical study of potentially malicious third-party libraries in android apps
Z Zhang, W Diao, C Hu, S Guo, C Zuo, L Li
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
242020
SWCA: A secure weighted clustering algorithm in wireless ad hoc networks
Y Zeng, J Cao, S Guo, K Yang, L Xie
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
242009
G-means: a clustering algorithm for intrusion detection
Z Zhao, S Guo, Q Xu, T Ban
International Conference on Neural Information Processing, 563-570, 2008
242008
An intrusion detection model based on improved random forests algorithm
郭山清, 高丛, 姚建, 谢立
Journal of software 16 (8), 1490-1498, 2005
232005
Android custom permissions demystified: From privilege escalation to design shortcomings
R Li, W Diao, Z Li, J Du, S Guo
2021 IEEE Symposium on Security and Privacy (SP), 70-86, 2021
222021
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
222015
Multifuzz: A coverage-based multiparty-protocol fuzzer for iot publish/subscribe protocols
Y Zeng, M Lin, S Guo, Y Shen, T Cui, T Wu, Q Zheng, Q Wang
Sensors 20 (18), 5194, 2020
212020
The system can't perform the operation now. Try again later.
Articles 1–20