Follow
Yao Cheng
Title
Cited by
Cited by
Year
PowerLSTM: power demand forecasting using long short-term memory neural network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
International Conference on Advanced Data Mining and Applications, 727-740, 2017
762017
A scalable and extensible framework for android malware detection and family attribution
L Zhang, VLL Thing, Y Cheng
Computers & Security 80, 120-133, 2019
602019
A survey of Android exploits in the wild
H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang
Computers & Security 76, 71-91, 2018
492018
Secure smart metering based on LoRa technology
Y Cheng, H Saputra, LM Goh, Y Wu
2018 IEEE 4th International Conference on Identity, Security, and Behavior …, 2018
462018
Bind your phone number with caution: automated user profiling through address book matching on smartphone
Y Cheng, L Ying, S Jiao, P Su, D Feng
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
292013
NeuronFair: interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen
Proceedings of the 44th International Conference on Software Engineering …, 2022
252022
Designing leakage-resilient password entry on head-mounted smart wearable glass devices
Y Li, Y Cheng, W Meng, Y Li, RH Deng
IEEE Transactions on Information Forensics and Security 16, 307-321, 2020
232020
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing
D Mashima, A Serikova, Y Cheng, B Chen
ICT Express 4 (1), 35-41, 2018
212018
Understanding real-world threats to deep learning models in Android apps
Z Deng, K Chen, G Meng, X Zhang, K Xu, Y Cheng
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
192022
SCLib: A practical and lightweight defense against component hijacking in Android applications
D Wu, Y Cheng, D Gao, Y Li, RH Deng
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
192018
Attacks and defence on android free floating windows
L Ying, Y Cheng, Y Lu, Y Gu, P Su, D Feng
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
192016
User-friendly deniable storage for mobile devices
B Chang, Y Cheng, B Chen, F Zhang, WT Zhu, Y Li, Z Wang
computers & security 72, 163-174, 2018
172018
A rapid and scalable method for android application repackaging detection
S Jiao, Y Cheng, L Ying, P Su, D Feng
International Conference on Information Security Practice and Experience …, 2015
152015
Attack and countermeasure on interlock-based device pairing schemes
Y Wu, B Chen, Z Zhao, Y Cheng
IEEE Transactions on Information Forensics and Security 13 (3), 745-757, 2017
102017
DeepMnemonic: Password mnemonic generation via deep attentive encoder-decoder model
Y Cheng, C Xu, Z Hai, Y Li
IEEE Transactions on Dependable and Secure Computing 19 (1), 77-90, 2020
92020
Exploiting android system services through bypassing service helpers
Y Gu, Y Cheng, L Ying, Y Lu, Q Li, P Su
International Conference on Security and Privacy in Communication Systems, 44-62, 2016
82016
PowerNet: a smart energy forecasting architecture based on neural networks
Y Cheng, C Xu, D Mashima, PP Biswas, G Chipurupalli, B Zhou, Y Wu
IET Smart Cities 2 (4), 199-207, 2020
72020
What you see is not what you get: Leakage-resilient password entry schemes for smart glasses
Y Li, Y Cheng, Y Li, RH Deng
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
62017
An anti-obfuscation method for detecting similarity among Android applications in large scale
S Jiao, L Ying, Y Yang
J. Compu. Res. Dev. 51 (7), 1446-1457, 2014
62014
PowerNet: Neural Power Demand Forecasting in Smart Grid
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
arXiv preprint arXiv:1904.11979, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20