PowerLSTM: power demand forecasting using long short-term memory neural network Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu International Conference on Advanced Data Mining and Applications, 727-740, 2017 | 76 | 2017 |
A scalable and extensible framework for android malware detection and family attribution L Zhang, VLL Thing, Y Cheng Computers & Security 80, 120-133, 2019 | 60 | 2019 |
A survey of Android exploits in the wild H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang Computers & Security 76, 71-91, 2018 | 49 | 2018 |
Secure smart metering based on LoRa technology Y Cheng, H Saputra, LM Goh, Y Wu 2018 IEEE 4th International Conference on Identity, Security, and Behavior …, 2018 | 46 | 2018 |
Bind your phone number with caution: automated user profiling through address book matching on smartphone Y Cheng, L Ying, S Jiao, P Su, D Feng Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 29 | 2013 |
NeuronFair: interpretable white-box fairness testing through biased neuron identification H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen Proceedings of the 44th International Conference on Software Engineering …, 2022 | 25 | 2022 |
Designing leakage-resilient password entry on head-mounted smart wearable glass devices Y Li, Y Cheng, W Meng, Y Li, RH Deng IEEE Transactions on Information Forensics and Security 16, 307-321, 2020 | 23 | 2020 |
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing D Mashima, A Serikova, Y Cheng, B Chen ICT Express 4 (1), 35-41, 2018 | 21 | 2018 |
Understanding real-world threats to deep learning models in Android apps Z Deng, K Chen, G Meng, X Zhang, K Xu, Y Cheng Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 19 | 2022 |
SCLib: A practical and lightweight defense against component hijacking in Android applications D Wu, Y Cheng, D Gao, Y Li, RH Deng Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 19 | 2018 |
Attacks and defence on android free floating windows L Ying, Y Cheng, Y Lu, Y Gu, P Su, D Feng Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 19 | 2016 |
User-friendly deniable storage for mobile devices B Chang, Y Cheng, B Chen, F Zhang, WT Zhu, Y Li, Z Wang computers & security 72, 163-174, 2018 | 17 | 2018 |
A rapid and scalable method for android application repackaging detection S Jiao, Y Cheng, L Ying, P Su, D Feng International Conference on Information Security Practice and Experience …, 2015 | 15 | 2015 |
Attack and countermeasure on interlock-based device pairing schemes Y Wu, B Chen, Z Zhao, Y Cheng IEEE Transactions on Information Forensics and Security 13 (3), 745-757, 2017 | 10 | 2017 |
DeepMnemonic: Password mnemonic generation via deep attentive encoder-decoder model Y Cheng, C Xu, Z Hai, Y Li IEEE Transactions on Dependable and Secure Computing 19 (1), 77-90, 2020 | 9 | 2020 |
Exploiting android system services through bypassing service helpers Y Gu, Y Cheng, L Ying, Y Lu, Q Li, P Su International Conference on Security and Privacy in Communication Systems, 44-62, 2016 | 8 | 2016 |
PowerNet: a smart energy forecasting architecture based on neural networks Y Cheng, C Xu, D Mashima, PP Biswas, G Chipurupalli, B Zhou, Y Wu IET Smart Cities 2 (4), 199-207, 2020 | 7 | 2020 |
What you see is not what you get: Leakage-resilient password entry schemes for smart glasses Y Li, Y Cheng, Y Li, RH Deng Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 6 | 2017 |
An anti-obfuscation method for detecting similarity among Android applications in large scale S Jiao, L Ying, Y Yang J. Compu. Res. Dev. 51 (7), 1446-1457, 2014 | 6 | 2014 |
PowerNet: Neural Power Demand Forecasting in Smart Grid Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu arXiv preprint arXiv:1904.11979, 2019 | 4 | 2019 |