Zhanyong Tang
Zhanyong Tang
Northwest University, Xi'an, China
Verified email at nwu.edu.cn
Cited by
Cited by
Cracking Android pattern lock in five attempts
G Ye, Z Tang, D Fang, X Chen, KI Kim, B Taylor, Z Wang
Proceedings of the 2017 Network and Distributed System Security Symposium …, 2017
Yet another text captcha solver: A generative adversarial network based approach
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, Z Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
CrossSense: towards cross-site and large-scale WiFi sensing
J Zhang, Z Tang, M Li, D Fang, PT Nurmi, Z Wang
The 24th ACM International Conference on Mobile Computing and Networking …, 2018
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas
L Chang, X Chen, Y Wang, D Fang, J Wang, T Xing, Z Tang
IEEE/ACM Transactions on Networking 25 (4), 1994-2007, 2017
Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality
J Zhang, X Zheng, Z Tang, T Xing, X Chen, D Fang, R Li, X Gong, F Chen
Mobile Information Systems 2016, 2016
Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes
Z Tang, Y Zhao, L Yang, S Qi, D Fang, X Chen, X Gong, Z Wang
Mobile Information Systems 2017, 2017
A video-based attack for android pattern lock
G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
K Kuang, Z Tang, X Gong, D Fang, X Chen, Z Wang
Computers & Security 74, 202-220, 2018
SmartMTra: Robust indoor trajectory tracing using smartphones
P Zhang, X Chen, X Ma, Y Wu, H Jiang, D Fang, Z Tang, Y Ma
IEEE Sensors Journal 17 (12), 3613-3624, 2017
SleepGuard: Capturing rich sleep information using smartwatch sensing data
L Chang, J Lu, J Wang, X Chen, D Fang, Z Tang, P Nurmi, Z Wang
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
WideSee: Towards wide-area contactless wireless sensing
L Chen, J Xiong, X Chen, SI Lee, K Chen, D Han, D Fang, Z Tang, ...
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 258-270, 2019
Evaluation of code obfuscating transformation
YJ Zhao, ZY Tang, N Wang, DY Fang, YX Gu
Ruanjian Xuebao/Journal of Software 23 (3), 700-711, 2012
Exploiting dynamic scheduling for VM-based code obfuscation
K Kuang, Z Tang, X Gong, D Fang, X Chen, T Xing, G Ye, J Zhang, ...
2016 IEEE Trustcom/BigDataSE/ISPA, 489-496, 2016
Method to evaluate software protection based on attack modeling
H Wang, D Fang, N Wang, Z Tang, F Chen, Y Gu
2013 IEEE 10th International Conference on High Performance Computing and …, 2013
Tagtag: material sensing with commodity RFID
B Xie, J Xiong, X Chen, E Chai, L Li, Z Tang, D Fang
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 338-350, 2019
RF-copybook: A millimeter level calligraphy copybook based on commodity RFID
L Chang, J Xiong, J Wang, X Chen, Y Wang, Z Tang, D Fang
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
Appis: Protect android apps against runtime repackaging attacks
L Song, Z Tang, Z Li, X Gong, X Chen, D Fang, Z Wang
2017 IEEE 23rd International Conference on Parallel and Distributed Systems …, 2017
Evaluating brush movements for Chinese calligraphy: a computer vision based approach
P Xu, L Wang, Z Guan, X Zheng, X Chen, Z Tang, D Fang, X Gong, ...
27th International Joint Conference on Artificial Intelligence, IJCAI 2018 …, 2018
Coverage hole detection and recovery in wireless sensor networks based on RSSI-based localization
S Zhai, Z Tang, D Wang, Z Li, X Chen, D Fang, F Chen
2017 IEEE international conference on computational science and engineering …, 2017
FALE: Fine-grained device free localization that can adaptively work in different areas with little effort
L Chang, X Chen, D Fang, J Wang, T Xing, C Liu, Z Tang
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20