Zhanyong Tang
Zhanyong Tang
Northwest University, Xi'an, China
Verified email at
Cited by
Cited by
CrossSense: towards cross-site and large-scale WiFi sensing
J Zhang, Z Tang, M Li, D Fang, PT Nurmi, Z Wang
The 24th ACM International Conference on Mobile Computing and Networking …, 2018
Cracking android pattern lock in five attempts
G Ye, Z Tang, D Fang, X Chen, KI Kim, B Taylor, Z Wang
Proceedings of the 2017 Network and Distributed System Security Symposium …, 2017
Yet another text captcha solver: A generative adversarial network based approach
G Ye, Z Tang, D Fang, Z Zhu, Y Feng, P Xu, X Chen, Z Wang
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas
L Chang, X Chen, Y Wang, D Fang, J Wang, T Xing, Z Tang
IEEE/ACM Transactions on Networking 25 (4), 1994-2007, 2017
Privacy leakage in mobile sensing: Your unlock passwords can be leaked through wireless hotspot functionality
J Zhang, X Zheng, Z Tang, T Xing, X Chen, D Fang, R Li, X Gong, F Chen
Mobile Information Systems 2016, 2016
Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes
Z Tang, Y Zhao, L Yang, S Qi, D Fang, X Chen, X Gong, Z Wang
Mobile Information Systems 2017, 2017
Combining graph-based learning with automated data collection for code vulnerability detection
H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ...
IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020
Tagtag: material sensing with commodity rfid
B Xie, J Xiong, X Chen, E Chai, L Li, Z Tang, D Fang
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 338-350, 2019
WideSee: Towards wide-area contactless wireless sensing
L Chen, J Xiong, X Chen, SI Lee, K Chen, D Han, D Fang, Z Tang, ...
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 258-270, 2019
A video-based attack for android pattern lock
G Ye, Z Tang, D Fang, X Chen, W Wolff, AJ Aviv, Z Wang
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-31, 2018
SleepGuard: Capturing rich sleep information using smartwatch sensing data
L Chang, J Lu, J Wang, X Chen, D Fang, Z Tang, P Nurmi, Z Wang
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
SmartMTra: Robust indoor trajectory tracing using smartphones
P Zhang, X Chen, X Ma, Y Wu, H Jiang, D Fang, Z Tang, Y Ma
IEEE Sensors Journal 17 (12), 3613-3624, 2017
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
K Kuang, Z Tang, X Gong, D Fang, X Chen, Z Wang
Computers & Security 74, 202-220, 2018
AppIS: protect android apps against runtime repackaging attacks
L Song, Z Tang, Z Li, X Gong, X Chen, D Fang, Z Wang
2017 IEEE 23rd International Conference on Parallel and Distributed Systems …, 2017
Deep program structure modeling through multi-relational graph-based learning
G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang
Proceedings of the ACM international conference on parallel architectures …, 2020
Wimi: Target material identification with commodity wi-fi devices
C Feng, J Xiong, L Chang, J Wang, X Chen, D Fang, Z Tang
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
Evaluation of code obfuscating transformation
YJ Zhao, ZY Tang, N Wang, DY Fang, YX Gu
Ruanjian Xuebao/Journal of Software 23 (3), 700-711, 2012
RF-copybook: A millimeter level calligraphy copybook based on commodity RFID
L Chang, J Xiong, J Wang, X Chen, Y Wang, Z Tang, D Fang
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
Evaluating brush movements for Chinese calligraphy: a computer vision based approach
P Xu, L Wang, Z Guan, X Zheng, X Chen, Z Tang, D Fang, X Gong, ...
27th International Joint Conference on Artificial Intelligence, IJCAI 2018 …, 2018
Coverage hole detection and recovery in wireless sensor networks based on RSSI-based localization
S Zhai, Z Tang, D Wang, Z Li, X Chen, D Fang, F Chen
2017 IEEE international conference on computational science and engineering …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20