Follow
Shanqing Guo
Shanqing Guo
Unknown affiliation
Verified email at sdu.edu.cn
Title
Cited by
Cited by
Year
Random-walk based approach to detect clone attacks in wireless sensor networks
Y Zeng, J Cao, S Zhang, S Guo, L Xie
IEEE Journal on selected areas in communications 28 (5), 677-691, 2010
1832010
How to prove your model belongs to you: A blind-watermark based framework to protect intellectual property of DNN
Z Li, C Hu, Y Zhang, S Guo
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
1652019
Label inference attacks against vertical federated learning
C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang
31st USENIX security symposium (USENIX Security 22), 1397-1414, 2022
1412022
Attribute-based re-encryption scheme in the standard model
S Guo, Y Zeng, J Wei, Q Xu
Wuhan University Journal of Natural Sciences 13 (5), 621-625, 2008
442008
Windranger: A directed greybox fuzzer driven by deviation basic blocks
Z Du, Y Li, Y Liu, B Mao
Proceedings of the 44th International Conference on Software Engineering …, 2022
392022
A study on association rule mining of darknet big data
T Ban, M Eto, S Guo, D Inoue, K Nakao, R Huang
2015 International Joint Conference on Neural Networks (IJCNN), 1-7, 2015
382015
{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices
L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
352019
Integration of multi-modal features for android malware detection using linear SVM
T Ban, T Takahashi, S Guo, D Inoue, K Nakao
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 141-146, 2016
302016
Automatically detecting ssl error-handling vulnerabilities in hybrid mobile web apps
C Zuo, J Wu, S Guo
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
302015
Linear unsupervised hashing for ANN search in Euclidean space
J Wang, XS Xu, S Guo, L Cui, XL Wang
Neurocomputing 171, 283-292, 2016
282016
Supervised robust discrete multimodal hashing for cross-media retrieval
TK Yan, XS Xu, S Guo, Z Huang, XL Wang
Proceedings of the 25th ACM international on conference on information and …, 2016
272016
Paddyfrog: systematically detecting confused deputy vulnerability in android applications
J Wu, T Cui, T Ban, S Guo, L Cui
Security and Communication Networks 8 (13), 2338-2349, 2015
262015
SWCA: A secure weighted clustering algorithm in wireless ad hoc networks
Y Zeng, J Cao, S Guo, K Yang, L Xie
2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009
242009
G-means: a clustering algorithm for intrusion detection
Z Zhao, S Guo, Q Xu, T Ban
International Conference on Neural Information Processing, 563-570, 2008
242008
Seeing is living? rethinking the security of facial liveness verification in the deepfake era
C Li, L Wang, S Ji, X Zhang, Z Xi, S Guo, T Wang
31st USENIX Security Symposium (USENIX Security 22), 2673-2690, 2022
232022
An empirical study of potentially malicious third-party libraries in android apps
Z Zhang, W Diao, C Hu, S Guo, C Zuo, L Li
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
232020
An intrusion detection model based on improved random forests algorithm
郭山清, 高丛, 姚建, 谢立
Journal of software 16 (8), 1490-1498, 2005
232005
Android custom permissions demystified: From privilege escalation to design shortcomings
R Li, W Diao, Z Li, J Du, S Guo
2021 IEEE Symposium on Security and Privacy (SP), 70-86, 2021
222021
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android
G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo
2015 20th International Conference on Engineering of Complex Computer …, 2015
222015
Multifuzz: A coverage-based multiparty-protocol fuzzer for iot publish/subscribe protocols
Y Zeng, M Lin, S Guo, Y Shen, T Cui, T Wu, Q Zheng, Q Wang
Sensors 20 (18), 5194, 2020
212020
The system can't perform the operation now. Try again later.
Articles 1–20