default search action
Yuanzhang Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Networks 245: 110376 (2024) - [j64]Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yu-an Tan, Yuanzhang Li:
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module. Comput. Secur. 146: 104038 (2024) - [j63]Yuanzhang Li, Tianchi Sha, Thar Baker, Xiao Yu, Zhiwei Shi, Sikang Hu:
Adaptive vertical federated learning via feature map transferring in mobile edge computing. Computing 106(4): 1081-1097 (2024) - [j62]Yuexuan Ma, Xiao Yu, Li Zhang, Zhao Li, Yuanzhang Li, Yu-an Tan:
Dynamic fuzz testing of UAV configuration parameters based on dual guidance of fitness and coverage. Connect. Sci. 36(1) (2024) - [j61]Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, Yuanzhang Li:
Bypassing software-based remote attestation using debug registers. Connect. Sci. 36(1) (2024) - [j60]Yi Sun, Jun Zheng, Hanyu Zhao, Huipeng Zhou, Jiaxing Li, Fan Li, Zehui Xiong, Jun Liu, Yuanzhang Li:
Modifying the one-hot encoding technique can enhance the adversarial robustness of the visual model for symbol recognition. Expert Syst. Appl. 250: 123751 (2024) - [j59]Chen Liang, Guoyu Wang, Ning Li, Zuo Wang, Weihong Zeng, Fu-an Xiao, Yu-An Tan, Yuanzhang Li:
Accelerating page loads via streamlining JavaScript engine for distributed learning. Inf. Sci. 675: 120713 (2024) - [j58]Tian Chen, Yu-An Tan, Zheng Zhang, Nan Luo, Bin Li, Yuanzhang Li:
Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators. J. Parallel Distributed Comput. 189: 104869 (2024) - [j57]Jie Yang, Thar Baker, Sukhpal Singh Gill, Xiaochuan Yang, Weifeng Han, Yuanzhang Li:
A federated learning attack method based on edge collaboration via cloud. Softw. Pract. Exp. 54(7): 1257-1274 (2024) - [j56]Huipeng Zhou, Yajie Wang, Yu-an Tan, Shangbo Wu, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding. IEEE Trans. Artif. Intell. 5(1): 412-419 (2024) - [c34]Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li:
Towards Transferable Adversarial Attacks with Centralized Perturbation. AAAI 2024: 6109-6116 - [c33]Yanqiu Zhang, Xiao Yu, Jinzhao Liu, Li Zhang, Yuanzhang Li, Yuan Tan:
CCE&D: A Configuration Failure Prevention Method for Autonomous Driving Systems. ACISP (3) 2024: 288-302 - 2023
- [j55]Jingjing Hu, Xiaojun Xu, Jin Hao, Xiuqi Yang, Kefan Qiu, Yuanzhang Li:
Microservice combination optimisation based on improved gray wolf algorithm. Connect. Sci. 35(1) (2023) - [j54]Shengang Hao, Jun Zheng, Jie Yang, Haipeng Sun, Quanxin Zhang, Li Zhang, Nan Jiang, Yuanzhang Li:
Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering. Inf. Sci. 634: 85-100 (2023) - [j53]Yaoyuan Zhang, Yu-an Tan, Haipeng Sun, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Improving the invisibility of adversarial examples with perceptually adaptive perturbation. Inf. Sci. 635: 126-137 (2023) - [j52]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Dianxin Wang, Quanxin Zhang, Yuanzhang Li:
Towards interpreting vulnerability of object detection models via adversarial distillation. J. Inf. Secur. Appl. 72: 103410 (2023) - [j51]Yajie Wang, Kongyang Chen, Yu-an Tan, Shuxin Huang, Wencong Ma, Yuanzhang Li:
Stealthy and Flexible Trojan in Deep Learning Framework. IEEE Trans. Dependable Secur. Comput. 20(3): 1789-1798 (2023) - [j50]Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu, Yuanzhang Li:
Membership Inference Attacks Against Deep Learning Models via Logits Distribution. IEEE Trans. Dependable Secur. Comput. 20(5): 3799-3808 (2023) - [j49]Chen Liang, Thar Baker, Yuanzhang Li, Raheel Nawaz, Yu-an Tan:
Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification. IEEE Trans. Intell. Transp. Syst. 24(2): 2578-2595 (2023) - [c32]Haochen Wang, Tianshi Mu, Guocong Feng, ShangBo Wu, Yuanzhang Li:
DFaP: Data Filtering and Purification Against Backdoor Attacks. AIS&P (1) 2023: 81-97 - [c31]Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, Yuanzhang Li:
DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication. BlockTEA 2023: 23-40 - [c30]Yuexuan Ma, Xiao Yu, Yuanzhang Li, Li Zhang, Yifei Yan, Yu-an Tan:
Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm. BlockTEA 2023: 41-56 - [c29]Xiao Yu, Zhao Li, Xu Qiao, Yu-an Tan, Yuanzhang Li, Li Zhang:
A Stealth Security Hardening Method Based on SSD Firmware Function Extension. ICONIP (9) 2023: 362-375 - [c28]Yujie Ma, Haokai Wu, Yu-an Tan, Yuanzhang Li:
Research on Evasion and Detection of Malicious JavaScript Code. ML4CS 2023: 104-130 - [i7]Xinrui Liu, Yu-an Tan, Yajie Wang, Kefan Qiu, Yuanzhang Li:
Stealthy Low-frequency Backdoor Attack against Deep Neural Networks. CoRR abs/2305.09677 (2023) - [i6]Xinrui Liu, Yajie Wang, Yu-An Tan, Kefan Qiu, Yuanzhang Li:
Towards Invisible Backdoor Attacks in the Frequency Domain against Deep Neural Networks. CoRR abs/2305.10596 (2023) - [i5]Ruinan Ma, Yu-an Tan, Shangbo Wu, Tian Chen, Yajie Wang, Yuanzhang Li:
Unified High-binding Watermark for Unconditional Image Generation Models. CoRR abs/2310.09479 (2023) - [i4]Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li:
Towards Transferable Adversarial Attacks with Centralized Perturbation. CoRR abs/2312.06199 (2023) - 2022
- [j48]Jiamin Zheng, Shupan Li, Shengang Hao, Yuanzhang Li, Yu Zhang:
ZM-CTC: Covert timing channel construction method based on zigzag matrix. Comput. Commun. 182: 212-222 (2022) - [j47]Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Yuanzhang Li, Shangbo Wu:
A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios. Int. J. Intell. Syst. 37(3): 2543-2566 (2022) - [j46]Yuanzhang Li, Xinxin Wang, Zhiwei Shi, Ruyun Zhang, Jingfeng Xue, Zhi Wang:
Boosting training for PDF malware classifier via active learning. Int. J. Intell. Syst. 37(4): 2803-2821 (2022) - [j45]Yuanzhang Li, Junli Liu, Xinting Xu, Xiaosong Zhang, Zhang Li, Quanxin Zhang:
A robust packet-dropping covert channel for mobile intelligent terminals. Int. J. Intell. Syst. 37(10): 6928-6950 (2022) - [j44]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Tian Chen, Yuanzhang Li, Quanxin Zhang:
Boosting cross-task adversarial attack with random blur. Int. J. Intell. Syst. 37(10): 8139-8154 (2022) - [j43]Jie Yang, Jun Zheng, Zheng Zhang, Q. I. Chen, Duncan S. Wong, Yuanzhang Li:
Security of federated learning for cloud-edge intelligence collaborative computing. Int. J. Intell. Syst. 37(11): 9290-9308 (2022) - [j42]Yajie Wang, Yu-an Tan, Haoran Lyu, Shangbo Wu, Yuhang Zhao, Yuanzhang Li:
Toward feature space adversarial attack in the frequency domain. Int. J. Intell. Syst. 37(12): 11019-11036 (2022) - [j41]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture. Int. J. Intell. Syst. 37(12): 11167-11187 (2022) - [j40]Chen Liang, Kefan Qiu, Zheng Zhang, Jie Yang, Yuanzhang Li, Jingjing Hu:
Towards robust and stealthy communication for wireless intelligent terminals. Int. J. Intell. Syst. 37(12): 11791-11814 (2022) - [j39]Thar Baker, Chen Liang, Yuanzhang Li:
A Reliable Covert Channel for Stealthy Data Transmission for Internet-of-Underwater-Things. IEEE Internet Things Mag. 5(4): 42-46 (2022) - [j38]Yuxi Ma, Meng Shen, Nan Zhang, Xiaoyao Tong, Yuanzhang Li:
OM-TCN: A dynamic and agile opponent modeling approach for competitive games. Inf. Sci. 615: 405-414 (2022) - [c27]Yidan Xu, Juan Wang, Yuanzhang Li, Yajie Wang, Zixuan Xu, Dianxin Wang:
Universal Physical Adversarial Attack via Background Image. ACNS Workshops 2022: 3-14 - [c26]Yaoyuan Zhang, Yu-an Tan, Mingfeng Lu, Lu Liu, Quanxin Zhang, Yuanzhang Li, Dianxin Wang:
Towards Interpreting Vulnerability of Object Detection Models via Adversarial Distillation. ACNS Workshops 2022: 53-65 - [c25]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture. ACNS Workshops 2022: 104-123 - [c24]Yaoyuan Zhang, Yu-an Tan, Tian Chen, Xinrui Liu, Quanxin Zhang, Yuanzhang Li:
Enhancing the Transferability of Adversarial Examples with Random Patch. IJCAI 2022: 1672-1678 - [i3]Huipeng Zhou, Yu-an Tan, Yajie Wang, Haoran Lyu, Shangbo Wu, Yuanzhang Li:
Improving the Transferability of Adversarial Examples with Restructure Embedded Patches. CoRR abs/2204.12680 (2022) - [i2]Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan:
l-Leaks: Membership Inference Attacks with Logits. CoRR abs/2205.06469 (2022) - [i1]Nan Luo, Yuanzhang Li, Yajie Wang, Shangbo Wu, Yu-An Tan, Quanxin Zhang:
Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers. CoRR abs/2206.04881 (2022) - 2021
- [j37]Nan Zhang, Yu-an Tan, Chen Yang, Yuanzhang Li:
Deep learning feature exploration for Android malware detection. Appl. Soft Comput. 102: 107069 (2021) - [j36]Yusong Tan, Baozi Chen, Liehuang Zhu, Qingbo Wu, Peng Zou, Yuanzhang Li:
On-demand cut off the covert channel to mitigate meltdown. Sci. China Inf. Sci. 64(9) (2021) - [j35]Yuanzhang Li, Shangjun Yao, Ruyun Zhang, Chen Yang:
Analyzing host security using D-S evidence theory and multisource information fusion. Int. J. Intell. Syst. 36(2): 1053-1068 (2021) - [j34]Quanxin Zhang, Mengyan Zhu, Chen Liang, Kunqing Wang, Kai Yang, Yuanzhang Li:
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis. Mob. Networks Appl. 26(4): 1493-1502 (2021) - [j33]Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu:
An Efficient Bounded Model Checking Approach for Web Service Composition. Mob. Networks Appl. 26(4): 1503-1513 (2021) - [c23]Xinrui Liu, Xiao Yu, Zhibin Zhang, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
A Random Multi-target Backdooring Attack on Deep Neural Networks. DMBD (2) 2021: 45-52 - [c22]Zhao Li, Yuxi Ma, Zhibin Zhang, Xiao Yu, Quanxin Zhang, Yuanzhang Li:
Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles. DMBD (2) 2021: 53-60 - [c21]Xiaoyao Tong, Yuxi Ma, Yuan Xue, Quanxin Zhang, Yuanzhang Li, Yu-an Tan:
Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning. DMBD (2) 2021: 61-68 - [c20]Falin Hou, Xiao Yu, Kefan Qiu, Junli Liu, Zhiwei Shi, Yuanzhang Li:
Research on Off-Path Exploits of Network Protocols. DMBD (1) 2021: 73-80 - [c19]Zhibin Zhang, Xiaosong Zhang, Yuan Xue, Yuanzhang Li:
Building a Covert Timing Channel over VoIP via Packet Length. DMBD (1) 2021: 81-88 - [c18]Yujie Ma, Yuanzhang Li, Zhibin Zhang, Ruyun Zhang, Lu Liu, Xiaosong Zhang:
A Classic Multi-method Collaborative Obfuscation Strategy. DMBD (2) 2021: 90-97 - [c17]Zhiwei Shi, Tian Chen, Yuan Xue, Yuanzhang Li, Quanxin Zhang, Yu-an Tan, Jingjing Hu:
Code Decoupling Execution Isolating Based on TF Card Firmware Extension. DSC 2021: 403-408 - [c16]Haitao Zhang, Yucheng Shi, Benyu Dong, Yahong Han, Yuanzhang Li, Xiaohui Kuang:
Free Adversarial Training with Layerwise Heuristic Learning. ICIG (2) 2021: 120-131 - [c15]Zixuan Xu, Jingci Zhang, Shang Ai, Chen Liang, Lu Liu, Yuanzhang Li:
Offensive and Defensive Countermeasure Technology of Return-Oriented Programming. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 224-228 - 2020
- [j32]Shupan Li, Limin Xiao, Chungang Shi, Liequan Che, Changyou Zhang, Yuanzhang Li:
Boosting performance of virtualized desktop infrastructure with physical GPU and SPICE. Sci. China Inf. Sci. 63(7) (2020) - [j31]Zhitao Guan, Xueyan Liu, Longfei Wu, Jun Wu, Ruzhi Xu, Jinhu Zhang, Yuanzhang Li:
Cross-lingual multi-keyword rank search with semantic extension over encrypted data. Inf. Sci. 514: 523-540 (2020) - [j30]Yuanzhang Li, Yaxiao Wang, Ye Wang, Lishan Ke, Yu-an Tan:
A feature-vector generative adversarial network for evading PDF malware classifiers. Inf. Sci. 523: 38-48 (2020) - [j29]Yu-an Tan, Shuo Feng, Xiaochun Cheng, Yuanzhang Li, Jun Zheng:
An Android Inline Hooking Framework for the Securing Transmitted Data. Sensors 20(15): 4201 (2020) - [j28]Yuanzhang Li, Xiaosong Zhang, Xinting Xu, Yu-an Tan:
A Robust Packet-Dropout Covert Channel over Wireless Networks. IEEE Wirel. Commun. 27(3): 60-65 (2020) - [c14]Xiaosong Zhang, Ling Pang, Linhong Guo, Yuanzhang Li:
Building Undetectable Covert Channels Over Mobile Networks with Machine Learning. ML4CS (1) 2020: 331-339 - [c13]Xiangxiang Jiang, Yuxi Ma, Gang Zhao, Xiaohui Kuang, Yuanzhang Li, Ruyun Zhang:
A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline. ML4CS (1) 2020: 519-529
2010 – 2019
- 2019
- [j27]Yuanzhang Li, Shangjun Yao, Kai Yang, Yu-an Tan, Quan-Xin Zhang:
A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images. IEEE Access 7: 73573-73582 (2019) - [j26]Fang Yan, Xi Yang, Jiamou Liu, Hengliang Tang, Yu-an Tan, Yuanzhang Li:
Optimizing the restoration performance of deduplication systems through an energy-saving data layout. Ann. des Télécommunications 74(7-8): 461-471 (2019) - [j25]Qikun Zhang, Xianmin Wang, Junling Yuan, Lu Liu, Ruifang Wang, Hong Huang, Yuanzhang Li:
A hierarchical group key agreement protocol using orientable attributes for cloud computing. Inf. Sci. 480: 55-69 (2019) - [c12]Xinxin Wang, Yuanzhang Li, Quanxin Zhang, Xiaohui Kuang:
Boosting Training for PDF Malware Classifier via Active Learning. CSS (2) 2019: 101-110 - [c11]Rui Ge, Ying Zheng, Fengyin Li, Dongfeng Wang, Yuanzhang Li:
Research and Application of Trusted Service Evaluation Model in Social Network. CSS (2) 2019: 313-317 - [c10]Yaxiao Wang, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang:
Evading PDF Malware Classifiers with Generative Adversarial Network. CSS (1) 2019: 374-387 - [c9]Xiao Yu, Kunqing Wang, Quanxin Zhang, Yuanzhang Li:
A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles. SmartCom 2019: 34-41 - [c8]Jinbao Gao, Yuanzhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang:
An RTP Extension for Reliable User-Data Transmission over VoIP Traffic. SocialSec 2019: 74-86 - 2018
- [j24]Xiaosong Zhang, Yu-an Tan, Chen Liang, Yuanzhang Li, Jin Li:
A Covert Channel Over VoLTE via Adjusting Silence Periods. IEEE Access 6: 9292-9302 (2018) - [j23]Yu-an Tan, Xinting Xu, Chen Liang, Xiaosong Zhang, Quan-Xin Zhang, Yuanzhang Li:
An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distributed Sens. Networks 14(5) (2018) - [j22]Yuan Xue, Yu-an Tan, Chen Liang, Yuanzhang Li, Jun Zheng, Quan-Xin Zhang:
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444: 36-50 (2018) - [j21]Xiaosong Zhang, Chen Liang, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng, Yu-an Tan:
Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445-446: 66-78 (2018) - [j20]Yu-an Tan, Yuan Xue, Chen Liang, Jun Zheng, Quan-Xin Zhang, Jiamin Zheng, Yuanzhang Li:
A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107: 69-82 (2018) - [j19]Qikun Zhang, Yong Gan, Lu Liu, Xianmin Wang, Xiangyang Luo, Yuanzhang Li:
An authenticated asymmetric group key agreement based on attribute encryption. J. Netw. Comput. Appl. 123: 1-10 (2018) - [j18]Xiao Yu, Changyou Zhang, Yuan Xue, Hongfei Zhu, Yuanzhang Li, Yu-an Tan:
An extra-parity energy saving data layout for video surveillance. Multim. Tools Appl. 77(4): 4563-4583 (2018) - [j17]Xiaosong Zhang, Yu-an Tan, Changyou Zhang, Yuan Xue, Yuanzhang Li, Jun Zheng:
A code protection scheme by process memory relocation for android devices. Multim. Tools Appl. 77(9): 11137-11157 (2018) - [j16]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Xianmin Wang, Quan-Xin Zhang, Yuanzhang Li:
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks. Sensors 18(5): 1663 (2018) - [j15]Yuanzhang Li, Jingjing Hu, Zhuozhuo Wu, Chen Liu, Feifei Peng, Yu Zhang:
Research on QoS service composition based on coevolutionary genetic algorithm. Soft Comput. 22(23): 7865-7874 (2018) - [j14]Zhizhuo Sun, Quan-Xin Zhang, Yuanzhang Li, Yu-an Tan:
DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage. IEEE Trans. Circuits Syst. Video Technol. 28(1): 193-205 (2018) - [j13]Yu-an Tan, Xiaosong Zhang, Kashif Sharif, Chen Liang, Quan-Xin Zhang, Yuanzhang Li:
Covert Timing Channels for IoT over Mobile Networks. IEEE Wirel. Commun. 25(6): 38-44 (2018) - [j12]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Quan-Xin Zhang, Yuanzhang Li:
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services. Wirel. Commun. Mob. Comput. 2018: 5401890:1-5401890:9 (2018) - [c7]Zucheng Huang, Lu Liu, Yuanzhang Li, Yu Zhang, Qikun Zhang:
Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade. ICA3PP (1) 2018: 299-309 - [c6]Lianfang Wang, Hong Huang, Yuanzhang Li, Li Zhang:
Acquiring Hidden Space via Modifying Block Bitmap for Android Devices. ICA3PP (3) 2018: 651-660 - 2017
- [j11]Xiaosong Zhang, Yu-an Tan, Yuan Xue, Quan-Xin Zhang, Yuanzhang Li, Can Zhang, Jun Zheng:
Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3): 2393-2402 (2017) - [c5]Xinyu Tang, Changyou Zhang, Chen Liang, Aourra Khaled, Yuanzhang Li:
A Code Self-Relocation Method for Embedded System. CSE/EUC (1) 2017: 688-691 - [c4]Pengfei Pang, Aourra Khaled, Yuan Xue, Yuanzhang Li, Quan-Xin Zhang:
A Transparent Encryption Scheme of Video Data for Android Devices. CSE/EUC (1) 2017: 817-822 - [c3]Shaoru Liu, Yao Wang, Quan-Xin Zhang, Yuanzhang Li:
A VoLTE Encryption Experiment for Android Smartphones. GSKI (1) 2017: 115-125 - 2016
- [j10]Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng:
Determining image base of firmware for ARM devices by matching literal pools. Digit. Investig. 16: 19-28 (2016) - 2015
- [j9]Li Zhang, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quan-xin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. Digit. Investig. 12: 77-87 (2015) - [j8]Ping Bai, Kang Sheng, Yuanzhang Li, Yu-an Tan, Xiao Yu:
Research on Bluetooth protocols based on Android kernel log. Int. J. Comput. Sci. Math. 6(1): 78-87 (2015) - [j7]Rujia Guo, Fei Wu, Yuanzhang Li, Ruijin Zhu, Kang Sheng:
The information hiding mechanism based on compressed document format. Int. J. Comput. Sci. Math. 6(1): 97-106 (2015) - [j6]Xiao Yu, Tong-Sheng Ju, Quan-Xin Zhang, Yuanzhang Li, Yu-an Tan:
Tuner and demodulator design of antenna control system. Int. J. Wirel. Mob. Comput. 8(2): 141-146 (2015) - 2014
- [j5]Heng Lian, Pang Du, Yuanzhang Li, Hua Liang:
Partially linear structure identification in generalized additive models with NP-dimensionality. Comput. Stat. Data Anal. 80: 197-208 (2014) - [j4]Zhizhuo Sun, Yu-an Tan, Yuanzhang Li:
An energy-efficient storage for video surveillance. Multim. Tools Appl. 73(1): 151-167 (2014) - 2013
- [j3]Xiao Yu, Yuanzhang Li, Qinggang Liang, Xiu-Mei Ding, Hong-Liang Chen, Yi-Hao Liu, Kai Fan, Yu-an Tan:
Design of satellite TV antenna control system for car carrying. Int. J. Wirel. Mob. Comput. 6(4): 412-418 (2013) - [j2]Tianqing Liu, Xiaohui Yuan, Zhaohai Li, Yuanzhang Li:
Empirical and weighted conditional likelihoods for matched case-control studies with missing covariates. J. Multivar. Anal. 119: 185-199 (2013) - 2012
- [c2]Jingyu Liu, Yuanzhang Li, Suping Jia, Jiasheng Hong, Jingyong Yan, Yufeng Guo:
Hybrid S-RAID: A Power-Aware Archival Storage Architecture. PDCAT 2012: 404-409 - 2011
- [j1]Qikun Zhang, Jun Zheng, Yu-an Tan, Ruifang Wang, Yuanzhang Li:
Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups. J. Comput. 6(4): 650-656 (2011) - 2010
- [c1]Jingyu Liu, Yu-an Tan, Yuanzhang Li, Xue-lan Zhang, Zexiang Zhou:
A Method of Deduplication for Data Remote Backup. CCTA (1) 2010: 68-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint