{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu, Y Liu, W Huo, W Zou, ... 29th USENIX Security Symposium (USENIX Security 20), 1165-1182, 2020 | 91 | 2020 |
Hub-and-spoke structure: Characterizing the global crude oil transport network with mass vessel trajectories P Peng, Y Yang, S Cheng, F Lu, Z Yuan Energy 168, 966-974, 2019 | 59 | 2019 |
ALOHA-like neighbor discovery in low-duty-cycle wireless sensor networks L You, Z Yuan, P Yang, G Chen 2011 IEEE wireless communications and networking conference, 749-754, 2011 | 42 | 2011 |
B2sfinder: Detecting open-source software reuse in cots software Z Yuan, M Feng, F Li, G Ban, Y Xiao, S Wang, Q Tang, H Su, C Yu, J Xu, ... 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 39 | 2019 |
A new ETL approach based on data virtualization SS Guo, ZM Yuan, AB Sun, Q Yue Journal of Computer Science and Technology 30, 311-323, 2015 | 33 | 2015 |
An improved TPSN algorithm for time synchronization in wireless sensor network D Liu, Z Zheng, Z Yuan, W Li 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 22 | 2012 |
Open-source license violations of binary software at large scale M Feng, W Mao, Z Yuan, Y Xiao, G Ban, W Wang, S Wang, Q Tang, J Xu, ... 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 18 | 2019 |
Viva: Binary level vulnerability identification via partial signature Y Xiao, Z Xu, W Zhang, C Yu, L Liu, W Zou, Z Yuan, Y Liu, A Piao, W Huo 2021 IEEE International Conference on Software Analysis, Evolution and …, 2021 | 16 | 2021 |
A cost-efficiency method on beacon nodes placement for wireless localization Z Yuan, W Li, J Zhu, W Zhao 2015 International Conference on Computing, Networking and Communications …, 2015 | 15 | 2015 |
Error data analytics on RSS range-based localization S Yang, Z Yuan, W Li Big Data Mining and Analytics 3 (3), 155-170, 2020 | 13 | 2020 |
B2SMatcher: fine-Grained version identification of open-Source software in binary files G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo Cybersecurity 4, 1-21, 2021 | 11 | 2021 |
Performance comparison of positioning algorithms for complex GPS systems W Li, Z Yuan, B Chen, W Zhao 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 11 | 2012 |
Beacon node placement for minimal localization error Z Yuan, W Li, S Yang 2019 International Conference on Internet of Things (iThings) and IEEE Green …, 2019 | 8 | 2019 |
History-aware adaptive backoff for neighbor discovery in wireless networks Z Yuan, Y Lizhao, W Li, B Chen, Z Xu 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks …, 2011 | 8 | 2011 |
A sanitizer-centric analysis to detect cross-site scripting in PHP programs H Su, L Xu, H Chao, F Li, Z Yuan, J Zhou, W Huo 2022 IEEE 33rd International Symposium on Software Reliability Engineering …, 2022 | 6 | 2022 |
Efficiently coding replicas to erasure coded blocks in distributed storage systems Z Yuan, H Liu IEEE Communications Letters 21 (9), 1897-1900, 2017 | 6 | 2017 |
Error analysis on RSS range-based localization based on general log-distance path loss model W Li, Z Yuan, S Yang, W Zhao 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems …, 2018 | 5 | 2018 |
An efficient hybrid localization scheme for heterogeneous wireless networks Z Yuan, W Li, AC Champion, W Zhao 2012 IEEE Global Communications Conference (GLOBECOM), 372-378, 2012 | 5 | 2012 |
Minimum latency broadcast scheduling in single-radio multi-channel wireless ad-hoc networks L You, Z Yuan, B Tang, G Chen arXiv preprint arXiv:1304.5330, 2013 | 4 | 2013 |
Performance optimization of large files writes to Ceph based on multiple PipeLines algorithm K Zhan, L Xu, Z Yuan, W Zhang 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 3 | 2018 |