default search action
Shize Guo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Runjin Sun, Shize Guo, Jinhong Guo, Wei Li, Xingyu Zhang, Xi Guo, Zhisong Pan:
GraphMoCo: A graph momentum contrast model for large-scale binary function representation learning. Neurocomputing 575: 127273 (2024) - [j48]Xue Gong, Ao Shen, Tianxiang Feng, Guorui Xu, Shize Guo, Fan Zhang:
Double laser-faults based PFA on cryptographic circuits with algebraic analysis. Integr. 97: 102174 (2024) - [j47]Ying Han, Xinlei Wang, Mingshu He, Xiaojuan Wang, Shize Guo:
Intrusion Detection for Encrypted Flows Using Single Feature Based on Graph Integration Theory. IEEE Internet Things J. 11(10): 17589-17601 (2024) - [j46]Qianmei Wu, Fan Zhang, Shize Guo, Kun Yang, Haoting Shen:
A Unified and Fully Automated Framework for Wavelet-Based Attacks on Random Delay. IEEE Trans. Computers 73(9): 2206-2219 (2024) - [j45]Dazhi Zhan, Yexin Duan, Yue Hu, Weili Li, Shize Guo, Zhisong Pan:
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches. IEEE Trans. Inf. Forensics Secur. 19: 1183-1198 (2024) - [j44]Xiaojuan Wang, Yu Zhang, Mingshu He, Shize Guo, Liu Yang:
Supervised Representation Learning for Network Traffic With Cluster Compression. IEEE Trans. Sustain. Comput. 9(1): 1-13 (2024) - 2023
- [j43]Dazhi Zhan, Yexin Duan, Yue Hu, Lujia Yin, Zhisong Pan, Shize Guo:
AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation. Comput. Secur. 127: 103103 (2023) - [j42]Dazhi Zhan, Yue Hu, Weili Li, Jun Chen, Shize Guo, Zhisong Pan:
Towards robust CNN-based malware classifiers using adversarial examples generated based on two saliency similarities. Neural Comput. Appl. 35(23): 17129-17146 (2023) - [j41]Ruijin Sun, Shize Guo, Changyou Xing, Yexin Duan, Luming Yang, Xi Guo, Zhisong Pan:
Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection. PeerJ Comput. Sci. 9: e1591 (2023) - [j40]Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo:
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 519-542 (2023) - [c21]Dazhi Zhan, Wei Bai, Xin Liu, Yue Hu, Lei Zhang, Shize Guo, Zhisong Pan:
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior. ACSAC 2023: 580-593 - [c20]She Tang, Jian Wang, Zhe Chen, Shize Guo:
A Covert Attack Method Against FPGA Clouds. ATS 2023: 1-6 - [c19]Guorui Xu, Fan Zhang, Xinjie Zhao, Yuan Chen, Shize Guo, Kui Ren:
Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models. DAC 2023: 1-6 - [i8]Ruijin Sun, Shize Guo, Xi Guo, Zhisong Pan:
GraphMoco: a Graph Momentum Contrast Model that Using Multimodel Structure Information for Large-scale Binary Function Representation Learning. CoRR abs/2305.10826 (2023) - 2022
- [j39]Lei Zhang, Wei Bai, Shize Guo, Youwei Xu, Kaolin Jiang, Yu Pan, Qibin Zheng, Jun Chen, Zhisong Pan:
A unified semantic description and user's permissions knowledge reasoning for multiple domain cyberspace based on knowledge graph. J. Intell. Fuzzy Syst. 43(6): 8195-8206 (2022) - [j38]Lei Zhang, Zhisong Pan, Yu Pan, Shize Guo, Yi Liu, Shiming Xia, Qibin Zheng, Hongmei Li, Wei Bai:
A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient. Secur. Commun. Networks 2022: 1488344:1-1488344:13 (2022) - [j37]Luming Yang, Shaojing Fu, Xuyun Zhang, Shize Guo, Yongjun Wang, Chi Yang:
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection. World Wide Web 25(5): 2139-2161 (2022) - [i7]Xin Ma, Shize Guo, Zhisong Pan, Bin Liu, Kaolin Jiang, Ming Chen, Shijiao Tang:
A DNS Tunnel Sliding Window Differential Detection Method Based on Normal Distribution Reasonable Range Filtering. CoRR abs/2207.06641 (2022) - [i6]Ruijin Sun, Shize Guo, Jinhong Guo, Meng Sun, Zhisong Pan:
Fun2Vec: a Contrastive Learning Framework of Function-level Representation for Binary. CoRR abs/2209.02442 (2022) - [i5]Ruijin Sun, Shize Guo, Jinhong Guo, Changyou Xing, Luming Yang, Xi Guo, Zhisong Pan:
Instance Attack: An Explanation-based Vulnerability Analysis Framework Against DNNs for Malware Detection. CoRR abs/2209.02453 (2022) - 2021
- [j36]Jian Wang, Zhe Chen, Shize Guo, Yubai Li, Zhonghai Lu:
Optimal Sprinting Pattern in Thermal Constrained CMPs. IEEE Trans. Emerg. Top. Comput. 9(1): 484-495 (2021) - 2020
- [j35]Shize Guo, Jian Wang, Zhe Chen, Yubai Li, Zhonghai Lu:
Securing IoT Space via Hardware Trojan Detection. IEEE Internet Things J. 7(11): 11115-11122 (2020) - [j34]Jun Chen, Shize Guo, Xin Ma, Haiying Li, Jinhong Guo, Ming Chen, Zhisong Pan:
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism. Secur. Commun. Networks 2020: 6724513:1-6724513:11 (2020) - [i4]Lei Zhang, Wei Bai, Shize Guo, Shiming Xia, Hongmei Li, Zhisong Pan:
Weakness Analysis of Cyberspace Configuration Based on Reinforcement Learning. CoRR abs/2007.04614 (2020)
2010 – 2019
- 2019
- [j33]Tao Zhang, Jian Wang, Shize Guo, Zhe Chen:
A Comprehensive FPGA Reverse Engineering Tool-Chain: From Bitstream to RTL Code. IEEE Access 7: 38379-38389 (2019) - [j32]Jian Wang, Shize Guo, Zhe Chen, Tao Zhang:
A Benchmark Suite of Hardware Trojans for On-Chip Networks. IEEE Access 7: 102002-102009 (2019) - [j31]Shiming Xia, Shize Guo, Wei Bai, Junyang Qiu, Hao Wei, Zhisong Pan:
A New Smart Router-Throttling Method to Mitigate DDoS Attacks. IEEE Access 7: 107952-107963 (2019) - [j30]Xin Ma, Shize Guo, Haiying Li, Zhisong Pan, Junyang Qiu, Yu Ding, Feiqiong Chen:
How to Make Attention Mechanisms More Practical in Malware Classification. IEEE Access 7: 155270-155280 (2019) - [j29]Wei Bai, Zhisong Pan, Shize Guo, Zhe Chen, Shiming Xia:
MDC-Checker: A novel network risk assessment framework for multiple domain configurations. Comput. Secur. 86: 388-401 (2019) - [j28]Zhe Chen, Shize Guo, Jian Wang, Yubai Li, Zhonghai Lu:
Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans. IEEE Internet Things J. 6(4): 7061-7068 (2019) - [j27]Xin Ma, Shize Guo, Wei Bai, Jun Chen, Shiming Xia, Zhisong Pan:
An API Semantics-Aware Malware Detection Method Based on Deep Learning. Secur. Commun. Networks 2019: 1315047:1-1315047:9 (2019) - [j26]Wei Bai, Zhisong Pan, Shize Guo, Zhe Chen:
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information. Secur. Commun. Networks 2019: 8085303:1-8085303:15 (2019) - [j25]Shize Guo, Jian Wang, Zhe Chen, Zhonghai Lu, Jinhong Guo, Lian Yang:
Security-Aware Task Mapping Reducing Thermal Side Channel Leakage in CMPs. IEEE Trans. Ind. Informatics 15(10): 5435-5443 (2019) - [c18]Xiaoxuan Lou, Fan Zhang, Guorui Xu, Ziyuan Liang, Xinjie Zhao, Shize Guo, Kui Ren:
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance. Inscrypt 2019: 480-496 - 2018
- [j24]Xiaofeng Zhong, Shize Guo, Hong Shan, Liang Gao, Di Xue, Nan Zhao:
Feature-Based Transfer Learning Based on Distribution Similarity. IEEE Access 6: 35551-35557 (2018) - [j23]Di Xue, Lifa Wu, Zheng Hong, Shize Guo, Liang Gao, Zhiyong Wu, Xiaofeng Zhong, Jianshan Sun:
Deep learning-based personality recognition from text posts of online social networks. Appl. Intell. 48(11): 4232-4246 (2018) - [j22]Ping Zhou, Tao Wang, Xiaoxuan Lou, Xinjie Zhao, Fan Zhang, Shize Guo:
Efficient flush-reload cache attack on scalar multiplication based signature algorithm. Sci. China Inf. Sci. 61(3): 039102:1-039102:3 (2018) - [j21]Xinjie Zhao, Fan Zhang, Shize Guo, Zheng Gong:
Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers. Sci. China Inf. Sci. 61(3): 039106:1-039106:3 (2018) - [j20]Jinghua Zheng, Shize Guo, Liang Gao, Xiaofeng Zhong:
社交网络用户认知域特征预测研究综述 (Survey on Cognitive Domain Feature Prediction of Social Network Users). 计算机科学 45(3): 16-22 (2018) - [j19]Fan Zhang, Ziyuan Liang, Bolin Yang, Xinjie Zhao, Shize Guo, Kui Ren:
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition. Frontiers Inf. Technol. Electron. Eng. 19(12): 1475-1499 (2018) - [j18]Jian Wang, Shize Guo, Zhe Chen, Yubai Li, Zhonghai Lu:
A New Parallel CODEC Technique for CDMA NoCs. IEEE Trans. Ind. Electron. 65(8): 6527-6537 (2018) - [c17]Xiaofeng Zhong, Shize Guo, Liang Gao, Hong Shan, Di Xue:
A General Personality Prediction Framework Based on Facebook Profiles. ICMLC 2018: 269-275 - [c16]Fan Zhang, Yiran Zhang, Xinjie Zhao, Shize Guo, Ziyuan Liang, Samiya Qureshi:
Improved Differential Fault Analysis on LED with Constraint Equations: Towards Reaching Its Limit. ICPADS 2018: 646-653 - [c15]Fan Zhang, Yiran Zhang, Shengwen Shi, Shize Guo, Ziyuan Liang, Samiya Qureshi, Congyuan Xu:
Optimized Lightweight Hardware Trojan-Based Fault Attack on DES. ICPADS 2018: 654-661 - 2017
- [j17]Di Xue, Zheng Hong, Shize Guo, Liang Gao, Lifa Wu, Jinghua Zheng, Nan Zhao:
Personality Recognition on Social Media With Label Distribution Learning. IEEE Access 5: 13478-13488 (2017) - [j16]Fan Zhang, Xinjie Zhao, Wei He, Shivam Bhasin, Shize Guo:
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers. Sci. China Inf. Sci. 60(4): 48102 (2017) - [j15]Liang Geng, Fan Zhang, Jizhong Shen, Wei He, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Transistor level SCA-resistant scheme based on fluctuating power logic. Sci. China Inf. Sci. 60(10): 109401:1-109401:3 (2017) - [j14]Hao Chen, Tao Wang, Shize Guo, Xinjie Zhao, Fan Zhang, Jian Liu:
Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 811-821 (2017) - [c14]Fan Zhang, Liang Geng, Jizhong Shen, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks. AsianHOST 2017: 49-54 - [c13]Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi:
pbSE: Phase-Based Symbolic Execution. DSN 2017: 133-144 - [c12]Xiaofeng Zhong, Shize Guo, Liang Gao, Hong Shan, Jinghua Zheng:
An Improved k-NN Classification with Dynamic k. ICMLC 2017: 211-216 - 2016
- [j13]Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian Yang, François-Xavier Standaert, Dawu Gu:
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. IEEE Trans. Inf. Forensics Secur. 11(5): 1039-1054 (2016) - 2014
- [j12]Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Zhijie Jerry Shi, François-Xavier Standaert, Chujiao Ma:
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations. IEEE Trans. Inf. Forensics Secur. 9(6): 999-1014 (2014) - [c11]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu:
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. FDTC 2014: 29-39 - 2013
- [j11]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais:
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. Comput. Secur. 39: 173-189 (2013) - [j10]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Hao Luo:
Enhanced Side-Channel Cube Attacks on PRESENT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 332-339 (2013) - [j9]Yong Zhang, Shize Guo, Zhe-Ming Lu, Hao Luo:
Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables. IEICE Trans. Commun. 96-B(2): 624-631 (2013) - [j8]Jia-Rui Liu, Shize Guo, Zhe-Ming Lu, Fa-Xin Yu, Hui Li:
An Approximate Flow Betweenness Centrality Measure for Complex Network. IEICE Trans. Inf. Syst. 96-D(3): 727-730 (2013) - [j7]Zi-Yi Wang, Shize Guo, Zhe-Ming Lu, Guang-Hua Song, Hui Li:
Random Walks on Stochastic and Deterministic Small-World Networks. IEICE Trans. Inf. Syst. 96-D(5): 1215-1218 (2013) - [j6]Guangyu Kang, Shize Guo, De-Chen Wang, Longhua Ma, Zhe-Ming Lu:
Image Retrieval Based on Structured Local Binary Kirsch Pattern. IEICE Trans. Inf. Syst. 96-D(5): 1230-1232 (2013) - [j5]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, Jing Huang:
Efficient Hamming weight-based side-channel cube attacks on PRESENT. J. Syst. Softw. 86(3): 728-743 (2013) - [c10]Fan Zhang, Xinjie Zhao, Shize Guo, Tao Wang, Zhijie Shi:
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers. COSADE 2013: 62-79 - [c9]Xinjie Zhao, Shize Guo, Fan Zhang, Zhijie Shi, Chujiao Ma, Tao Wang:
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques. FDTC 2013: 41-51 - 2012
- [j4]Shize Guo, Zhe-Ming Lu, Guangyu Kang, Zhe Chen, Hao Luo:
A Tree-Structured Deterministic Small-World Network. IEICE Trans. Inf. Syst. 95-D(5): 1536-1538 (2012) - [j3]Tianliang Lu, Kangfeng Zheng, Rongrong Fu, Yingqing Liu, Bin Wu, Shize Guo:
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus. J. Networks 7(8): 1227-1232 (2012) - [j2]Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang, Shize Guo:
Modelling security message propagation in delay tolerant networks. Secur. Commun. Networks 5(1): 51-58 (2012) - [c8]Yeli Hao, Shize Guo, Hong Zhao, Zhe Chen:
Study on the modeling and analyzing of the role-based threats in the cyberspace. CCIS 2012: 1302-1306 - [c7]Xin-jie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji:
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation. COSADE 2012: 231-248 - [i3]Xin-jie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Keke Ji:
Algebraic Differential Fault Attacks on LED using a Single Fault Injection. IACR Cryptol. ePrint Arch. 2012: 347 (2012) - 2011
- [j1]Shize Guo, Zhe-Ming Lu, Zhe Chen, Hao Luo:
Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis. IEICE Trans. Inf. Syst. 94-D(11): 2284-2287 (2011) - [i2]Xin-jie Zhao, Tao Wang, Shize Guo:
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher. IACR Cryptol. ePrint Arch. 2011: 86 (2011) - [i1]Xin-jie Zhao, Tao Wang, Shize Guo:
Improved Side Channel Cube Attacks on PRESENT. IACR Cryptol. ePrint Arch. 2011: 165 (2011) - 2010
- [c6]Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo:
A method for topology conformance tests under logical constraints. WCNIS 2010: 386-390
2000 – 2009
- 2009
- [c5]Guangyu Kang, Shize Guo, Longjiang Yu:
Speech Synthesis Algorithm of Co-articulation Based on the Continuous Transition of Energy. CSIE (6) 2009: 131-134 - [c4]Guangyu Kang, Shize Guo:
Variable Sliding Window DTW Speech Identification Algorithm. HIS (1) 2009: 304-307 - [c3]Guangyu Kang, Shize Guo:
Speaker Transformation Using Length-Variable Moving Window Based GMM. HIS (1) 2009: 308-312 - [c2]Jun-Bao Li, Longjiang Yu, Shize Guo:
Extracting Invariable Features Using Geometry Projection Based Histogram Model for 3D Object Description. IIH-MSP 2009: 608-611 - 2008
- [c1]Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang:
A Defending Mechanism against DDoS Based on Registration and Authentication. ICYCS 2008: 2192-2197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint