default search action
Guojun Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu:
A survey on the evolution of fileless attacks and detection techniques. Comput. Secur. 137: 103653 (2024) - [i5]Zeyuan Ma, Hongshu Guo, Jiacheng Chen, Guojun Peng, Zhiguang Cao, Yining Ma, Yue-Jiao Gong:
LLaMoCo: Instruction Tuning of Large Language Models for Optimization Code Generation. CoRR abs/2403.01131 (2024) - [i4]Zepeng Wang, Chao Ma, Linjiang Zhou, Libing Wu, Lei Yang, Xiaochuan Shi, Guojun Peng:
E2CFD: Towards Effective and Efficient Cost Function Design for Safe Reinforcement Learning via Large Language Model. CoRR abs/2407.05580 (2024) - 2023
- [j14]Minghui Min, Shuang Yang, Hongliang Zhang, Jicun Ding, Guojun Peng, Miao Pan, Zhu Han:
Indoor Semantic Location Privacy Protection With Safe Reinforcement Learning. IEEE Trans. Cogn. Commun. Netw. 9(5): 1385-1398 (2023) - [j13]Mengfei Xie, Yan Lin, Chenke Luo, Guojun Peng, Jianming Fu:
PointerScope: Understanding Pointer Patching for Code Randomization. IEEE Trans. Dependable Secur. Comput. 20(4): 3019-3036 (2023) - [j12]Chenke Luo, Jiang Ming, Jianming Fu, Guojun Peng, Zhetao Li:
Reverse Engineering of Obfuscated Lua Bytecode via Interpreter Semantics Testing. IEEE Trans. Inf. Forensics Secur. 18: 3891-3905 (2023) - [c17]Zeyuan Ma, Hongshu Guo, Jiacheng Chen, Zhenrui Li, Guojun Peng, Yue-Jiao Gong, Yining Ma, Zhiguang Cao:
MetaBox: A Benchmark Platform for Meta-Black-Box Optimization with Reinforcement Learning. NeurIPS 2023 - [i3]Zeyuan Ma, Hongshu Guo, Jiacheng Chen, Zhenrui Li, Guojun Peng, Yue-Jiao Gong, Yining Ma, Zhiguang Cao:
MetaBox: A Benchmark Platform for Meta-Black-Box Optimization with Reinforcement Learning. CoRR abs/2310.08252 (2023) - 2022
- [j11]Rui Zheng, Qiuyun Wang, Zhuopang Lin, Zhengwei Jiang, Jianming Fu, Guojun Peng:
Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Appl. Soft Comput. 124: 109044 (2022) - [j10]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. ACM Comput. Surv. 54(5): 106:1-106:36 (2022) - [j9]Hongchu Yu, Alan T. Murray, Zhixiang Fang, Jingxian Liu, Guojun Peng, Mohammad Solgi, Weilong Zhang:
Ship Path Optimization That Accounts for Geographical Traffic Characteristics to Increase Maritime Port Safety. IEEE Trans. Intell. Transp. Syst. 23(6): 5765-5776 (2022) - 2021
- [j8]Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng Yao:
Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT. IEEE Internet Things J. 8(4): 2736-2750 (2021) - [j7]Hongchu Yu, Zhixiang Fang, Alan T. Murray, Guojun Peng:
A Direction-Constrained Space-Time Prism-Based Approach for Quantifying Possible Multi-Ship Collision Risks. IEEE Trans. Intell. Transp. Syst. 22(1): 131-141 (2021) - [c16]Wenna Song, Jiang Ming, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng:
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. CCS 2021: 2858-2874 - [c15]Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. ICSE 2021: 1683-1694 - [c14]Binlin Cheng, Jiang Ming, Erika A. Leal, Haotian Zhang, Jianming Fu, Guojun Peng, Jean-Yves Marion:
Obfuscation-Resilient Executable Payload Extraction From Packed Malware. USENIX Security Symposium 2021: 3451-3468 - [i2]Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. CoRR abs/2103.03511 (2021) - 2020
- [j6]Wenna Song, Jiang Ming, Han Yan, Yi Xiang, Yuan Chen, Yuan Luo, Kun He, Guojun Peng:
Android Data-Clone Attack via Operating System Customization. IEEE Access 8: 199733-199746 (2020) - [j5]Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan, Guojun Peng:
Detection of Repackaged Android Malware with Code-Heterogeneity Features. IEEE Trans. Dependable Secur. Comput. 17(1): 64-77 (2020) - [c13]Mengfei Xie, Jianming Fu, Jia He, Chenke Luo, Guojun Peng:
JTaint: Finding Privacy-Leakage in Chrome Extensions. ACISP 2020: 563-583 - [c12]Luman Shi, Jiang Ming, Jianming Fu, Guojun Peng, Dongpeng Xu, Kun Gao, Xuanchen Pan:
VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing. CCS 2020: 535-549 - [i1]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng Daphne Yao:
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities. CoRR abs/2003.13213 (2020)
2010 – 2019
- 2019
- [j4]Zhixiang Fang, Hongchu Yu, Ran-Xuan Ke, Shih-Lung Shaw, Guojun Peng:
Automatic Identification System-Based Approach for Assessing the Near-Miss Collision Risk Dynamics of Ships in Ports. IEEE Trans. Intell. Transp. Syst. 20(2): 534-543 (2019) - [c11]Jianming Fu, Lin Li, Yingjun Wang, Jianwei Huang, Guojun Peng:
Web Scanner Detection Based on Behavioral Differences. SocialSec 2019: 1-16 - 2018
- [j3]Ming Tang, Pengbo Wang, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang, Guojun Peng, Jean-Luc Danger:
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. IEEE Trans. Inf. Forensics Secur. 13(12): 3008-3018 (2018) - [c10]Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion:
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. CCS 2018: 395-411 - 2015
- [c9]Yu Liang, Xinjie Ma, Daoyuan Wu, Xiaoxiao Tang, Debin Gao, Guojun Peng, Chunfu Jia, Huanguo Zhang:
Stack Layout Randomization with Minimal Rewriting of Android Binaries. ICISC 2015: 229-245 - 2014
- [j2]Guojun Peng, Changpin Li:
Computation of universal unfolding of the double zero bifurcation in the Z2-symmetric system. Int. J. Comput. Math. 91(3): 461-479 (2014)
2000 – 2009
- 2009
- [j1]Guojun Peng, Yaolin Jiang, Changpin Li:
Bifurcations of a Holling-Type II predator-prey System with Constant Rate Harvesting. Int. J. Bifurc. Chaos 19(8): 2499-2514 (2009) - 2008
- [c8]Guojun Peng, Ran-Xuan Ke, JinXing Shao:
Research on 3D Simulation Technology Applied in Navigation-Aid Management. CW 2008: 597-600 - [c7]Guojun Peng, XingGu Zhang, Ran-Xuan Ke, JinXing Shao, Xin Chen:
Research on Navigation-Aids Information System. CW 2008: 601-604 - [c6]Ran-Xuan Ke, Guojun Peng, Xiaoqin Wang:
Further Research of RFID Applying on Exhibition Logistics. CW 2008: 631-634 - [c5]Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu:
Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. ICYCS 2008: 2283-2288 - 2006
- [c4]Guojun Peng, Jiawan Tan, Zhigeng Pan, Yicheng Jin:
Geometry Compression Using Spherical Wavelet. ICAT 2006: 742-752 - [c3]XingGu Zhang, Guojun Peng, Tianhe Chi, Cuiling Ji:
Research on Sea Digital Map used for Ship Navigation. IGARSS 2006: 872-875 - 2005
- [c2]Guojun Peng, Tianhe Chi, XingGu Zhang, Lu Xiang:
Research on Sea Digital Map based on WEBGIS. IGARSS 2005: 3 - [c1]Guojun Peng, Tianhe Chi, XingGu Zhang, Lu Xiang, Zongheng Chen:
Research on WEBGIS real-time distribution system of port navigation-supporting information. IGARSS 2005: 3
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint