Home > Research > Researchers > Dr Zheng Wang > Publications

Dr Zheng Wang

Formerly at Lancaster University

  1. 2018
  2. Published

    Scale Up Event Extraction Learning via Automatic Training Data Generation

    Zeng, Y., Feng, Y., Ma, R., Wang, Z., Yan, R., Shi, C. & Zhao, D., 1/01/2018, The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18). Palo Alto: AAAI, p. 6045-6052 8 p. (AAAI ; vol. 32).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery

    Zhai, S., Tang, Z., Wang, D., Li, Q., Li, Z., Chen, X., Fang, D., Chen, F. & Wang, Z., 2018, In: Sensors. 18, 7, 23 p., 2075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. 2017
  5. Published

    AppIS: Protect Android Apps Against Runtime Repackaging Attacks

    Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D. & Wang, Z., 17/12/2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 25-32 8 p. (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Improving Spark Application Throughput Via Memory Aware Task Co-location: A Mixture of Experts Approach

    Sanz Marco, V., Taylor, B., Porter, B. F. & Wang, Z., 11/12/2017, Middleware '17 Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference. New York: ACM, p. 95-108 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    DexPro: A Bytecode Level Code Protection System for Android Applications

    Zhao, B., Tang, Z., Li, Z., Song, L., Gong, X., Fang, D., Liu, F. & Wang, Z., 21/10/2017, Cyberspace Safety and Security. Wen, S., Wu, W. & Castiglione, A. (eds.). Cham: Springer, p. 367-382 16 p. (Lecture Notes in Computer Science; vol. 10581).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Optimise web browsing on heterogeneous mobile platforms: a machine learning based approach

    Ren, J., Gao, L., Wang, H. & Wang, Z., 5/10/2017, IEEE International Conference on Computer Communications (INFOCOM), 2017. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation

    Tang, Z., Wang, L., Kuang, K., Xue, C., Gong, X., Chen, X., Fang, D. & Wang, Z., 11/09/2017, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, p. 261-268 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    End-to-end Deep Learning of Optimization Heuristics

    Cummins, C., Petoumenos, P., Wang, Z. & Leather, H., 9/09/2017, The 26th International Conference on Parallel Architectures and Compilation Techniques (PACT) 2017. IEEE, p. 219-232 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Protect sensitive information against channel state information based attacks

    Zhang, J., Tang, Z., Chen, X., Fang, D., Li, R. & Wang, Z., 18/08/2017, 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Zhang, H. & Wang, Z., 8/08/2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top