Home > Research > Researchers > Dr Zheng Wang > Publications

Dr Zheng Wang

Formerly at Lancaster University

  1. 2018
  2. Published

    VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern

    Tang, Z., Li, M., Cao, S., Chen, M., Ye, G., Gong, X., Fang, D. & Wang, Z., 12/05/2018, In: Applied Sciences. 8, 5, 23 p., 771.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    MOCL: An Efficient OpenCL Implementation for the Matrix-2000 Architecture

    Zhang, P., Fang, J., Yang, C., Tang, T., Huang, C. & Wang, Z., 8/05/2018, CF '18 Proceedings of the 15th ACM International Conference on Computing Frontiers. New York: ACM, p. 26-35 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X. & Wang, Z., 05/2018, In: Computers and Security. 74, p. 202-220 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Defeat Your Enemy Hiding Behind Public WiFi: WiGuard Can Protect Your Sensitive information from CSI-based Attack

    Zhang, J., Tang, Z., Li, M., Chen, X., Fang, D. & Wang, Z., 28/03/2018, In: Applied Sciences. 8, 4, 24 p., 515.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing

    Chang, L., Li, X., Wang, J., Meng, H., Chen, X., Fang, D., Tang, Z. & Wang, Z., 19/03/2018, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Scale Up Event Extraction Learning via Automatic Training Data Generation

    Zeng, Y., Feng, Y., Ma, R., Wang, Z., Yan, R., Shi, C. & Zhao, D., 1/01/2018, The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18). Palo Alto: AAAI, p. 6045-6052 8 p. (AAAI ; vol. 32).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery

    Zhai, S., Tang, Z., Wang, D., Li, Q., Li, Z., Chen, X., Fang, D., Chen, F. & Wang, Z., 2018, In: Sensors. 18, 7, 23 p., 2075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. 2017
  10. Published

    AppIS: Protect Android Apps Against Runtime Repackaging Attacks

    Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D. & Wang, Z., 17/12/2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 25-32 8 p. (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Improving Spark Application Throughput Via Memory Aware Task Co-location: A Mixture of Experts Approach

    Sanz Marco, V., Taylor, B., Porter, B. F. & Wang, Z., 11/12/2017, Middleware '17 Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference. New York: ACM, p. 95-108 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    DexPro: A Bytecode Level Code Protection System for Android Applications

    Zhao, B., Tang, Z., Li, Z., Song, L., Gong, X., Fang, D., Liu, F. & Wang, Z., 21/10/2017, Cyberspace Safety and Security. Wen, S., Wu, W. & Castiglione, A. (eds.). Cham: Springer, p. 367-382 16 p. (Lecture Notes in Computer Science; vol. 10581).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Optimise web browsing on heterogeneous mobile platforms: a machine learning based approach

    Ren, J., Gao, L., Wang, H. & Wang, Z., 5/10/2017, IEEE International Conference on Computer Communications (INFOCOM), 2017. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation

    Tang, Z., Wang, L., Kuang, K., Xue, C., Gong, X., Chen, X., Fang, D. & Wang, Z., 11/09/2017, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, p. 261-268 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    End-to-end Deep Learning of Optimization Heuristics

    Cummins, C., Petoumenos, P., Wang, Z. & Leather, H., 9/09/2017, The 26th International Conference on Parallel Architectures and Compilation Techniques (PACT) 2017. IEEE, p. 219-232 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Protect sensitive information against channel state information based attacks

    Zhang, J., Tang, Z., Chen, X., Fang, D., Li, R. & Wang, Z., 18/08/2017, 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  17. Published

    Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Zhang, H. & Wang, Z., 8/08/2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Learning with noise: enhance distantly supervised relation extraction with dynamic transition matrix

    Luo, B., Feng, Y., Wang, Z., Zhu, Z., Huang, S., Yan, R. & Zhao, D., 30/07/2017, The 55th Annual Meeting of the Association for Computational Linguistics: Proceedings of the Conference, Vol. 1 (Long Papers). Stroudsburg, Pa.: Association for Computational Linguistics, 10 p. P-17 1040

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Adaptive optimization for OpenCL programs on embedded heterogeneous systems

    Taylor, B., Sanz Marco, V. & Wang, Z., 21/06/2017, LCTES 2017 Proceedings of the 18th ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems. New York: ACM, p. 11-20 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Real-time power cycling in video on demand data centres using online Bayesian prediction

    Sanz Marco, V., Wang, Z. & Porter, B. F., 5/06/2017, 2017 IEEE 37th International Conference on Distributed Computing Systems. IEEE, p. 2125-2130 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    ALEA: a fine-grained energy profiling tool

    Mukhanov, L., Petoumenos, P., Wang, Z., Parasyris, N., Nikolopoulos, D. S., R. de Supinski, B. & Leather, H., 1/03/2017, In: ACM Transactions on Architecture and Code Optimization. 14, 1, 25 p., 1.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Cracking Android pattern lock in five attempts

    Ye, G., Tang, Z., Fang, D., Chen, X., Kim, K. I., Taylor, B. & Wang, Z., 26/02/2017, Proceedings 2017 Network and Distributed System Security Symposium 2017 (NDSS'17). Reston VA: Internet Society, p. 0-0 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Minimizing the cost of iterative compilation with active learning

    Ogilvie, W., Petoumenos, P., Wang, Z. & Leather, H., 4/02/2017, International Symposium on Code Generationand Optimization (CGO), 2017. IEEE, p. 245-256 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Synthesizing benchmarks for predictive modeling

    Cummins, C., Petoumenos, P., Wang, Z. & Leather, H., 4/02/2017, CGO '17 Proceedings of the 2017 International Symposium on Code Generation and Optimization. New York: ACM, p. 86-99 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes

    Tang, Z., Zhao, Y., Yang, L., Qi, S., Fang, D., Chen, X., Gong, X. & Wang, Z., 17/01/2017, In: Mobile Information Systems. 2017, 14 p., 1248578.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. 2016
  27. Published

    A convolution BiLSTM neural network model for Chinese event extraction

    Zeng, Y., Yang, H., Feng, Y., Wang, Z. & Zhao, D., 2/12/2016, Natural Language Understanding and Intelligent Applications: 5th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2016, and 24th International Conference on Computer Processing of Oriental Languages, ICCPOL 2016, Kunming, China, December 2–6, 2016, Proceedings. Lin, C.-Y., Xue, N., Zhao, D., Huang, X. & Feng, Y. (eds.). Cham: Springer, p. 275-287 13 p. ( Lecture Notes in Computer Science; vol. 10102).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    Improving first order temporal fact extraction with unreliable data

    Luo, B., Feng, Y., Wang, Z. & Zhao, D., 2/12/2016, Natural Language Understanding and Intelligent Applications: 5th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2016, and 24th International Conference on Computer Processing of Oriental Languages, ICCPOL 2016, Kunming, China, December 2–6, 2016, Proceedings. Lin, C.-Y., Xue, N., Zhao, D., Huang, X. & Feng, Y. (eds.). Cham: Springer, p. 251-262 12 p. (Lecture Notes in Computer Science; vol. 10102).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top