Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Shaoyin
    Last name: Cheng
    DBLP: 21/2249
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 17 of 17  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Fan Jiang, Cen Zhang, Shaoyin Cheng.
    FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability.
    Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II 2017 (0) 2017
    Conference paper
    Xun Wei, Fan Jiang, Feng Wei, Jiekui Zhang, Weiwei Liao, Shaoyin Cheng.
    An Ensemble Model for Diabetes Diagnosis in Large-scale and Imbalanced Dataset.
    Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy, May 15-17, 2017 2017 (0) 2017
    Conference paper
    Feng Wei, Hao Guo, Shaoyin Cheng, Fan Jiang.
    AALRSMF: An Adaptive Learning Rate Schedule for Matrix Factorization.
    Web Technologies and Applications - 18th Asia-Pacific Web Conference, APWeb 2016, Suzhou, China, September 23-25, 2016. Proceedings, Part II 2016 (0) 2016
    Conference paper
    Guoyou Sun, Shaoyin Cheng, Fan Jiang.
    Strengthen Software-Defined Network in Cloud.
    18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-1 2016 (0) 2016
    Conference paper
    Liang Cheng, Shaoyin Cheng, Fan Jiang.
    ADKAM: A-Diversity K-Anonymity Model via Microaggregation.
    Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings 2015 (0) 2015
    Conference paper
    Xin Ye, Feng Wei, Fan Jiang, Shaoyin Cheng.
    An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets.
    15th IEEE International Conference on Computer and Information Technology, CIT 2015; 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015; 13th IEEE International Conference on Dependable, Autonomic and Secure Computing 2015 (0) 2015
    Conference paper
    Li Tang, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, He Li, Shaoyin Cheng.
    Awareness and Control of Personal Data Based on the Cyber-I Privacy Model.
    2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 2014 (0) 2014
    Conference paper
    Shaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang.
    Static Detection of Dangerous Behaviors in Android Apps.
    Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings 2013 (0) 2013
    Conference paper
    Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang.
    Novel user influence measurement based on user interaction in microblog.
    Advances in Social Networks Analysis and Mining 2013, ASONAM '13, Niagara, ON, Canada - August 25 - 29, 2013 2013 (0) 2013
    Conference paper
    Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang.
    Effective Method for Promoting Viral Marketing in Microblog.
    International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013 2013 (0) 2013
    Conference paper
    Hui Ye, Shaoyin Cheng, Lanbo Zhang, Fan Jiang.
    DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag.
    The 11th International Conference on Advances in Mobile Computing Multimedia, MoMM '13, Vienna, Austria, December 2-4, 2013 2013 (0) 2013
    Conference paper
    Wenlong Chen, Shaoyin Cheng, Xing He, Fan Jiang.
    InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog.
    2012 Second International Conference on Cloud and Green Computing, CGC 2012, Xiangtan, Hunan, China, November 1-3, 2012 2012 (0) 2012
    Conference paper
    Guangyu Yin, Fan Jiang, Shaoyin Cheng, Xiang Li, Xing He.
    AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks.
    2012 Second International Conference on Cloud and Green Computing, CGC 2012, Xiangtan, Hunan, China, November 1-3, 2012 2012 (0) 2012
    Conference paper
    Ning Jing, Ming Yang, Shaoyin Cheng, Qunfeng Dong, Hui Xiong.
    An efficient SVM-based method for multi-class network traffic classification.
    30th IEEE International Performance Computing and Communications Conference, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011 2011 (0) 2011
    Conference paper
    Shaoyin Cheng, Jun Yang, Jiajie Wang, Jinding Wang, Fan Jiang.
    LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code.
    IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011 2011 (0) 2011
    Conference paper
    Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang.
    PDVDS: A Pattern-Driven Software Vulnerability Detection System.
    IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010, Hong Kong, China, 11-13 December 2010 2010 (0) 2010
    Conference paper
    Shaoyin Cheng, Fan Jiang, Jiajie Wang, Tao Zhang, Xuezhi Xing.
    DBTG: Demand-Driven Backtracking Test Generation.
    Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008 2008 (0) 2008
    Show item 1 to 17 of 17  

    Your query returned 17 matches in the database.