Search Results for author: Qiang Zeng

Found 6 papers, 2 papers with code

Progress in artificial intelligence applications based on the combination of self-driven sensors and deep learning

no code implementations30 Jan 2024 Weixiang Wan, Wenjian Sun, Qiang Zeng, Linying Pan, Jingyu Xu, Bo Liu

In the era of Internet of Things, how to develop a smart sensor system with sustainable power supply, easy deployment and flexible use has become a difficult problem to be solved.

Friction

UMMAFormer: A Universal Multimodal-adaptive Transformer Framework for Temporal Forgery Localization

1 code implementation28 Aug 2023 Rui Zhang, Hongxia Wang, Mingshan Du, Hanqing Liu, Yang Zhou, Qiang Zeng

Our approach introduces a Temporal Feature Abnormal Attention (TFAA) module based on temporal feature reconstruction to enhance the detection of temporal differences.

Binary Classification Temporal Forgery Localization +1

Exploiting the Sensitivity of $L_2$ Adversarial Examples to Erase-and-Restore

no code implementations1 Jan 2020 Fei Zuo, Qiang Zeng

While many countermeasures against AEs have been proposed, detection of adaptive CW-$L_2$ AEs is still an open question.

Open-Ended Question Answering

A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis

1 code implementation23 Dec 2018 Kimberly Redmond, Lannan Luo, Qiang Zeng

As a showcase, we apply the model to resolving one of the most fundamental problems for binary code similarity comparison---semantics-based basic block comparison, and the solution outperforms the code statistics based approach.

Malware Analysis

Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs

no code implementations8 Aug 2018 Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, Zhexin Zhang

The solutions to these two problems have many applications, such as cross-architecture vulnerability discovery and code plagiarism detection.

Machine Translation Translation

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation

no code implementations2 Nov 2016 Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu

We present novel ideas and techniques to resolve the challenges, and have built the first system for symbolic execution of Android Framework.

Cryptography and Security Software Engineering

Cannot find the paper you are looking for? You can Submit a new open access paper.