2025
Revisiting Classification Taxonomy for Grammatical Errors.
CoRR, February, 2025
Position: LLMs Can be Good Tutors in Foreign Language Education.
CoRR, February, 2025
MalSensor: Fast and Robust Windows Malware Classification.
ACM Trans. Softw. Eng. Methodol., January, 2025
MalPacDetector: An LLM-Based Malicious NPM Package Detector.
IEEE Trans. Inf. Forensics Secur., 2025
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System.
IEEE Trans. Inf. Forensics Secur., 2025
2024
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention.
IEEE Trans. Reliab., September, 2024
PASSP: A Private Authorization Scheme Oriented Service Providers.
IEEE Trans. Netw. Serv. Manag., August, 2024
Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone Detection.
IEEE Trans. Reliab., June, 2024
Toward Automated Attack Discovery in SDN Controllers Through Formal Verification.
IEEE Trans. Netw. Serv. Manag., June, 2024
An Empirical Study on Android Malware Characterization by Social Network Analysis.
IEEE Trans. Reliab., March, 2024
Tensor Recurrent Neural Network With Differential Privacy.
IEEE Trans. Computers, March, 2024
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor.
IEEE Trans. Inf. Forensics Secur., 2024
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure.
IEEE Trans. Dependable Secur. Comput., 2024
DFier: A directed vulnerability verifier for Ethereum smart contracts.
J. Netw. Comput. Appl., 2024
DT-Block: Adaptive vertical federated reinforcement learning scheme for secure and efficient communication in 6G.
Comput. Networks, 2024
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
Proceedings of the Computer Security - ESORICS 2024, 2024
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
UniEmbedding: Learning Universal Multi-Modal Multi-Domain Item Embeddings via User-View Contrastive Learning.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Network intrusion detection based on the temporal convolutional model.
Comput. Secur., December, 2023
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection.
IEEE Trans. Software Eng., September, 2023
On the Security of Smart Home Systems: A Survey.
J. Comput. Sci. Technol., April, 2023
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G.
Future Gener. Comput. Syst., April, 2023
An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders.
IEEE Trans. Smart Grid, March, 2023
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform.
IEEE Trans. Dependable Secur. Comput., 2023
Does OpenBSD and Firefox's Security Improve With Time?
IEEE Trans. Dependable Secur. Comput., 2023
Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
Double Attention Convolutional Neural Network for Sequential Recommendation.
ACM Trans. Web, 2022
Aroc: An Automatic Repair Framework for On-Chain Smart Contracts.
IEEE Trans. Software Eng., 2022
Differentially Private Tripartite Intelligent Matching Against Inference Attacks in Ride-Sharing Services.
IEEE Trans. Intell. Transp. Syst., 2022
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector.
IEEE Trans. Dependable Secur. Comput., 2022
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2022
A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks.
IEEE Netw., 2022
Utility-Prioritized Differential Privacy for Quantitative Biomedical Data.
J. Circuits Syst. Comput., 2022
HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability.
IEEE Internet Things J., 2022
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach.
Comput. Commun., 2022
SAND: semi-automated adaptive network defense via programmable rule generation and deployment.
Sci. China Inf. Sci., 2022
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Detecting Semantic Code Clones by Building AST-based Markov Chains Model.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
VulCNN: An Image-inspired Scalable Vulnerability Detection System.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching.
ACM Trans. Softw. Eng. Methodol., 2021
IntDroid: Android Malware Detection Based on API Intimacy Analysis.
ACM Trans. Softw. Eng. Methodol., 2021
Detecting Malicious Switches for a Secure Software-defined Tactile Internet.
ACM Trans. Internet Techn., 2021
CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships.
IEEE Trans. Inf. Forensics Secur., 2021
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment.
IEEE Trans. Emerg. Top. Comput., 2021
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
IEEE Trans. Dependable Secur. Comput., 2021
DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment.
IEEE Trans. Cloud Comput., 2021
Trustzone-based secure lightweight wallet for hyperledger fabric.
J. Parallel Distributed Comput., 2021
Ethereum smart contract security research: survey and future research opportunities.
Frontiers Comput. Sci., 2021
Towards Making Deep Learning-based Vulnerability Detectors Robust.
CoRR, 2021
Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning.
CoRR, 2021
Heterogeneous differential privacy for vertically partitioned databases.
Concurr. Comput. Pract. Exp., 2021
Automatically derived stateful network functions including non-field attributes.
Proceedings of the 20th IEEE International Conference on Trust, 2021
HomDroid: detecting Android covert malware by social-network homophily analysis.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment.
IEEE Trans. Parallel Distributed Syst., 2020
Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management.
IEEE Trans. Netw. Sci. Eng., 2020
SDTE: A Secure Blockchain-Based Data Trading Ecosystem.
IEEE Trans. Inf. Forensics Secur., 2020
FSFC: An input filter-based secure framework for smart contract.
J. Netw. Comput. Appl., 2020
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services.
IEEE Internet Things J., 2020
HostWatcher: Protecting hosts in cloud data centers through software-defined networking.
Future Gener. Comput. Syst., 2020
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
CoRR, 2020
Static detection of real-world buffer overflow induced by loop.
Comput. Secur., 2020
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms.
Comput. Networks, 2020
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Automated Patch Correctness Assessment: How Far are We?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
BED: A Block-Level Deduplication-Based Container Deployment Framework.
Proceedings of the Green, Pervasive, and Cloud Computing - 15th International Conference, 2020
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
2019
Defending Against Flow Table Overloading Attack in Software-Defined Networks.
IEEE Trans. Serv. Comput., 2019
A domain-divided configurable security model for cloud computing-based telecommunication services.
J. Supercomput., 2019
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment.
IEEE Trans. Big Data, 2019
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.
IEEE Internet Things J., 2019
A Comparative Study of Deep Learning-Based Vulnerability Detection System.
IEEE Access, 2019
An Optimized Static Propositional Function Model to Detect Software Vulnerability.
IEEE Access, 2019
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process.
Proceedings of the Green, Pervasive, and Cloud Computing - 14th International Conference, 2019
2018
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
Dataset, November, 2018
A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
DigHR: precise dynamic detection of hidden races with weak causal relation analysis.
J. Supercomput., 2018
Validating User Flows to Protect Software Defined Network Environments.
Secur. Commun. Networks, 2018
TNGuard: Securing IoT Oriented Tenant Networks Based on SDN.
IEEE Internet Things J., 2018
RollSec: Automatically Secure Software States Against General Rollback.
Int. J. Parallel Program., 2018
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
CoRR, 2018
A Fine-Grained Multi-Tenant Permission Management Framework for SDN and NFV.
IEEE Access, 2018
Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network.
IEEE Access, 2018
SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone.
IEEE Access, 2018
SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks.
IEEE Access, 2018
BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation.
IEEE Access, 2018
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance.
Proceedings of the IEEE INFOCOM 2018, 2018
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
A Heuristic Framework to Detect Concurrency Vulnerabilities.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Automatically Identifying Security Bug Reports via Multitype Features Analysis.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
A dynamic predictive race detector for C/C++ programs.
J. Supercomput., 2017
A Secure, Usable, and Transparent Middleware for Permission Managers on Android.
IEEE Trans. Dependable Secur. Comput., 2017
Fully Reversible Privacy Region Protection for Cloud Video Surveillance.
IEEE Trans. Cloud Comput., 2017
Privacy preserving search over multiple servers.
Int. J. Auton. Adapt. Commun. Syst., 2017
Saudi cloud infrastructure: a security analysis.
Sci. China Inf. Sci., 2017
Virtualization of the Encryption Card for Trust Access in Cloud Computing.
IEEE Access, 2017
CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection.
IEEE Access, 2017
Patch-Related Vulnerability Detection Based on Symbolic Execution.
IEEE Access, 2017
Libsec: A Hardware Virtualization-Based Isolation for Shared Library.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Reducing LDPC Soft Sensing Latency by Lightweight Data Refresh for Flash Read Performance Improvement.
Proceedings of the 54th Annual Design Automation Conference, 2017
Fully Context-Sensitive CFI for COTS Binaries.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
A Framework for Practical Dynamic Software Updating.
IEEE Trans. Parallel Distributed Syst., 2016
Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos.
IEEE Trans. Emerg. Top. Comput., 2016
CloudMon: Monitoring Virtual Machines in Clouds.
IEEE Trans. Computers, 2016
Privacy preserving in cloud computing environment.
Secur. Commun. Networks, 2016
Taming transitive permission attack via bytecode rewriting on Android application.
Secur. Commun. Networks, 2016
CDMCR: multi-level fault-tolerant system for distributed applications in cloud.
Secur. Commun. Networks, 2016
软件漏洞静态检测模型及检测框架 (Static Detection Model and Framework for Software Vulnerability).
计算机科学, 2016
UiLog: Improving Log-Based Fault Diagnosis by Log Analysis.
J. Comput. Sci. Technol., 2016
Theory and methodology of research on cloud security.
Sci. China Inf. Sci., 2016
PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Privacy-Preserving Image Retrieval in IoT-Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Robust scheme to protect authentication code of message/image documents in cloud computing.
Proceedings of the 2016 International Conference on Computing, 2016
Towards Secure Private Image Matching.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
VulPecker: an automated vulnerability detection system based on code similarity analysis.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
A privacy-preserving location tracking system for smartphones based on cloud storage.
Secur. Commun. Networks, 2015
TEE: A virtual DRTM based execution environment for secure cloud-end computing.
Future Gener. Comput. Syst., 2015
A lightweight software fault-tolerance system in the cloud environment.
Concurr. Comput. Pract. Exp., 2015
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Privacy Protection for Perceptual Applications on Smartphones.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Evaluating Latency-Sensitive Applications: Performance Degradation in Datacenters with Restricted Power Budget.
Proceedings of the 44th International Conference on Parallel Processing, 2015
CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems.
Proceedings of the 25. International Conference on Electronics, 2015
Multi-version Execution for the Dynamic Updating of Cloud Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
UaaS: Software Update as a Service for the IaaS Cloud.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
2014
CloudTaint: an elastic taint tracking framework for malware detection in the cloud.
J. Supercomput., 2014
Memshepherd: comprehensive memory bug fault-tolerance system.
Secur. Commun. Networks, 2014
Developing resource consolidation frameworks for moldable virtual machines in clouds.
Future Gener. Comput. Syst., 2014
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing.
Comput. J., 2014
Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
ONHelp: Components in Building Secure Cloud Based on OpenNebula.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Improving Log-Based Fault Diagnosis by Log Classification.
Proceedings of the Network and Parallel Computing, 2014
StrongUpdate: An Immediate Dynamic Software Update System for Multi-threaded Applications.
Proceedings of the Human Centered Computing - First International Conference, 2014
FDKeeper: A Quick and Open Failure Detector for Cloud Computing System.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014
2013
A VMM-based intrusion prevention system in cloud computing environment.
J. Supercomput., 2013
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2013
Community Vitality in Dynamic Temporal Networks.
Int. J. Distributed Sens. Networks, 2013
CloudAC: a cloud-oriented multilayer access control system for logic virtual domain.
IET Inf. Secur., 2013
Design and implementation of a trusted monitoring framework for cloud platforms.
Future Gener. Comput. Syst., 2013
Cherub: Fine-grained application protection with on-demand virtualization.
Comput. Math. Appl., 2013
2012
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas.
Secur. Commun. Networks, 2012
Task-based behavior detection of illegal codes.
Math. Comput. Model., 2012
A standards-based interoperable single sign-on framework in ARC Grid middleware.
J. Netw. Comput. Appl., 2012
Encrypted Remote User Authentication Scheme by Using Smart Card.
Proceedings of the Web Information Systems and Mining - International Conference, 2012
A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
A comprehensive monitoring framework for virtual computing environment.
Proceedings of the 2012 International Conference on Information Networking, 2012
Approximate Keyword-based Search over Encrypted Cloud Data.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Towards Privacy Preserving Mining over Distributed Cloud Databases.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
A Cloud Computing Management System Platform Based on Power-Sensitive Resource.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
2011
Building Automated Trust Negotiation architecture in virtual computing environment.
J. Supercomput., 2011
Optimizing Resource Consumptions in Clouds.
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011
RAPn: Network Attack Prediction Using Ranking Access Petri Net.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011
Modelling Workflow Executions under Role-Based Authorisation Control.
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
Constructing trusted virtual execution environment in P2P grids.
Future Gener. Comput. Syst., 2010
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurr. Comput. Pract. Exp., 2010
A guest-transparent file integrity monitoring method in virtualization environment.
Comput. Math. Appl., 2010
Autonomous agent based intrusion detection in virtual computing environment.
Proceedings of the IEEE International Conference on Wireless Communications, 2010
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010
TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment.
J. Netw. Comput. Appl., 2009
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009
CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions.
Proceedings of the Systems and Virtualization Management. Standards and the Cloud, 2009
VMFence: a customized intrusion prevention system in distributed virtual computing environment.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
DVM-MAC: A Mandatory Access Control System in Distributed Virtual Computing Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009
Trusted Deployment of Virtual Execution Environment in Grid Systems.
Proceedings of the Advances in Computer Science, 2009
2008
Trusted virtual machine monitor-based group signature architecture.
IET Commun., 2008
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Heterogeneous Grid Workflow Management Based on Virtual Service.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008
A Trusted Group Signature Architecture in Virtual Computing Environment.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Extending HLA/RTI to WAN Based on Grid Service.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
A Novel Approach to Hide Credentials.
Int. J. Netw. Secur., 2007
Service, Security and Its Data Management for Ubiquitous Computing - Overview.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
A Hidden Credential Based Oblivious Automated Trust Negotiation Model.
Proceedings of ICEBE 2007, 2007
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007
Grid Security Interoperation between CGSP and VEGA.
Proceedings of the Future Generation Communication and Networking, 2007
A Scalable Service Scheme for Secure Group Communication in Grid.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
An EMAIL Based Automated Trust Negotiation Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
An Authentication and Access Control Framework for Group Communication Systems in Grid Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Research on Group Signature Scheme with Forward Security.
J. Comput. Res. Dev., 2006
DRIC: Dependable Grid Computing Framework.
IEICE Trans. Inf. Syst., 2006
A New Approach to Hide Policy for Automated Trust Negotiation.
Proceedings of the Advances in Information and Computer Security, 2006
Replica Based Distributed Metadata Management in Grid Environment.
Proceedings of the Computational Science, 2006
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
Service organisation and information consistency for service grid.
Int. J. Web Grid Serv., 2005
An adaptive meta-scheduler for data-intensive applications.
Int. J. Grid Util. Comput., 2005
RB-GACA: an RBAC based grid access control architecture.
Int. J. Grid Util. Comput., 2005
Uniform Authorization Management in ChinaGrid Support Platform.
Proceedings of the Parallel and Distributed Processing and Applications, 2005
A Novel Authorization Mechanism for Service-Oriented Virtual Organization.
Proceedings of the Computer and Information Sciences, 2005
Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
A Formal General Framework and Service Access Model for Service Grid.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005
QoS Oriented Dynamic Replica Cost Model for P2P Computing.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
VO-Sec: An Access Control Framework for Dynamic Virtual Organization.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
ALTER: Adaptive Failure Detection Services for Grids.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005
Joint Management of Authorization for Dynamic Virtual Organization.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
RT-Grid: A QoS Oriented Service Grid Framework.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Reliability Analysis for Grid Computing.
Proceedings of the Grid and Cooperative Computing, 2004
A Novel VO-Based Access Control Model for Grid.
Proceedings of the Grid and Cooperative Computing, 2004
Real-Time Strategy and Practice in Service Grid.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Early Experience in QoS-Based Service Grid Architecture.
Proceedings of the Advanced Web Technologies and Applications, 2004
2003
Fault-Tolerant Grid Architecture and Practice.
J. Comput. Sci. Technol., 2003
A Data Mining Based Intrusion Detection Model.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003
HH-MDS: A QoS-Aware Domain Divided Information Service.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
RB-GACA: A RBAC Based Grid Access Control Architecture.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003