2025
A dimension-independent method for updating topological models of 4D spatio-temporal data based on generalized maps.
Earth Sci. Informatics, February, 2025
2024
Underwater image object detection based on multi-scale feature fusion.
Mach. Vis. Appl., November, 2024
Development and Application of a Novel Tsunami Monitoring System Based on Submerged Mooring.
Sensors, September, 2024
AniSora: Exploring the Frontiers of Animation Video Generation in the Sora Era.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
A 430-μA 68.2-dB-SNR 133-dBSPL-AOP CMOS-MEMS Digital Microphone Based on Electrostatic Force Feedback Control.
Proceedings of the IEEE Symposium on VLSI Technology and Circuits 2024, 2024
A Federated Stochastic Multi-level Compositional Minimax Algorithm for Deep AUC Maximization.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Outage performance analysis for relay-assisted UWOC systems over GGD weak turbulence with nonzero boresight pointing errors.
Phys. Commun., June, 2023
Federated Compositional Deep AUC Maximization.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Distributed Optimization for Big Data Analytics: Beyond Minimization.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
A Compressive Sensing and Denoising RCAN-Based Channel Estimation Scheme for OTFS System.
Proceedings of the 22nd International Symposium on Communications and Information Technologies, 2023
SynthMix: Mixing Up Aligned Synthesis for Medical Cross-Modality Domain Adaptation.
Proceedings of the 20th IEEE International Symposium on Biomedical Imaging, 2023
2022
Imitate then Transcend: Multi-Agent Optimal Execution with Dual-Window Denoise PPO.
CoRR, 2022
CycleResume: A Cycle Learning Framework with Hybrid Attention for Fine-Grained Talent-Job Fit.
Proceedings of the Artificial Intelligence - Second CAAI International Conference, 2022
Unsupervised Domain Adaptive Fundus Image Segmentation with Few Labeled Source Data.
Proceedings of the 33rd British Machine Vision Conference 2022, 2022
2021
The Impact of Macroeconomic Uncertainty on China's Stock Market - - Take the Shanghai Composite Index as an Example.
Proceedings of the IPEC 2021: 2nd Asia-Pacific Conference on Image Processing, 2021
Research on the Impact of Work Flexibility on Employee Happiness - Based on the Perspective of Ecological Balance Theory.
Proceedings of the ICEME 2021: The 12th International Conference on E-business, Management and Economics, Beijing, China, July 17, 2021
2019
Asymptotic Stability of Nonlinear Impulsive Stochastic Systems with Markovian Switching.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019
ResumeGAN: An Optimized Deep Representation Learning Framework for Talent-Job Fit via Adversarial Learning.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection.
IEEE Trans. Emerg. Top. Comput., 2018
How to Find a Perfect Data Scientist: A Distance-Metric Learning Approach.
IEEE Access, 2018
ResumeNet: A Learning-Based Framework for Automatic Resume Quality Assessment.
Proceedings of the IEEE International Conference on Data Mining, 2018
2017
Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Secur. Comput., 2017
2016
Direct Resource Hijacking in Android.
IEEE Internet Comput., 2016
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Demonstration of Encrypted Logistics Information System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015
Invalidating Idealized BGP Security Proposals and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015
Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes.
Scientometrics, 2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015
Assessing Attack Surface with Component-Based Package Dependency.
Proceedings of the Network and System Security - 9th International Conference, 2015
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms.
IEEE Trans. Mob. Comput., 2014
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment.
ACM Trans. Auton. Adapt. Syst., 2014
Improved anonymous proxy re-encryption with CCA security.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Behavioral Attestation for Web Services using access policies.
Multim. Tools Appl., 2013
Cherub: Fine-grained application protection with on-demand virtualization.
Comput. Math. Appl., 2013
A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids.
IEEE Access, 2013
ACaaS: Access Control as a Service for IaaS Cloud.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Contextualized information-centric home network.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Lattice-Based Multi-party Concurrent Signatures Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Information-centric networking based homenet.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Towards software defined ICN based edge-cloud services.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013
AppInk: watermarking android apps for repackaging deterrence.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
IEEE Trans. Inf. Forensics Secur., 2012
Remote Attestation with Domain-Based Integrity Model and Policy Analysis.
IEEE Trans. Dependable Secur. Comput., 2012
An Android runtime security policy enforcement framework.
,
,
,
,
,
,
,
,
,
,
Pers. Ubiquitous Comput., 2012
White organic light-emitting devices with a solution-processed small molecular emission layer.
Displays, 2012
Multiparty Cloud Computation
CoRR, 2012
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
On-demand security service.
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012
Chrome Extensions: Threat Analysis and Countermeasures.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Supporting seamless mobility in named data networking.
Proceedings of IEEE International Conference on Communications, 2012
Towards end-to-end secure content storage and delivery with public cloud.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security.
Proceedings of the Computing Frontiers Conference, CF'12, 2012
STC 2012: the seventh ACM workshop on scalable trusted computing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Supporting dual-mode forwarding in content-centric network.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012
2011
Runtime Administration of an RBAC Profile for XACML.
IEEE Trans. Serv. Comput., 2011
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing.
Mob. Networks Appl., 2011
Unleashing the Power of Mobile Cloud Computing using ThinkAir
CoRR, 2011
Patient-centric authorization framework for electronic healthcare services.
Comput. Secur., 2011
Taming Information-Stealing Smartphone Applications (on Android).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Botnet with Browser Extensions.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.
Proceedings of the Security and Privacy in Communication Networks, 2011
xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Towards name-based trust and security for content-centric network.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Towards Secure Mobile Virtual Group in information-centric network.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011
2010
Behavioral Attestation for Web Services Based Business Processes.
Int. J. Web Serv. Res., 2010
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurr. Comput. Pract. Exp., 2010
pBMDS: a behavior-based malware detection system for cellphone devices.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers.
Proceedings of the POLICY 2010, 2010
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010
Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010
On Leveraging Stochastic Models for Remote Attestation.
Proceedings of the Trusted Systems - Second International Conference, 2010
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Proceedings of the Computer Security, 2010
Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Towards secure dynamic collaborations with group-based RBAC model.
Comput. Secur., 2009
Remote Attestation of Attribute Updates and Information Flows in a UCON System.
Proceedings of the Trusted Computing, 2009
Designing System-Level Defenses against Cellphone Malware.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
VirusMeter: Preventing Your Cellphone from Spies.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Towards Session-Aware RBAC Administration and Enforcement with XACML.
Proceedings of the POLICY 2009, 2009
Towards a Usage Control Policy Specification with Petri Nets.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Behavioral Attestation for Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2009
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009
Towards System Integrity Protection with Graph-Based Policy Analysis.
Proceedings of the Data and Applications Security XXIII, 2009
A usage control policy specification with Petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Building a stateful reference monitor with coloured petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Securing elastic applications on mobile devices for cloud computing.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
A Secure DVB Set-Top Box via Trusting Computing Technologies.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Exploitation and threat analysis of open mobile devices.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009
2008
Toward a Usage-Based Security Framework for Collaborative Computing Systems.
ACM Trans. Inf. Syst. Secur., 2008
Behavioral attestation for web services (BA4WS).
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Security Enforcement Model for Distributed Usage Control.
Proceedings of the IEEE International Conference on Sensor Networks, 2008
A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Model-based behavioral attestation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Systematic Policy Analysis for High-Assurance Services in SELinux.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Access control in Group Communication Systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Towards a Group-Based RBAC Model and Decentralized User-Role Administration.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Access Control Model for Sharing Composite Electronic Health Records.
Proceedings of the Collaborative Computing: Networking, 2008
Usage control platformization via trustworthy SELinux.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
A Trusted Mobile Phone Prototype.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
A technical architecture for enforcing usage control requirements in service-oriented architectures.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Towards a VMM-based usage control framework for OS kernel integrity protection.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Flexible Authorization with Decentralized Access Control Model for Grid Computing.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
A Model-Driven Framework for Trusted Computing Based Systems.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007
Towards a Times-Based Usage Control Model.
Proceedings of the Data and Applications Security XXI, 2007
SecureBus: towards application-transparent trusted computing with mandatory access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
A trusted mobile phone reference architecturevia secure kernel.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
2006
An effective role administration model using organization structure.
ACM Trans. Inf. Syst. Secur., 2006
Client-side access control enforcement using trusted computing and PEI models.
J. High Speed Networks, 2006
A usage-based authorization framework for collaborative computing systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
Proceedings of the Advances in Information and Computer Security, 2006
ROBAC: Scalable Role and Organization Based Access Control Models.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Supporting Ad-hoc Collaboration with Group-based RBAC Model.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
Safety analysis of usage control authorization models.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Secure information sharing enabled by Trusted Computing and PEI models.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
A general design towards secure ad-hoc collaboration.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006
2005
Formal model and policy specification of usage control.
ACM Trans. Inf. Syst. Secur., 2005
Enhancing Data Authenticity and Integrity in P2P Systems.
IEEE Internet Comput., 2005
Securing credit card transactions with one-time payment scheme.
Electron. Commer. Res. Appl., 2005
Peer-to-peer access control architecture using trusted computing technology.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
An attribute-based access matrix model.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
2004
A logical specification for usage control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
A Security-Enhanced One-Time Payment Scheme for Credit Card.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004
Attribute Mutability in Usage Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
PBDM: a flexible delegation model in RBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Schema Based XML Security: RBAC Approach.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003