2023
Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Collaborative Cache in 5G+ Edge Computing Environment.
Proceedings of the Wireless Internet - 16th EAI International Conference, 2023
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing.
Proceedings of the Wireless Internet - 16th EAI International Conference, 2023
Propelling Pedagogical Paradigms: A Study of Advanced Human-Computer Interaction Learning in Data Structure and Algorithms Based on Virtual Reality Technology.
Proceedings of the Computer Science and Education. Educational Digitalization, 2023
Human-AI Collaboration: A Study on Anti-ChatGPT Strategies Employed in Innovative Practical Homework Towards "One-Click-Answer" Issue in AIGC.
Proceedings of the Computer Science and Education. Educational Digitalization, 2023
A Role Engineering Approach Based on Spectral Clustering Analysis for Restful Permissions in Cloud.
Proceedings of the IEEE International Conference on Acoustics, 2023
2021
Hard Disk Failure Prediction Based on Lightgbm with CID.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
2020
Identifying the Motives of Using Weibo from Digital Traces.
Proceedings of the NLPIR 2020: 4th International Conference on Natural Language Processing and Information Retrieval, 2020
ADF2T: an Active Disk Failure Forecasting and Tolerance Software.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
ZTE-Predictor: Disk Failure Prediction System Based on LSTM.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
2019
PTAD: Provable and Traceable Assured Deletion in Cloud Storage.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
S3R5: A Snapshot Storage System Based on ROW with Rapid Rollback, Recovery and Read-Write.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
uSendfile: A User-Space Sendfile Verb Based on Flash and RDMA.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
HDR video quality assessment: Perceptual evaluation of compressed HDR video.
J. Vis. Commun. Image Represent., 2018
Memory Cache Attacks on Alluxio Impede High Performance Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
A joint Bloom Filter and cross-encoding for data verification and recovery in cloud.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
FMR-PDP: Flexible multiple-replica provable data possession in cloud storage.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017
RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
MCS: Memory Constraint Strategy for Unified Memory Manager in Spark.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
The Research and Implementation of the Fine-Grained Implicit Authentication Framework for Android.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017
2016
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service.
Proceedings of the Information Systems Security and Privacy, 2016
DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Sift - An Efficient Method for Co-residency Detection on Amazon EC2.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
SECapacity: A Secure Capacity Scheduler in YARN.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in Storm.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
2015
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts.
Proceedings of the Security and Privacy in Communication Networks, 2015
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2013
Securing data services: a security architecture design for private storage cloud based on HDFS.
Int. J. Grid Util. Comput., 2013
2012
SAPSC: Security Architecture of Private Storage Cloud Based on HDFS.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
A Way of Key Management in Cloud Storage Based on Trusted Computing.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
SecDM: Securing Data Migration between Cloud Storage Systems.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Towards Data Isolation & Collaboration in Storage Cloud.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011
2009
Exploiting Text Content in Image Search by Semi-supervised Learning Techniques.
Proceedings of the IEEE International Conference on Systems, 2009
Multi-Instance Multi-Label Learning For Automatic Tag Recommendation.
Proceedings of the IEEE International Conference on Systems, 2009
A General Framework of Feature Selection for Text Categorization.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
An Automated Mechanism of Security Test on Network Protocols.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Research on Intrusion Detection Based on an Improved SOM Neural Network.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Improving BitTorrent Network's Performance via Deploying Helpers.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008