Bibo Tu

Orcid: 0000-0002-0278-7420

According to our database1, Bibo Tu authored at least 54 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EI-XIDS: An explainable intrusion detection system based on integration framework.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Continuous Authentication Technology Based on Device Driver Behavior.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

An Efficient Caching Mechanism for End-host Network Functions.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Desktop Virtualization Optimization Methods Based on IDV Architecture.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer.
Comput. Secur., April, 2023

HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation.
IEEE Trans. Dependable Secur. Comput., 2023

Multisensor-Based Continuous Authentication of Smartphone Users With Two-Stage Feature Extraction.
IEEE Internet Things J., 2023

2022
Relative Attention-based One-Class Adversarial Autoencoder for Continuous Authentication of Smartphone Users.
CoRR, 2022

The Shared Memory Based Cryptographic Card Virtualization.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge Graph.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

A Secure and Efficient USB-based In-band Communication Interface between Host and BMC.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

A Novel Discrete Bi-objective Optimization Method for Virtual Machine Placement.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Secure and Efficient BMC-Based Centralized Management Method for Large-Scale Data Centers.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Evaluation and Optimization on Virtualization Performance Cost under Semantic Gap.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings.
Cybersecur., 2021

Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center.
Proceedings of the 20th IEEE International Conference on Trust, 2021

AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Evalt: Authenticate Implicitly Before Attacks.
Proceedings of the 28th International Conference on Telecommunications, 2021

HyperKRP: A Kernel Runtime Security Architecture with A Tiny Hypervisor on Commodity Hardware.
Proceedings of the IEEE Global Communications Conference, 2021

A Keystroke-based Continuous User Authentication in Virtual Desktop Infrastructure.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

HypFDI: Fault Domain Isolation for Hosted Hypervisor in ARM.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

2019
HyperBench: A Benchmark Suite for Virtualization Capabilities.
Proc. ACM Meas. Anal. Comput. Syst., 2019

HyperMI: A Privilege-level VM Protection Approach against Compromised Hypervisor.
Proceedings of the 18th IEEE International Conference On Trust, 2019

SecFT-SDN: Securing the Flow-Table for Software-Defined Network.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

HP-SDDAN: High-Performance Software-Defined Data Access Network.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

T-VMI: Trusted Virtual Machine Introspection in Cloud Environments.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2014
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Container-Based Job Management for Fair Resource Sharing.
Proceedings of the Supercomputing - 28th International Supercomputing Conference, 2013

An Adaptive Resource Sharing Platform for Internet Data Center.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Performance analysis and optimization of MPI collective operations on multi-core clusters.
J. Supercomput., 2012

2011
Improving Data Locality of MapReduce by Scheduling in Homogeneous Computing Environments.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

2010
Transformer: A New Paradigm for Building Data-Parallel Programming Models.
IEEE Micro, 2010

Automatic Performance Debugging of SPMD Parallel Programs
CoRR, 2010

Accelerating Spatial Data Processing with MapReduce.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms
CoRR, 2009

Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs
CoRR, 2009

Accurate Analytical Models for Message Passing on Multi-core Clusters.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

2008
A Fast-Start, Fault-Tolerant MPI Launcher on Dawning Supercomputers.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

Design Techniques for the Scalability of Cluster Management Software on Dawning Supercomputers.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Multi-core aware optimization for MPI collectives.
Proceedings of the 2008 IEEE International Conference on Cluster Computing, 29 September, 2008

2007
The design methodology of Phoenix cluster system software stack.
Proceedings of the CHINA HPC 2007, 2007

A layered design methodology of cluster system stack.
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007

2006
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Design Patterns of Scalable Cluster System Software.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

PhoenixG: A Unified Management Framework for Industrial Information Grid.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

A Failure-Aware Scheduling Strategy in Large-Scale Cluster System.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2003
Disk I/O mixed scheduling strategy for VoD servers.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003


  Loading...