Chunlu Wang

According to our database1, Chunlu Wang authored at least 37 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Whisper: Timing the Transient Execution to Leak Secrets and Break KASLR.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
PMU-Spill: A New Side Channel for Transient Execution Attacks.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Exploration and Exploitation of Hidden PMU Events.
CoRR, 2023

Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs.
CoRR, 2023

Exploration and Exploitation of Hidden PMU Events.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program Classification.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

PMU-Leaker: Performance Monitor Unit-Based Realization of Cache Side-Channel Attacks.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

Overtake: Achieving Meltdown-type Attacks with One Instruction.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2022
PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets.
CoRR, 2022

Model Checking for Microarchitectural Data Sampling Security.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

2021
VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Sea force control Design based on a passive Index.
Int. J. Robotics Autom., 2021

Solving multi-depot electric vehicle scheduling problem by column generation and genetic algorithm.
Appl. Soft Comput., 2021

2020
A multi-objective genetic algorithm based approach for dynamical bus vehicles scheduling under traffic congestion.
Swarm Evol. Comput., 2020

2019
The Research of Alcohol Drinking State Analyzing Based on Smart Watch Data.
Digit. Investig., 2019

A genetic algorithm based column generation method for multi-depot electric bus vehicle scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

An Ant Colony Optimization based Approach to Adjust Public Transportation Network.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Hybridizing tabu search with mathematical programming for solving a single row layout problem.
Proceedings of the 14th IEEE International Conference on Automation Science and Engineering, 2018

A Multiobjective Genetic Algorithm Based Dynamic Bus Vehicle Scheduling Approach.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2018

2017
Efficient and Secure Certificateless Proxy Re-Encryption.
KSII Trans. Internet Inf. Syst., 2017

Computation Error Analysis of Block Floating Point Arithmetic Oriented Convolution Neural Network Accelerator Design.
CoRR, 2017

2016
A MOEA/D based approach for hospital department layout design.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

2015
A MOEA/D based approach for solving robust double row layout problem.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

2014
An Accident Severity Classification Model Based on Multi-Objective Particle Swarm Optimization.
IEICE Trans. Inf. Syst., 2014

A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis.
Appl. Artif. Intell., 2014

2013
A novel multi-objective particle swarm optimization with <i>K</i>-means based global best selection strategy.
Int. J. Comput. Intell. Syst., 2013

Effectively auditing IaaS cloud servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

TH_Cloudkey: Fast, Secure and Lowcost Backup System for Using Public Cloud Storage.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
Vulnerability Evaluating Based on Attack Graph.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2011
RFID Enabled Vehicular Network for Ubiquitous Travel Query.
Int. J. Syst. Serv. Oriented Eng., 2011

A Bayesian regularized neural network approach to short-term traffic speed prediction.
Proceedings of the IEEE International Conference on Systems, 2011

RFID enabled vehicular wireless query for Travel Information in Intelligent Transportation System.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

A Novel Comprehensive Network Security Assessment Approach.
Proceedings of IEEE International Conference on Communications, 2011

2010
An urban traffic speed fusion method based on principle component analysis and neural network.
Proceedings of the International Joint Conference on Neural Networks, 2010

A Model for Evaluating Connectivity Availability in Random Sleep Scheduled Delay-Tolerant Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2007
Component Based Legacy Program Executing over Grid.
Proceedings of the Grid and Cooperative Computing, 2007


  Loading...