Deqing Zou

Orcid: 0000-0001-8534-5048

According to our database1, Deqing Zou authored at least 230 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention.
IEEE Trans. Reliab., September, 2024

PASSP: A Private Authorization Scheme Oriented Service Providers.
IEEE Trans. Netw. Serv. Manag., August, 2024

Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone Detection.
IEEE Trans. Reliab., June, 2024

Toward Automated Attack Discovery in SDN Controllers Through Formal Verification.
IEEE Trans. Netw. Serv. Manag., June, 2024

An Empirical Study on Android Malware Characterization by Social Network Analysis.
IEEE Trans. Reliab., March, 2024

Tensor Recurrent Neural Network With Differential Privacy.
IEEE Trans. Computers, March, 2024

PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor.
IEEE Trans. Inf. Forensics Secur., 2024

Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure.
IEEE Trans. Dependable Secur. Comput., 2024

DFier: A directed vulnerability verifier for Ethereum smart contracts.
J. Netw. Comput. Appl., 2024

DT-Block: Adaptive vertical federated reinforcement learning scheme for secure and efficient communication in 6G.
Comput. Networks, 2024

FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
Proceedings of the Computer Security - ESORICS 2024, 2024

Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

UniEmbedding: Learning Universal Multi-Modal Multi-Domain Item Embeddings via User-View Contrastive Learning.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Network intrusion detection based on the temporal convolutional model.
Comput. Secur., December, 2023

Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection.
IEEE Trans. Software Eng., September, 2023

On the Security of Smart Home Systems: A Survey.
J. Comput. Sci. Technol., April, 2023

The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G.
Future Gener. Comput. Syst., April, 2023

An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders.
IEEE Trans. Smart Grid, March, 2023

SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform.
IEEE Trans. Dependable Secur. Comput., 2023

Does OpenBSD and Firefox's Security Improve With Time?
IEEE Trans. Dependable Secur. Comput., 2023

Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Double Attention Convolutional Neural Network for Sequential Recommendation.
ACM Trans. Web, 2022

Aroc: An Automatic Repair Framework for On-Chain Smart Contracts.
IEEE Trans. Software Eng., 2022

Differentially Private Tripartite Intelligent Matching Against Inference Attacks in Ride-Sharing Services.
IEEE Trans. Intell. Transp. Syst., 2022

VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector.
IEEE Trans. Dependable Secur. Comput., 2022

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2022

A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks.
IEEE Netw., 2022

Utility-Prioritized Differential Privacy for Quantitative Biomedical Data.
J. Circuits Syst. Comput., 2022

HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability.
IEEE Internet Things J., 2022

Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach.
Comput. Commun., 2022

SAND: semi-automated adaptive network defense via programmable rule generation and deployment.
Sci. China Inf. Sci., 2022

Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Detecting Semantic Code Clones by Building AST-based Markov Chains Model.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

VulCNN: An Image-inspired Scalable Vulnerability Detection System.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching.
ACM Trans. Softw. Eng. Methodol., 2021

IntDroid: Android Malware Detection Based on API Intimacy Analysis.
ACM Trans. Softw. Eng. Methodol., 2021

Detecting Malicious Switches for a Secure Software-defined Tactile Internet.
ACM Trans. Internet Techn., 2021

CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships.
IEEE Trans. Inf. Forensics Secur., 2021

Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment.
IEEE Trans. Emerg. Top. Comput., 2021

$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
IEEE Trans. Dependable Secur. Comput., 2021

DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment.
IEEE Trans. Cloud Comput., 2021

Trustzone-based secure lightweight wallet for hyperledger fabric.
J. Parallel Distributed Comput., 2021

Ethereum smart contract security research: survey and future research opportunities.
Frontiers Comput. Sci., 2021

Towards Making Deep Learning-based Vulnerability Detectors Robust.
CoRR, 2021

Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning.
CoRR, 2021

Heterogeneous differential privacy for vertically partitioned databases.
Concurr. Comput. Pract. Exp., 2021

Automatically derived stateful network functions including non-field attributes.
Proceedings of the 20th IEEE International Conference on Trust, 2021

HomDroid: detecting Android covert malware by social-network homophily analysis.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment.
IEEE Trans. Parallel Distributed Syst., 2020

Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management.
IEEE Trans. Netw. Sci. Eng., 2020

SDTE: A Secure Blockchain-Based Data Trading Ecosystem.
IEEE Trans. Inf. Forensics Secur., 2020

FSFC: An input filter-based secure framework for smart contract.
J. Netw. Comput. Appl., 2020

Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services.
IEEE Internet Things J., 2020

HostWatcher: Protecting hosts in cloud data centers through software-defined networking.
Future Gener. Comput. Syst., 2020

μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
CoRR, 2020

Static detection of real-world buffer overflow induced by loop.
Comput. Secur., 2020

Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms.
Comput. Networks, 2020

Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020

SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Automated Patch Correctness Assessment: How Far are We?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

BED: A Block-Level Deduplication-Based Container Deployment Framework.
Proceedings of the Green, Pervasive, and Cloud Computing - 15th International Conference, 2020

Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
Defending Against Flow Table Overloading Attack in Software-Defined Networks.
IEEE Trans. Serv. Comput., 2019

A domain-divided configurable security model for cloud computing-based telecommunication services.
J. Supercomput., 2019

A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment.
IEEE Trans. Big Data, 2019

A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.
IEEE Internet Things J., 2019

A Comparative Study of Deep Learning-Based Vulnerability Detection System.
IEEE Access, 2019

An Optimized Static Propositional Function Model to Detect Software Vulnerability.
IEEE Access, 2019

MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process.
Proceedings of the Green, Pervasive, and Cloud Computing - 14th International Conference, 2019

2018
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
Dataset, November, 2018

A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

DigHR: precise dynamic detection of hidden races with weak causal relation analysis.
J. Supercomput., 2018

Validating User Flows to Protect Software Defined Network Environments.
Secur. Commun. Networks, 2018

TNGuard: Securing IoT Oriented Tenant Networks Based on SDN.
IEEE Internet Things J., 2018

RollSec: Automatically Secure Software States Against General Rollback.
Int. J. Parallel Program., 2018

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities.
CoRR, 2018

A Fine-Grained Multi-Tenant Permission Management Framework for SDN and NFV.
IEEE Access, 2018

Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network.
IEEE Access, 2018

SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone.
IEEE Access, 2018

SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks.
IEEE Access, 2018

BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation.
IEEE Access, 2018

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance.
Proceedings of the IEEE INFOCOM 2018, 2018

Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Heuristic Framework to Detect Concurrency Vulnerabilities.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Automatically Identifying Security Bug Reports via Multitype Features Analysis.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A dynamic predictive race detector for C/C++ programs.
J. Supercomput., 2017

A Secure, Usable, and Transparent Middleware for Permission Managers on Android.
IEEE Trans. Dependable Secur. Comput., 2017

Fully Reversible Privacy Region Protection for Cloud Video Surveillance.
IEEE Trans. Cloud Comput., 2017

Privacy preserving search over multiple servers.
Int. J. Auton. Adapt. Commun. Syst., 2017

Saudi cloud infrastructure: a security analysis.
Sci. China Inf. Sci., 2017

Virtualization of the Encryption Card for Trust Access in Cloud Computing.
IEEE Access, 2017

CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection.
IEEE Access, 2017

Patch-Related Vulnerability Detection Based on Symbolic Execution.
IEEE Access, 2017

Libsec: A Hardware Virtualization-Based Isolation for Shared Library.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Reducing LDPC Soft Sensing Latency by Lightweight Data Refresh for Flash Read Performance Improvement.
Proceedings of the 54th Annual Design Automation Conference, 2017

Fully Context-Sensitive CFI for COTS Binaries.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Framework for Practical Dynamic Software Updating.
IEEE Trans. Parallel Distributed Syst., 2016

Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos.
IEEE Trans. Emerg. Top. Comput., 2016

CloudMon: Monitoring Virtual Machines in Clouds.
IEEE Trans. Computers, 2016

Privacy preserving in cloud computing environment.
Secur. Commun. Networks, 2016

Taming transitive permission attack via bytecode rewriting on Android application.
Secur. Commun. Networks, 2016

CDMCR: multi-level fault-tolerant system for distributed applications in cloud.
Secur. Commun. Networks, 2016

软件漏洞静态检测模型及检测框架 (Static Detection Model and Framework for Software Vulnerability).
计算机科学, 2016

UiLog: Improving Log-Based Fault Diagnosis by Log Analysis.
J. Comput. Sci. Technol., 2016

Theory and methodology of research on cloud security.
Sci. China Inf. Sci., 2016

PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Image Retrieval in IoT-Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Robust scheme to protect authentication code of message/image documents in cloud computing.
Proceedings of the 2016 International Conference on Computing, 2016

Towards Secure Private Image Matching.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

VulPecker: an automated vulnerability detection system based on code similarity analysis.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A privacy-preserving location tracking system for smartphones based on cloud storage.
Secur. Commun. Networks, 2015

TEE: A virtual DRTM based execution environment for secure cloud-end computing.
Future Gener. Comput. Syst., 2015

A lightweight software fault-tolerance system in the cloud environment.
Concurr. Comput. Pract. Exp., 2015

CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Privacy Protection for Perceptual Applications on Smartphones.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Evaluating Latency-Sensitive Applications: Performance Degradation in Datacenters with Restricted Power Budget.
Proceedings of the 44th International Conference on Parallel Processing, 2015

CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems.
Proceedings of the 25. International Conference on Electronics, 2015

Multi-version Execution for the Dynamic Updating of Cloud Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

UaaS: Software Update as a Service for the IaaS Cloud.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
CloudTaint: an elastic taint tracking framework for malware detection in the cloud.
J. Supercomput., 2014

Memshepherd: comprehensive memory bug fault-tolerance system.
Secur. Commun. Networks, 2014

Developing resource consolidation frameworks for moldable virtual machines in clouds.
Future Gener. Comput. Syst., 2014

Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing.
Comput. J., 2014

Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

ONHelp: Components in Building Secure Cloud Based on OpenNebula.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Improving Log-Based Fault Diagnosis by Log Classification.
Proceedings of the Network and Parallel Computing, 2014

StrongUpdate: An Immediate Dynamic Software Update System for Multi-threaded Applications.
Proceedings of the Human Centered Computing - First International Conference, 2014

FDKeeper: A Quick and Open Failure Detector for Cloud Computing System.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014

2013
A VMM-based intrusion prevention system in cloud computing environment.
J. Supercomput., 2013

SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2013

Community Vitality in Dynamic Temporal Networks.
Int. J. Distributed Sens. Networks, 2013

CloudAC: a cloud-oriented multilayer access control system for logic virtual domain.
IET Inf. Secur., 2013

Design and implementation of a trusted monitoring framework for cloud platforms.
Future Gener. Comput. Syst., 2013

Cherub: Fine-grained application protection with on-demand virtualization.
Comput. Math. Appl., 2013

2012
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas.
Secur. Commun. Networks, 2012

Task-based behavior detection of illegal codes.
Math. Comput. Model., 2012

A standards-based interoperable single sign-on framework in ARC Grid middleware.
J. Netw. Comput. Appl., 2012

Encrypted Remote User Authentication Scheme by Using Smart Card.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A comprehensive monitoring framework for virtual computing environment.
Proceedings of the 2012 International Conference on Information Networking, 2012

Approximate Keyword-based Search over Encrypted Cloud Data.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Towards Privacy Preserving Mining over Distributed Cloud Databases.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

A Cloud Computing Management System Platform Based on Power-Sensitive Resource.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
Building Automated Trust Negotiation architecture in virtual computing environment.
J. Supercomput., 2011

Optimizing Resource Consumptions in Clouds.
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011

RAPn: Network Attack Prediction Using Ranking Access Petri Net.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011

Modelling Workflow Executions under Role-Based Authorisation Control.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Editorial.
J. Intell. Manuf., 2010

Constructing trusted virtual execution environment in P2P grids.
Future Gener. Comput. Syst., 2010

Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurr. Comput. Pract. Exp., 2010

A guest-transparent file integrity monitoring method in virtualization environment.
Comput. Math. Appl., 2010

Autonomous agent based intrusion detection in virtual computing environment.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

VMDriver: A Driver-Based Monitoring Mechanism for Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010

TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment.
J. Netw. Comput. Appl., 2009

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009

CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions.
Proceedings of the Systems and Virtualization Management. Standards and the Cloud, 2009

VMFence: a customized intrusion prevention system in distributed virtual computing environment.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

DVM-MAC: A Mandatory Access Control System in Distributed Virtual Computing Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

Trusted Deployment of Virtual Execution Environment in Grid Systems.
Proceedings of the Advances in Computer Science, 2009

2008
Trusted virtual machine monitor-based group signature architecture.
IET Commun., 2008

A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Heterogeneous Grid Workflow Management Based on Virtual Service.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

A Trusted Group Signature Architecture in Virtual Computing Environment.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Extending HLA/RTI to WAN Based on Grid Service.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A Novel Approach to Hide Credentials.
Int. J. Netw. Secur., 2007

Service, Security and Its Data Management for Ubiquitous Computing - Overview.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Hidden Credential Based Oblivious Automated Trust Negotiation Model.
Proceedings of ICEBE 2007, 2007

Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007

Grid Security Interoperation between CGSP and VEGA.
Proceedings of the Future Generation Communication and Networking, 2007

A Scalable Service Scheme for Secure Group Communication in Grid.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

An EMAIL Based Automated Trust Negotiation Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

An Authentication and Access Control Framework for Group Communication Systems in Grid Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Research on Group Signature Scheme with Forward Security.
J. Comput. Res. Dev., 2006

DRIC: Dependable Grid Computing Framework.
IEICE Trans. Inf. Syst., 2006

A New Approach to Hide Policy for Automated Trust Negotiation.
Proceedings of the Advances in Information and Computer Security, 2006

Replica Based Distributed Metadata Management in Grid Environment.
Proceedings of the Computational Science, 2006

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Service organisation and information consistency for service grid.
Int. J. Web Grid Serv., 2005

An adaptive meta-scheduler for data-intensive applications.
Int. J. Grid Util. Comput., 2005

RB-GACA: an RBAC based grid access control architecture.
Int. J. Grid Util. Comput., 2005

Uniform Authorization Management in ChinaGrid Support Platform.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Novel Authorization Mechanism for Service-Oriented Virtual Organization.
Proceedings of the Computer and Information Sciences, 2005

Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Formal General Framework and Service Access Model for Service Grid.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

QoS Oriented Dynamic Replica Cost Model for P2P Computing.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

VO-Sec: An Access Control Framework for Dynamic Virtual Organization.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

ALTER: Adaptive Failure Detection Services for Grids.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

Joint Management of Authorization for Dynamic Virtual Organization.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
RT-Grid: A QoS Oriented Service Grid Framework.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Reliability Analysis for Grid Computing.
Proceedings of the Grid and Cooperative Computing, 2004

A Novel VO-Based Access Control Model for Grid.
Proceedings of the Grid and Cooperative Computing, 2004

Real-Time Strategy and Practice in Service Grid.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Early Experience in QoS-Based Service Grid Architecture.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Fault-Tolerant Grid Architecture and Practice.
J. Comput. Sci. Technol., 2003

A Data Mining Based Intrusion Detection Model.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

HH-MDS: A QoS-Aware Domain Divided Information Service.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

RB-GACA: A RBAC Based Grid Access Control Architecture.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...