Fengwei Zhang
Orcid: 0000-0003-3365-2526
According to our database1,
Fengwei Zhang
authored at least 92 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SnapMem: Hardware/Software Cooperative Memory Resistant to Cache-Related Attacks on ARM-FPGA Embedded SoC.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Numerical analyses ridge-forming for whole film-mulching and double ridge-furrow, a discrete element method.
Comput. Electron. Agric., December, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Calibration of DEM models for fertilizer particles based on numerical simulations and granular experiments.
Comput. Electron. Agric., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Perform. Evaluation, 2022
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices.
IEEE Internet Things J., 2022
STC-IDS: Spatial-temporal correlation feature analyzing based intrusion detection system for intelligent connected vehicles.
Int. J. Intell. Syst., 2022
STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles.
CoRR, 2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Classification and Recognition of Fish Farming by Extraction New Features to Control the Economic Aquatic Product.
Complex., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021
Proceedings of the ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, 2021
2020
An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles.
IEEE Trans. Intell. Veh., 2020
Comput. Secur., 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under Deadline Constraints.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications.
Proceedings of the 2017 IEEE SmartWorld, 2017
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments.
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017
Proceedings of the 10th European Workshop on Systems Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security.
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012
2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008