Jinpeng Wei

Orcid: 0000-0002-6982-7386

According to our database1, Jinpeng Wei authored at least 57 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Moving from the Developer Machine to IoT Devices: An Empirical Study.
Proceedings of the IEEE Secure Development Conference, 2024

Prompting LLM to Enforce and Validate CIS Critical Security Control.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

Grunt Attack: Exploiting Execution Dependencies in Microservices.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
The Novel Data-Driven Robust Maximum Expert Mixed Integer Consensus Models Under Multirole's Opinions Uncertainty by Considering Noncooperators.
IEEE Trans. Comput. Soc. Syst., December, 2023

symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception.
ACM Trans. Priv. Secur., November, 2023

Robust minimum cost consensus models with various individual preference scenarios under unit adjustment cost uncertainty.
Inf. Fusion, 2023

A Crowdsourcing Task Allocation Mechanism for Hybrid Worker Context Based on Skill Level Updating.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

2022
Coordinating Fast Concurrency Adapting With Autoscaling for SLO-Oriented Web Applications.
IEEE Trans. Parallel Distributed Syst., 2022

Robust minimum cost consensus models with aggregation operators under individual opinion uncertainty.
J. Intell. Fuzzy Syst., 2022

IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

2021
CHIMERA: Autonomous Planning and Orchestration for Malware Deception.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

SODA: A System for Cyber Deception Orchestration and Automation.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
ShadowMove: A Stealthy Lateral Movement Strategy.
Proceedings of the 29th USENIX Security Symposium, 2020

Mitigating Large Response Time Fluctuations through Fast Concurrency Adapting in Clouds.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020

DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Binary-centric defense of production operating systems against kernel queue injection attacks.
J. Comput. Virol. Hacking Tech., 2019

Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019

2018
City Disaster Susceptibility Comparisons using Weighted Bipartite Graphs.
Int. J. Next Gener. Comput., 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

A Poisoning Attack Against Cryptocurrency Mining Pools.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

gExtractor: Towards Automated Extraction of Malware Deception Parameters.
Proceedings of the 8th Software Security, 2018

2017
The Design of Cyber Threat Hunting Games: A Case Study.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications.
Int. J. Networked Distributed Comput., 2016

Toward integrity assurance of outsourced computing - a game theoretic perspective.
Future Gener. Comput. Syst., 2016

2015
An adaptive middleware design to support the dynamic interpretation of domain-specific models.
Inf. Softw. Technol., 2015

Toward protecting control flow confidentiality in cloud-based computation.
Comput. Secur., 2015

MOSE: Live Migration Based On-the-Fly Software Emulation.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Static analysis based invariant detection for commodity operating systems.
Comput. Secur., 2014

A bipartite-graph based approach for disaster susceptibility comparisons among cities.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Bring your own device security issues and challenges.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Value-Added Modelling and Analysis in Service Value Brokerage.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
Proceedings of the Computer Security - ESORICS 2013, 2013

IntegrityMR: Integrity assurance framework for big data analytics and management applications.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Constructing E-Tourism platform based on service value broker: A knowledge management perspective.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Result Integrity Check for MapReduce Computation on Hybrid Clouds.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Toward a general defense against kernel queue hooking attacks.
Comput. Secur., 2012

Software Persistent Memory.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Towards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Static analysis based invariant detection for commodity operating systems.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

VIAF: Verification-Based Integrity Assurance Framework for MapReduce.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems.
Comput. Secur., 2010

Fixed-Parameter Tractable Combinatorial Algorithms for Metabolic Networks Alignments.
Proceedings of the ICDMW 2010, 2010

Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective.
Proceedings of the Cloud Computing, Second International Conference, 2010

WS-GraphMatching: a web service tool for graph matching.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Improving operating systems security: two case studies.
PhD thesis, 2009

Managing security of virtual machine images in a cloud environment.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
A Secure Information Flow Architecture for Web Service Platforms.
IEEE Trans. Serv. Comput., 2008

Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

A Secure Information Flow Architecture for Web Services.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Guarding Sensitive Information Streams through the Jungle of Composite Web Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Towards Scalable and High Performance I/O Virtualization - A Case Study.
Proceedings of the High Performance Computing and Communications, 2007

Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
A Methodical Defense against TOCTTOU Attacks: The EDGI Approach.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

2005
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005


  Loading...