Jinpeng Wei
Orcid: 0000-0002-6982-7386
According to our database1,
Jinpeng Wei
authored at least 57 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Secure Development Conference, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
The Novel Data-Driven Robust Maximum Expert Mixed Integer Consensus Models Under Multirole's Opinions Uncertainty by Considering Noncooperators.
IEEE Trans. Comput. Soc. Syst., December, 2023
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception.
ACM Trans. Priv. Secur., November, 2023
Robust minimum cost consensus models with various individual preference scenarios under unit adjustment cost uncertainty.
Inf. Fusion, 2023
A Crowdsourcing Task Allocation Mechanism for Hybrid Worker Context Based on Skill Level Updating.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023
2022
Coordinating Fast Concurrency Adapting With Autoscaling for SLO-Oriented Web Applications.
IEEE Trans. Parallel Distributed Syst., 2022
Robust minimum cost consensus models with aggregation operators under individual opinion uncertainty.
J. Intell. Fuzzy Syst., 2022
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Mitigating Large Response Time Fluctuations through Fast Concurrency Adapting in Clouds.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Binary-centric defense of production operating systems against kernel queue injection attacks.
J. Comput. Virol. Hacking Tech., 2019
Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019
2018
Int. J. Next Gener. Comput., 2018
Proceedings of the Web Services - ICWS 2018, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the 8th Software Security, 2018
2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
2016
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications.
Int. J. Networked Distributed Comput., 2016
Future Gener. Comput. Syst., 2016
2015
An adaptive middleware design to support the dynamic interpretation of domain-specific models.
Inf. Softw. Technol., 2015
Comput. Secur., 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Comput. Secur., 2014
A bipartite-graph based approach for disaster susceptibility comparisons among cities.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
IntegrityMR: Integrity assurance framework for big data analytics and management applications.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Constructing E-Tourism platform based on service value broker: A knowledge management perspective.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
Towards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
2011
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Comput. Secur., 2010
Fixed-Parameter Tractable Combinatorial Algorithms for Metabolic Networks Alignments.
Proceedings of the ICDMW 2010, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010
2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
IEEE Trans. Serv. Comput., 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008
2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Proceedings of the High Performance Computing and Communications, 2007
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
A Methodical Defense against TOCTTOU Attacks: The EDGI Approach.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006
2005
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005