Lingguang Lei
Orcid: 0000-0002-1936-0562
According to our database1,
Lingguang Lei
authored at least 30 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
A Lightweight Defense Scheme Against Usermode Helper Privilege Escalation Using Linux Capability.
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider.
Proceedings of the 52nd International Conference on Parallel Processing, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Proceedings of the IEEE International Conference on Trust, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Comput. Secur., 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2015
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones.
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012