Shijie Jia
Orcid: 0000-0002-4262-9478Affiliations:
- Chinese Acadamy of Sciences, Institute of Information Engineering (IIE-CAS), State Key Laboratory of Information Security, Beijing, China
- University of Chinese Acadamy of Sciences (UCAS), School of Cyber Security, Beijing, China (PhD 2017)
According to our database1,
Shijie Jia
authored at least 32 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., October, 2024
TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer.
Proceedings of the IEEE International Conference on Communications, 2024
2023
A Design of High-Efficiency Coherent Sampling Based TRNG With On-Chip Entropy Assurance.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer.
IEEE Trans. Dependable Secur. Comput., 2022
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks.
Proceedings of the IEEE International Conference on Trust, 2022
An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Exploring Sequential and Collaborative Contexts for Next Point-of-Interest Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2021
2020
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey.
Cybersecur., 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the Information Security - 18th International Conference, 2015
Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication.
Proceedings of the Information and Communications Security - 17th International Conference, 2015