Weidong Shi
Orcid: 0000-0002-1994-4218
According to our database1,
Weidong Shi
authored at least 171 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., April, 2024
Distributed Ledger Technol. Res. Pract., March, 2024
CoRR, 2024
Harnessing the Power of LLMs: Automating Unit Test Generation for High-Performance Computing.
CoRR, 2024
Comparing Rationality Between Large Language Models and Humans: Insights and Open Questions.
CoRR, 2024
IEEE Access, 2024
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2024
Decentralized FaaS over Multi-Clouds with Blockchain based Management for Supporting Emerging Applications.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Proceedings of the 13th International Workshop on Hardware and Architectural Support for Security and Privacy, 2024
Proceedings of the Financial Cryptography and Data Security. FC 2024 International Workshops, 2024
Proceedings of the 1st ACM International Conference on AI-Powered Software, 2024
2023
Auton. Agents Multi Agent Syst., June, 2023
IEEE Access, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023
2022
IEEE Signal Process. Lett., 2022
CoRR, 2022
Proceedings of the ICMR '22: International Conference on Multimedia Retrieval, Newark, NJ, USA, June 27, 2022
Local Differential Privacy Meets Computational Social Choice - Resilience under Voter Deletion.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the 3rd International Conference on Intelligent Data Science Technologies and Applications, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022
RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries.
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022
2021
Theor. Comput. Sci., 2021
Particle image velocimetry measurement of flow fields in a mixed-flow pump with non-uniform tip clearance.
J. Vis., 2021
Computer, 2021
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2021
Proceedings of the Middleware '21: 22nd International Middleware Conference, Québec City, Canada, December 6, 2021
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Frontiers of Algorithmics - International Joint Conference, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the 15th ACM International Conference on Distributed and Event-based Systems, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
ACM Trans. Multim. Comput. Commun. Appl., 2020
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems.
IEEE Netw., 2020
Multim. Tools Appl., 2020
J. Comput. Phys., 2020
Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities.
Int. J. Prod. Res., 2020
ProxylessKD: Direct Knowledge Distillation with Inherited Classifier for Face Recognition.
CoRR, 2020
CoRR, 2020
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack.
CoRR, 2020
Algebraic multigrid block preconditioning for multi-group radiation diffusion equations.
CoRR, 2020
IEEE Consumer Electron. Mag., 2020
Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the IEEE International Conference on Image Processing, 2020
Proceedings of the 28th Annual European Symposium on Algorithms, 2020
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
CoRR, 2019
Proceedings of the Highlights of Practical Applications of Survivable Agents and Multi-Agent Systems. The PAAMS Collection, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data Processing and Bitstream Protection.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
J. Supercomput., 2018
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.
IEEE Trans. Cloud Comput., 2018
EAI Endorsed Trans. Security Safety, 2018
J. Comput. Sci. Technol., 2018
J. Comput. Phys., 2018
IEEE Secur. Priv., 2018
CoRR, 2018
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
Protecting Election from Bribery: New Approach and Computational Complexity Characterization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017
Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments.
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
Proceedings of the International Conference on Big Data and Internet of Things, 2017
Modeling Instability for Large Scale Processing Tasks Within HEP Distributed Computing Environments.
Proceedings of the Advances on P2P, 2017
2016
Proceedings of the IEEE World Congress on Services, 2016
2015
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Scalable 3D Facial Shape Motion Retrieval from Image Sequences Using a Map-Reduce Framework.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015
Another Look at Secure Big Data Processing: Formal Framework and a Potential Approach.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
TIPS: context-aware implicit user identification using touch screen in uncontrolled environments.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014
Enhancing independence for people with low vision to use daily panel-interface machines.
Proceedings of the 6th International Conference on Mobile Computing, 2014
Proceedings of the 6th International Conference on Mobile Computing, 2014
USR: Enabling identity awareness and usable app access control during hand-free mobile interactions.
Proceedings of the 6th International Conference on Mobile Computing, 2014
Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior.
Proceedings of the 6th International Conference on Mobile Computing, 2014
Proceedings of the Pervasive Computing Paradigms for Mental Health, 2014
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Seasoning effect based side channel attacks to AES implementation with phase change memory.
Proceedings of the HASP 2014, 2014
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the 2014 International Conference on Compilers, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Computerized-eyewear based face recognition system for improving social lives of prosopagnosics.
Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, 2013
A real-time selective speaker cancellation system for relieving social anxiety in autistics.
Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, 2013
Proceedings of the Middleware 2013, 2013
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment.
Proceedings of the Computing Frontiers Conference, 2013
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012
Proceedings of the IEEE 10th Symposium on Embedded Systems for Real-time Multimedia, 2012
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security.
Proceedings of the Computing Frontiers Conference, CF'12, 2012
Energy efficient hybrid display and predictive models for embedded and mobile systems.
Proceedings of the 15th International Conference on Compilers, 2012
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
J. Netw. Comput. Appl., 2011
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011
2010
Video indexed VM continuous checkpoints: time travel support for virtual 3d graphics applications.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010
Proceedings of the IEEE International Conference on Cloud Computing, 2010
2007
Trans. High Perform. Embed. Archit. Compil., 2007
Proceedings of the 4th Conference on Computing Frontiers, 2007
2006
PhD thesis, 2006
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software.
J. Parallel Distributed Comput., 2006
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 2006
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors.
Proceedings of the 33rd International Symposium on Computer Architecture (ISCA 2006), 2006
Proceedings of the 12th International Symposium on High-Performance Computer Architecture, 2006
Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006
2005
SIGARCH Comput. Archit. News, 2005
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor.
Proceedings of the Second International Conference on Autonomic Computing (ICAC 2005), 2005
2004
CoolPression - a hybrid significance compression technique for reducing energy in caches.
Proceedings of the Proceedings 2004 IEEE International SOC Conference, 2004
Proceedings of the High Performance Computing, 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems.
Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques (PACT 2004), 29 September, 2004
2003
Proceedings of the 17th Workshop on Parallel and Distributed Simulation, 2003
2002
Efficient Implementation of Packet Scheduling Algorithm on High-Speed Programmable Network Processors.
Proceedings of the Management of Multimedia on the Internet, 2002