Weizhong Qiang

Orcid: 0000-0003-4390-3819

Affiliations:
  • Huazhong University of Science and Technology, Wuhan, China


According to our database1, Weizhong Qiang authored at least 84 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention.
IEEE Trans. Reliab., September, 2024

ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
Proceedings of the Computer Security - ESORICS 2024, 2024

Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
SpecTerminator: Blocking Speculative Side Channels Based on Instruction Classes on RISC-V.
ACM Trans. Archit. Code Optim., March, 2023

Multi-path exploration guided by taint and probability against evasive malware.
Secur. Saf., 2023

An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications.
IEEE Trans. Ind. Informatics, 2022

Utility-Prioritized Differential Privacy for Quantitative Biomedical Data.
J. Circuits Syst. Comput., 2022

Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks.
Comput. Secur., 2022

AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring.
Proceedings of the IEEE International Conference on Trust, 2022

2021
CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment.
IEEE Trans. Cloud Comput., 2021

Defending CNN against privacy leakage in edge computing via binary neural networks.
Future Gener. Comput. Syst., 2021

Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning.
CoRR, 2021

2020
A Tensor-Based Optimization Model for Secure Sustainable Cyber-Physical-Social Big Data Computations.
IEEE Trans. Sustain. Comput., 2020

2019
Defending Against Flow Table Overloading Attack in Software-Defined Networks.
IEEE Trans. Serv. Comput., 2019

Performance and security in cloud computing.
J. Supercomput., 2019

LSTM and Edge Computing for Big Data Feature Recognition of Industrial Electrical Equipment.
IEEE Trans. Ind. Informatics, 2019

A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.
IEEE Internet Things J., 2019

Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers.
IEEE Access, 2019

Differential Privacy Preservation for Smart Meter Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Corrigendum to "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS".
Secur. Commun. Networks, 2018

Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS.
Secur. Commun. Networks, 2018

TNGuard: Securing IoT Oriented Tenant Networks Based on SDN.
IEEE Internet Things J., 2018

RollSec: Automatically Secure Software States Against General Rollback.
Int. J. Parallel Program., 2018

PrivGuard: Protecting Sensitive Kernel Data From Privilege Escalation Attacks.
IEEE Access, 2018

Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX Enclave.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
CovertInspector: Identification of Shared Memory Covert Timing Channel in Multi-tenanted Cloud.
Int. J. Parallel Program., 2017

MUC: Updating cloud applications dynamically via multi-version execution.
Future Gener. Comput. Syst., 2017

DroidAuditor: A framework for auditing covert communication on Android.
Concurr. Comput. Pract. Exp., 2017

CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection.
IEEE Access, 2017

Patch-Related Vulnerability Detection Based on Symbolic Execution.
IEEE Access, 2017

CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Libsec: A Hardware Virtualization-Based Isolation for Shared Library.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

ISLUS: An Immediate and Safe Live Update System for C Program.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Fully Context-Sensitive CFI for COTS Binaries.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

JSFfox: Run-Timely Confining JavaScript for Firefox.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
CDMCR: multi-level fault-tolerant system for distributed applications in cloud.
Secur. Commun. Networks, 2016

Social network analysis and its application.
Concurr. Comput. Pract. Exp., 2016

Secure cryptographic functions via virtualization-based outsourced computing.
Concurr. Comput. Pract. Exp., 2016

Auditing Covert Communication between Applications on Android.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Reducing TCB of Linux Kernel Using User-Space Device Driver.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2016

2015
A Skip-gram-based Framework to Extract Knowledge from Chinese Reviews in Cloud Environment.
Mob. Networks Appl., 2015

A lightweight software fault-tolerance system in the cloud environment.
Concurr. Comput. Pract. Exp., 2015

Privacy Protection for Perceptual Applications on Smartphones.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems.
Proceedings of the 25. International Conference on Electronics, 2015

Multi-version Execution for the Dynamic Updating of Cloud Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
CloudTaint: an elastic taint tracking framework for malware detection in the cloud.
J. Supercomput., 2014

Improving Log-Based Fault Diagnosis by Log Classification.
Proceedings of the Network and Parallel Computing, 2014

FDKeeper: A Quick and Open Failure Detector for Cloud Computing System.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014

2013
CloudAC: a cloud-oriented multilayer access control system for logic virtual domain.
IET Inf. Secur., 2013

Design and implementation of a trusted monitoring framework for cloud platforms.
Future Gener. Comput. Syst., 2013

2012
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas.
Secur. Commun. Networks, 2012

A standards-based interoperable single sign-on framework in ARC Grid middleware.
J. Netw. Comput. Appl., 2012

A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

MyStore: A High Available Distributed Storage System for Unstructured Data.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

2011
RAPn: Network Attack Prediction Using Ranking Access Petri Net.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011

2010
The next-generation ARC middleware.
Ann. des Télécommunications, 2010

The Design and Implementation of Standards-Based Grid Single Sign-On Using Federated Identity.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

Securing Interoperable Grid Services in ARC Grid Middleware.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010

The Interoperable Attribute-based Authorization in ARC Grid Middleware.
Proceedings of the GCC 2010, 2010

SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010

2009
Towards cross-middleware authentication and single sign-on for ARC Grid middleware.
Comput. Sci. Res. Dev., 2009

2008
A Trusted Group Signature Architecture in Virtual Computing Environment.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
A Novel Approach to Hide Credentials.
Int. J. Netw. Secur., 2007

Aeneas: real-time performance evaluation approach for distributed programs with reliability-constrains.
Clust. Comput., 2007

An Authentication and Access Control Framework for Group Communication Systems in Grid Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Research on Group Signature Scheme with Forward Security.
J. Comput. Res. Dev., 2006

DRIC: Dependable Grid Computing Framework.
IEICE Trans. Inf. Syst., 2006

ALTER: first step towards dependable grids.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A New Approach to Hide Policy for Automated Trust Negotiation.
Proceedings of the Advances in Information and Computer Security, 2006

Grid System Integrated with Trusted Computing Platform.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
An adaptive meta-scheduler for data-intensive applications.
Int. J. Grid Util. Comput., 2005

RB-GACA: an RBAC based grid access control architecture.
Int. J. Grid Util. Comput., 2005

A Novel Authorization Mechanism for Service-Oriented Virtual Organization.
Proceedings of the Computer and Information Sciences, 2005

A Formal General Framework and Service Access Model for Service Grid.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

VO-Sec: An Access Control Framework for Dynamic Virtual Organization.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

ALTER: Adaptive Failure Detection Services for Grids.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

Joint Management of Authorization for Dynamic Virtual Organization.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Reliability Analysis for Grid Computing.
Proceedings of the Grid and Cooperative Computing, 2004

A Novel VO-Based Access Control Model for Grid.
Proceedings of the Grid and Cooperative Computing, 2004

2003
HH-MDS: A QoS-Aware Domain Divided Information Service.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

RB-GACA: A RBAC Based Grid Access Control Architecture.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...