Wenchang Shi
Orcid: 0000-0002-5160-1223
According to our database1,
Wenchang Shi
authored at least 81 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Solution toward Transparent and Practical AI Regulation: Privacy Nutrition Labels for Open-source Generative AI-based Applications.
CoRR, 2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
2023
Sensors, February, 2023
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
CoRR, 2023
Comput. Secur., 2023
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges.
Comput. Secur., 2022
Comput. Networks, 2022
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Computers, 2021
Detecting multiphase linear ranking functions for single-path linear-constraint loops.
Int. J. Softw. Tools Technol. Transf., 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Software Eng., 2020
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020
Do not jail my app: Detecting the Android plugin environments by time lag contradiction.
J. Comput. Secur., 2020
J. Comput. Secur., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
IEEE Trans. Software Eng., 2019
Comput. Networks, 2019
Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation).
计算机科学, 2017
Int. J. Inf. Sec., 2017
CoRR, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
基于证据链的电子证据可信性分析 (Trustworthiness Analysis of Digital Evidences Based on Chain of Evidences).
计算机科学, 2016
Int. J. High Perform. Comput. Netw., 2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016
Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
2015
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Inf. Sci., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
2011
IEEE Netw., 2011
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
Proceedings of the Computer Network Security, 2005
Proceedings of the Information Security Practice and Experience, 2005
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005