Xuhua Ding
Orcid: 0000-0003-3974-590XAffiliations:
- Singapore Management University, School of Information Systems
According to our database1,
Xuhua Ding
authored at least 85 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Software Eng., July, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2023
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2019
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
2018
ACM Trans. Priv. Secur., 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Soft Comput., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
2015
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
ACM Trans. Database Syst., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Efficient authentication and access control of scalable multimedia streams over packet-lossy networks.
Secur. Commun. Networks, 2014
Multim. Syst., 2014
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks.
J. Comput. Syst. Sci., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Signal Process. Image Commun., 2012
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012
Virtualization Based Password Protection against Malware in Untrusted Operating Systems.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
VLDB J., 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEEE Trans. Knowl. Data Eng., 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the Network and Distributed System Security Symposium, 2002
2001
Proceedings of the 10th USENIX Security Symposium, 2001