Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds
Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Deng, Robert H., Jiankun Hu
Published in IEEE transactions on information forensics and security (01.04.2017)
Published in IEEE transactions on information forensics and security (01.04.2017)
Get full text
Journal Article
Detecting multiphase linear ranking functions for single-path linear-constraint loops
Yuan, Yue, Li, Yi, Shi, Wenchang
Published in International journal on software tools for technology transfer (01.02.2021)
Published in International journal on software tools for technology transfer (01.02.2021)
Get full text
Journal Article
A Scalable Cross-Chain Access Control and Identity Authentication Scheme
Ding, Yuhang, Zhang, Yanran, Qin, Bo, Wang, Qin, Yang, Zihan, Shi, Wenchang
Published in Sensors (Basel, Switzerland) (10.02.2023)
Published in Sensors (Basel, Switzerland) (10.02.2023)
Get full text
Journal Article
Image Forgery Detection Using Segmentation and Swarm Intelligent Algorithm
Zhao, Fei, Shi, Wenchang, Qin, Bo, Liang, Bin
Published in Wuhan University journal of natural sciences (01.04.2017)
Published in Wuhan University journal of natural sciences (01.04.2017)
Get full text
Journal Article
AntMiner: Mining More Bugs by Reducing Noise Interference
Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai
Published in 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) (01.05.2016)
Published in 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) (01.05.2016)
Get full text
Conference Proceeding
Reference Hijacking: Patching, Protecting and Analyzing on Unmodified and Non-rooted Android Devices
Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang
Published in 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) (01.05.2016)
Published in 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE) (01.05.2016)
Get full text
Conference Proceeding
Implementation of a TPM-Based Security Enhanced Browser Password Manager
He, Yuchen, Wang, Rui, Shi, Wenchang
Published in Wuhan University journal of natural sciences (01.02.2016)
Published in Wuhan University journal of natural sciences (01.02.2016)
Get full text
Journal Article
Scriptless Timing Attacks on Web Browser Privacy
Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Heiderich, Mario
Published in 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (01.06.2014)
Published in 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (01.06.2014)
Get full text
Conference Proceeding
DCFI-Checker: Checking kernel dynamic control flow integrity with performance monitoring counter
Shi, Wenchang, Zhou, Hongwei, Yuan, Jinhui, Liang, Bin
Published in China communications (01.09.2014)
Published in China communications (01.09.2014)
Get full text
Journal Article
Research on PoC Refactoring of Third-party Library in Heterogeneous Environment
Song, Wenkai, You, Wei, Liang, Bin, Huang, Jianjun, Shi, Wenchang
Published in Ji suan ji ke xue (01.04.2023)
Published in Ji suan ji ke xue (01.04.2023)
Get full text
Journal Article
A survey on internet of things security from data perspectives
Hou, Jianwei, Qu, Leilei, Shi, Wenchang
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.01.2019)
Published in Computer networks (Amsterdam, Netherlands : 1999) (15.01.2019)
Get full text
Journal Article
Using New Fusion Operations to Improve Trust Expressiveness of Subjective Logic
Zhou, Hongwei, Shi, Wenchang, Liang, Zhaohui, Liang, Bin
Published in Wuhan University journal of natural sciences (01.10.2011)
Published in Wuhan University journal of natural sciences (01.10.2011)
Get full text
Journal Article
Cecoin: A decentralized PKI mitigating MitM attacks
Qin, Bo, Huang, Jikun, Wang, Qin, Luo, Xizhao, Liang, Bin, Shi, Wenchang
Published in Future generation computer systems (01.06.2020)
Published in Future generation computer systems (01.06.2020)
Get full text
Journal Article