default search action
Deqing Zou
Person information
- unicode name: 邹德清
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j110]Ihsan H. Abdulqadder, Israa T. Aziz, Deqing Zou:
DT-Block: Adaptive vertical federated reinforcement learning scheme for secure and efficient communication in 6G. Comput. Networks 254: 110841 (2024) - [j109]Zeli Wang, Weiqi Dai, Ming Li, Kim-Kwang Raymond Choo, Deqing Zou:
DFier: A directed vulnerability verifier for Ethereum smart contracts. J. Netw. Comput. Appl. 231: 103984 (2024) - [j108]Jun Feng, Laurence T. Yang, Bocheng Ren, Deqing Zou, Mianxiong Dong, Shunli Zhang:
Tensor Recurrent Neural Network With Differential Privacy. IEEE Trans. Computers 73(3): 683-693 (2024) - [j107]Bin Yuan, Maogen Yang, Zheng Xu, Qunjinming Chen, Zhanxiang Song, Zhen Li, Deqing Zou, Hai Jin:
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure. IEEE Trans. Dependable Secur. Comput. 21(4): 3196-3210 (2024) - [j106]Weiqi Dai, Jinkai Liu, Yang Zhou, Kim-Kwang Raymond Choo, Xia Xie, Deqing Zou, Hai Jin:
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor. IEEE Trans. Inf. Forensics Secur. 19: 2425-2437 (2024) - [j105]Bin Yuan, Chi Zhang, Jiajun Ren, Qunjinming Chen, Biang Xu, Qiankun Zhang, Zhen Li, Deqing Zou, Fan Zhang, Hai Jin:
Toward Automated Attack Discovery in SDN Controllers Through Formal Verification. IEEE Trans. Netw. Serv. Manag. 21(3): 3636-3655 (2024) - [j104]Weiqi Dai, Liangliang Yu, Yang Zhou, Kim-Kwang Raymond Choo, Deqing Zou, Xia Xie, Hai Jin:
PASSP: A Private Authorization Scheme Oriented Service Providers. IEEE Trans. Netw. Serv. Manag. 21(4): 4888-4899 (2024) - [j103]Haojun Zhao, Yueming Wu, Deqing Zou, Hai Jin:
An Empirical Study on Android Malware Characterization by Social Network Analysis. IEEE Trans. Reliab. 73(1): 757-770 (2024) - [j102]Yueming Wu, Siyue Feng, Wenqi Suo, Deqing Zou, Hai Jin:
Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone Detection. IEEE Trans. Reliab. 73(2): 1310-1324 (2024) - [j101]Weizhong Qiang, Kunlun Ren, Yueming Wu, Deqing Zou, Hai Jin:
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention. IEEE Trans. Reliab. 73(3): 1516-1528 (2024) - [c115]Hongfei Wang, Chenliang Luo, Deqing Zou, Hai Jin, Wenjie Cai:
Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis. DATE 2024: 1-6 - [c114]Yu Zhao, Wenjie Xue, Weijie Chen, Weizhong Qiang, Deqing Zou, Hai Jin:
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications. DSN 2024: 362-376 - [c113]Weijie Chen, Yu Zhao, Yinqian Zhang, Weizhong Qiang, Deqing Zou, Hai Jin:
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks. ESORICS (4) 2024: 24-44 - [c112]Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. ICSE 2024: 157:1-157:12 - [c111]Siyue Feng, Wenqi Suo, Yueming Wu, Deqing Zou, Yang Liu, Hai Jin:
Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection. ICSE 2024: 222:1-222:13 - [c110]Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing:
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. SP 2024: 2385-2403 - [c109]Siyue Feng, Yueming Wu, Wenjie Xue, Sikui Pan, Deqing Zou, Yang Liu, Hai Jin:
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection. USENIX Security Symposium 2024 - [i9]Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. CoRR abs/2401.09767 (2024) - 2023
- [j100]Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, Saeed Akbar, Zhen Li, Francis A. Ruambo, Wagner Pereira:
Network intrusion detection based on the temporal convolutional model. Comput. Secur. 135: 103465 (2023) - [j99]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz:
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G. Future Gener. Comput. Syst. 141: 339-354 (2023) - [j98]Bin Yuan, Jun Wan, Yuhan Wu, Deqing Zou, Hai Jin:
On the Security of Smart Home Systems: A Survey. J. Comput. Sci. Technol. 38(2): 228-247 (2023) - [j97]Bin Yuan, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou, Hai Jin:
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform. IEEE Trans. Dependable Secur. Comput. 20(2): 1656-1674 (2023) - [j96]Jian Shi, Deqing Zou, Shouhuai Xu, Xianjun Deng, Hai Jin:
Does OpenBSD and Firefox's Security Improve With Time? IEEE Trans. Dependable Secur. Comput. 20(4): 2781-2793 (2023) - [j95]Yutao Hu, Yilin Fang, Yifan Sun, Yaru Jia, Yueming Wu, Deqing Zou, Hai Jin:
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection. IEEE Trans. Software Eng. 49(9): 4429-4442 (2023) - [j94]Jingyu Wang, Jennifer Appiah-Kubi, Lung-An Lee, Dongyuan Shi, Deqing Zou, Chen-Ching Liu:
An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders. IEEE Trans. Smart Grid 14(2): 1210-1222 (2023) - [c108]Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin:
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation. DSN 2023: 339-351 - [c107]Yulun Wu, Zeliang Yu, Ming Wen, Qiang Li, Deqing Zou, Hai Jin:
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem. ICSE 2023: 1046-1058 - [c106]Bin Yuan, Yifan Lu, Yilin Fang, Yueming Wu, Deqing Zou, Zhen Li, Zhi Li, Hai Jin:
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model. ICSE 2023: 2262-2274 - [c105]Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu, Bin Yuan, Deqing Zou, Hai Jin:
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree. ISSTA 2023: 89-100 - [c104]Zifan Xie, Ming Wen, Haoxiang Jia, Xiaochen Guo, Xiaotong Huang, Deqing Zou, Hai Jin:
Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation. ISSTA 2023: 347-359 - [c103]Yutao Hu, Suyuan Wang, Wenke Li, Junru Peng, Yueming Wu, Deqing Zou, Hai Jin:
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? ISSTA 2023: 1407-1419 - [c102]Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin:
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors. ISSTA 2023: 1420-1432 - [c101]Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. ASE 2023: 27-39 - [c100]Deqing Zou, Siyue Feng, Yueming Wu, Wenqi Suo, Hai Jin:
Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model. ESEC/SIGSOFT FSE 2023: 771-783 - [i8]Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. CoRR abs/2309.10644 (2023) - 2022
- [j93]Haoyu Chen, Deqing Zou, Hai Jin, Shouhuai Xu, Bin Yuan:
SAND: semi-automated adaptive network defense via programmable rule generation and deployment. Sci. China Inf. Sci. 65(7): 1-18 (2022) - [j92]Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, Francis A. Ruambo, Bin Yuan, Hai Jin:
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach. Comput. Commun. 194: 55-65 (2022) - [j91]Weiqi Dai, Shuyue Tuo, Liangliang Yu, Kim-Kwang Raymond Choo, Deqing Zou, Hai Jin:
HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability. IEEE Internet Things J. 9(24): 25538-25550 (2022) - [j90]Muqing He, Deqing Zou, Weizhong Qiang, Wenbo Wu, Shouhuai Xu, Xianjun Deng, Hai Jin:
Utility-Prioritized Differential Privacy for Quantitative Biomedical Data. J. Circuits Syst. Comput. 31(13): 2250236:1-2250236:23 (2022) - [j89]Haoyu Chen, Bin Yuan, Deqing Zou, Hai Jin:
A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks. IEEE Netw. 36(4): 150-158 (2022) - [j88]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19(4): 2244-2258 (2022) - [j87]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. IEEE Trans. Dependable Secur. Comput. 19(4): 2821-2837 (2022) - [j86]Yuanyuan He, Jianbing Ni, Laurence T. Yang, Wei Wei, Xianjun Deng, Deqing Zou, Syed Hassan Ahmed:
Differentially Private Tripartite Intelligent Matching Against Inference Attacks in Ride-Sharing Services. IEEE Trans. Intell. Transp. Syst. 23(11): 22583-22595 (2022) - [j85]Hai Jin, Zeli Wang, Ming Wen, Weiqi Dai, Yu Zhu, Deqing Zou:
Aroc: An Automatic Repair Framework for On-Chain Smart Contracts. IEEE Trans. Software Eng. 48(11): 4611-4629 (2022) - [j84]Qi Chen, Guohui Li, Quan Zhou, Si Shi, Deqing Zou:
Double Attention Convolutional Neural Network for Sequential Recommendation. ACM Trans. Web 16(4): 19:1-19:23 (2022) - [c99]Zhechang Zhang, Bin Yuan, Kehan Yang, Deqing Zou, Hai Jin:
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance. ACSAC 2022: 756-768 - [c98]Yueming Wu, Deqing Zou, Shihan Dou, Wei Yang, Duo Xu, Hai Jin:
VulCNN: An Image-inspired Scalable Vulnerability Detection System. ICSE 2022: 2365-2376 - [c97]Yueming Wu, Siyue Feng, Deqing Zou, Hai Jin:
Detecting Semantic Code Clones by Building AST-based Markov Chains Model. ASE 2022: 34:1-34:13 - [c96]Yutao Hu, Deqing Zou, Junru Peng, Yueming Wu, Junjie Shan, Hai Jin:
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection. ASE 2022: 109:1-109:12 - [c95]Zhi Li, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou:
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. SP 2022: 2397-2412 - 2021
- [j83]Yang Xia, Tianqing Zhu, Xiaofeng Ding, Hai Jin, Deqing Zou:
Heterogeneous differential privacy for vertically partitioned databases. Concurr. Comput. Pract. Exp. 33(8) (2021) - [j82]Zeli Wang, Hai Jin, Weiqi Dai, Kim-Kwang Raymond Choo, Deqing Zou:
Ethereum smart contract security research: survey and future research opportunities. Frontiers Comput. Sci. 15(2): 152802 (2021) - [j81]Weiqi Dai, Qinyuan Wang, Zeli Wang, Xiaobin Lin, Deqing Zou, Hai Jin:
Trustzone-based secure lightweight wallet for hyperledger fabric. J. Parallel Distributed Comput. 149: 66-75 (2021) - [j80]Weizhong Qiang, Yingda Huang, Hai Jin, Laurence T. Yang, Deqing Zou:
CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment. IEEE Trans. Cloud Comput. 9(3): 938-957 (2021) - [j79]Hai Jin, Zhi Li, Deqing Zou, Bin Yuan:
DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1125-1136 (2021) - [j78]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2224-2236 (2021) - [j77]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan, Weiqi Dai:
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment. IEEE Trans. Emerg. Top. Comput. 9(2): 866-877 (2021) - [j76]Weiqi Dai, Yan Lv, Kim-Kwang Raymond Choo, Zhongze Liu, Deqing Zou, Hai Jin:
CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships. IEEE Trans. Inf. Forensics Secur. 16: 4291-4305 (2021) - [j75]Bin Yuan, Chen Lin, Deqing Zou, Laurence Tianruo Yang, Hai Jin:
Detecting Malicious Switches for a Secure Software-defined Tactile Internet. ACM Trans. Internet Techn. 21(4): 84:1-84:23 (2021) - [j74]Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. ACM Trans. Softw. Eng. Methodol. 30(2): 23:1-23:31 (2021) - [j73]Deqing Zou, Yueming Wu, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, Hai Jin:
IntDroid: Android Malware Detection Based on API Intimacy Analysis. ACM Trans. Softw. Eng. Methodol. 30(3): 39:1-39:32 (2021) - [c94]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305 - [c93]Yueming Wu, Deqing Zou, Wei Yang, Xiang Li, Hai Jin:
HomDroid: detecting Android covert malware by social-network homophily analysis. ISSTA 2021: 216-229 - [c92]Bin Yuan, Shengyao Sun, Xianjun Deng, Deqing Zou, Haoyu Chen, Shenghui Li, Hai Jin:
Automatically derived stateful network functions including non-field attributes. TrustCom 2021: 944-951 - [i7]Yueming Wu, Shihan Dou, Deqing Zou, Wei Yang, Weizhong Qiang, Hai Jin:
Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning. CoRR abs/2107.03799 (2021) - [i6]Yueming Wu, Deqing Zou, Wei Yang, Xiang Li, Hai Jin:
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis. CoRR abs/2107.04743 (2021) - [i5]Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin:
Towards Making Deep Learning-based Vulnerability Detectors Robust. CoRR abs/2108.00669 (2021) - 2020
- [j72]Ihsan H. Abdulqadder, Shijie Zhou, Deqing Zou, Israa T. Aziz, Syed Muhammad Abrar Akber:
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms. Comput. Networks 179: 107364 (2020) - [j71]Peng Luo, Deqing Zou, Yajuan Du, Hai Jin, Changming Liu, Jinan Shen:
Static detection of real-world buffer overflow induced by loop. Comput. Secur. 89 (2020) - [j70]Bin Yuan, Deqing Zou, Hai Jin, Shui Yu, Laurence T. Yang:
HostWatcher: Protecting hosts in cloud data centers through software-defined networking. Future Gener. Comput. Syst. 105: 964-972 (2020) - [j69]Bin Yuan, Chen Lin, Huan Zhao, Deqing Zou, Laurence Tianruo Yang, Hai Jin, Chunming Rong:
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services. IEEE Internet Things J. 7(9): 7967-7981 (2020) - [j68]Zeli Wang, Weiqi Dai, Kim-Kwang Raymond Choo, Hai Jin, Deqing Zou:
FSFC: An input filter-based secure framework for smart contract. J. Netw. Comput. Appl. 154: 102530 (2020) - [j67]Weiqi Dai, Chunkai Dai, Kim-Kwang Raymond Choo, Changze Cui, Deqing Zou, Hai Jin:
SDTE: A Secure Blockchain-Based Data Trading Ecosystem. IEEE Trans. Inf. Forensics Secur. 15: 725-737 (2020) - [j66]Bin Yuan, Huan Zhao, Chen Lin, Deqing Zou, Laurence Tianruo Yang, Hai Jin, Ligang He, Shui Yu:
Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management. IEEE Trans. Netw. Sci. Eng. 7(4): 2541-2554 (2020) - [j65]Zhi Li, Hai Jin, Deqing Zou, Bin Yuan:
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment. IEEE Trans. Parallel Distributed Syst. 31(3): 695-706 (2020) - [c91]Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi, Hai Jin:
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. ASPLOS 2020: 1263-1276 - [c90]Shiqiang Zhang, Song Wu, Hao Fan, Deqing Zou, Hai Jin:
BED: A Block-Level Deduplication-Based Container Deployment Framework. GPC 2020: 504-518 - [c89]Ihsan H. Abdulqadder, Shijie Zhou, Deqing Zou, Israa T. Aziz, Syed Muhammad Abrar Akber:
Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT. ICCT 2020: 499-507 - [c88]Yueming Wu, Deqing Zou, Shihan Dou, Siru Yang, Wei Yang, Feng Cheng, Hong Liang, Hai Jin:
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis. ASE 2020: 821-833 - [c87]Shangwen Wang, Ming Wen, Bo Lin, Hongjun Wu, Yihao Qin, Deqing Zou, Xiaoguang Mao, Hai Jin:
Automated Patch Correctness Assessment: How Far are We? ASE 2020: 968-980 - [c86]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200 - [i4]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. CoRR abs/2001.02334 (2020) - [i3]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector. CoRR abs/2001.02350 (2020)
2010 – 2019
- 2019
- [j64]Zhen Li, Deqing Zou, Jing Tang, Zhihao Zhang, Mingqian Sun, Hai Jin:
A Comparative Study of Deep Learning-Based Vulnerability Detection System. IEEE Access 7: 103184-103197 (2019) - [j63]Lansheng Han, Man Zhou, Yekui Qian, Cai Fu, Deqing Zou:
An Optimized Static Propositional Function Model to Detect Software Vulnerability. IEEE Access 7: 143499-143510 (2019) - [j62]Deqing Zou, Jian Zhao, Weiming Li, Yueming Wu, Weizhong Qiang, Hai Jin, Ye Wu, Yifei Yang:
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment. IEEE Internet Things J. 6(2): 1484-1494 (2019) - [j61]Jun Feng, Laurence T. Yang, Guohui Dai, Wei Wang, Deqing Zou:
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment. IEEE Trans. Big Data 5(3): 355-367 (2019) - [j60]Jinan Shen, Deqing Zou, Hai Jin, Bin Yuan, Weiqi Dai:
A domain-divided configurable security model for cloud computing-based telecommunication services. J. Supercomput. 75(1): 109-122 (2019) - [j59]Bin Yuan, Deqing Zou, Shui Yu, Hai Jin, Weizhong Qiang, Jinan Shen:
Defending Against Flow Table Overloading Attack in Software-Defined Networks. IEEE Trans. Serv. Comput. 12(2): 231-246 (2019) - [c85]Deqing Zou, Ju Yang, Zhen Li, Hai Jin, Xiaojing Ma:
AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process. GPC 2019: 238-253 - [c84]Yueming Wu, Xiaodi Li, Deqing Zou, Wei Yang, Xin Zhang, Hai Jin:
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis. ASE 2019: 139-150 - 2018
- [j58]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan, Weiming Li:
SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks. IEEE Access 6: 8292-8301 (2018) - [j57]Deqing Zou, Yu Lu, Bin Yuan, Haoyu Chen, Hai Jin:
A Fine-Grained Multi-Tenant Permission Management Framework for SDN and NFV. IEEE Access 6: 25562-25572 (2018) - [j56]Hai Jin, Benxi Liu, Yajuan Du, Deqing Zou:
BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation. IEEE Access 6: 36341-36353 (2018) - [j55]Weiqi Dai, Jun Deng, Qinyuan Wang, Changze Cui, Deqing Zou, Hai Jin:
SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone. IEEE Access 6: 40638-40648 (2018) - [j54]Deqing Zou, Zirong Huang, Bin Yuan, Haoyu Chen, Hai Jin:
Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network. IEEE Access 6: 62286-62295 (2018) - [j53]Weiqi Dai, Yukun Du, Hai Jin, Weizhong Qiang, Deqing Zou, Shouhuai Xu, Zhongze Liu:
RollSec: Automatically Secure Software States Against General Rollback. Int. J. Parallel Program. 46(4): 788-805 (2018) - [j52]Weiqi Dai, Pengfei Wan, Weizhong Qiang, Laurence T. Yang, Deqing Zou, Hai Jin, Shouhuai Xu, Zirong Huang:
TNGuard: Securing IoT Oriented Tenant Networks Based on SDN. IEEE Internet Things J. 5(3): 1411-1423 (2018) - [j51]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan:
Validating User Flows to Protect Software Defined Network Environments. Secur. Commun. Networks 2018: 1308678:1-1308678:14 (2018) - [j50]Peng Luo, Deqing Zou, Hai Jin, Yajuan Du, Long Zheng, Jinan Shen:
DigHR: precise dynamic detection of hidden races with weak causal relation analysis. J. Supercomput. 74(6): 2684-2704 (2018) - [j49]Bin Yuan, Hai Jin, Deqing Zou, Laurence Tianruo Yang, Shui Yu:
A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(2): 825-839 (2018) - [c83]Deqing Zou, Zhijun Deng, Zhen Li, Hai Jin:
Automatically Identifying Security Bug Reports via Multitype Features Analysis. ACISP 2018: 619-633 - [c82]Changming Liu, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin:
A Heuristic Framework to Detect Concurrency Vulnerabilities. ACSAC 2018: 529-541 - [c81]Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan:
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network. ICCCN 2018: 1-9 - [c80]Xiaojing Ma, Bin Zhu, Tao Zhang, Sixing Cao, Hai Jin, Deqing Zou:
Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance. INFOCOM Workshops 2018: 813-818 - [c79]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. NDSS 2018 - [d1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE DataPort, 2018 - [i2]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. CoRR abs/1801.01681 (2018) - [i1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. CoRR abs/1807.06756 (2018) - 2017
- [j48]Deliang Xu, Cai Fu, Guohui Li, Deqing Zou, Honghao Zhang, Xiao-Yang Liu:
Virtualization of the Encryption Card for Trust Access in Cloud Computing. IEEE Access 5: 20652-20667 (2017) - [j47]Weizhong Qiang, Yuehua Liao, Guozhong Sun, Laurence T. Yang, Deqing Zou, Hai Jin:
Patch-Related Vulnerability Detection Based on Symbolic Execution. IEEE Access 5: 20777-20784 (2017) - [j46]Weizhong Qiang, Gongping Xu, Weiqi Dai, Deqing Zou, Hai Jin:
CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection. IEEE Access 5: 21962-21976 (2017) - [j45]Wahid Rajeh, Hai Jin, Deqing Zou:
Saudi cloud infrastructure: a security analysis. Sci. China Inf. Sci. 60(12): 122102:1-122102:13 (2017) - [j44]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Privacy preserving search over multiple servers. Int. J. Auton. Adapt. Commun. Syst. 10(4): 426-442 (2017) - [j43]Xiaojing Ma, Laurence T. Yang, Yang Xiang, Wenjun Kevin Zeng, Deqing Zou, Hai Jin:
Fully Reversible Privacy Region Protection for Cloud Video Surveillance. IEEE Trans. Cloud Comput. 5(3): 510-522 (2017) - [j42]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
A Secure, Usable, and Transparent Middleware for Permission Managers on Android. IEEE Trans. Dependable Secur. Comput. 14(4): 350-362 (2017) - [j41]Peng Luo, Deqing Zou, Hai Jin, Yajuan Du, Jinan Shen:
A dynamic predictive race detector for C/C++ programs. J. Supercomput. 73(9): 3999-4019 (2017) - [c78]Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang, Guozhong Sun:
Fully Context-Sensitive CFI for COTS Binaries. ACISP (2) 2017: 435-442 - [c77]Yajuan Du, Qiao Li, Liang Shi, Deqing Zou, Hai Jin, Chun Jason Xue:
Reducing LDPC Soft Sensing Latency by Lightweight Data Refresh for Flash Read Performance Improvement. DAC 2017: 23:1-23:6 - [c76]Deqing Zou, Hanchao Qi, Zhen Li, Song Wu, Hai Jin, Guozhong Sun, Sujuan Wang, Yuyi Zhong:
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection. DIMVA 2017: 325-344 - [c75]Weizhong Qiang, Yong Cao, Weiqi Dai, Deqing Zou, Hai Jin, Benxi Liu:
Libsec: A Hardware Virtualization-Based Isolation for Shared Library. HPCC/SmartCity/DSS 2017: 34-41 - 2016
- [j40]Hai Jin, Weiqi Dai, Deqing Zou:
Theory and methodology of research on cloud security. Sci. China Inf. Sci. 59(5): 050105:1-050105:3 (2016) - [j39]Deqing Zou, Hao Qin, Hai Jin:
UiLog: Improving Log-Based Fault Diagnosis by Log Analysis. J. Comput. Sci. Technol. 31(5): 1038-1052 (2016) - [j38]Tao Wang, Lansheng Han, Cai Fu, Deqing Zou, Ming Liu:
软件漏洞静态检测模型及检测框架 (Static Detection Model and Framework for Software Vulnerability). 计算机科学 43(5): 80-86 (2016) - [j37]Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu, Gang Chen:
Taming transitive permission attack via bytecode rewriting on Android application. Secur. Commun. Networks 9(13): 2100-2114 (2016) - [j36]Deqing Zou, Yang Xiang, Geyong Min:
Privacy preserving in cloud computing environment. Secur. Commun. Networks 9(15): 2752-2753 (2016) - [j35]Weizhong Qiang, Changqing Jiang, Longbo Ran, Deqing Zou, Hai Jin:
CDMCR: multi-level fault-tolerant system for distributed applications in cloud. Secur. Commun. Networks 9(15): 2766-2778 (2016) - [j34]Chuliang Weng, Qian Liu, Kenli Li, Deqing Zou:
CloudMon: Monitoring Virtual Machines in Clouds. IEEE Trans. Computers 65(12): 3787-3793 (2016) - [j33]Xiaojing Ma, Wenjun Kevin Zeng, Laurence T. Yang, Deqing Zou, Hai Jin:
Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos. IEEE Trans. Emerg. Top. Comput. 4(3): 349-362 (2016) - [j32]Gang Chen, Hai Jin, Deqing Zou, Zhenkai Liang, Bing Bing Zhou, Hao Wang:
A Framework for Practical Dynamic Software Updating. IEEE Trans. Parallel Distributed Syst. 27(4): 941-950 (2016) - [c74]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu:
VulPecker: an automated vulnerability detection system based on code similarity analysis. ACSAC 2016: 201-213 - [c73]Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment. BigDataSecurity/HPSC/IDS 2016: 146-151 - [c72]Salah H. Abbdal, Hai Jin, Ali A. Yassin, Zaid Ameen Abduljabbar, Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Deqing Zou:
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage. BigDataSecurity/HPSC/IDS 2016: 412-417 - [c71]Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou:
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. AsiaCCS 2016: 913-918 - [c70]Zaid Ameen Abduljabbar, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Towards Secure Private Image Matching. GPC 2016: 301-315 - [c69]Zaid Ameen Abduljabbar, Hai Jin, Ali A. Yassin, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Robust scheme to protect authentication code of message/image documents in cloud computing. ICNC 2016: 1-5 - [c68]Zilong Wen, Weiqi Dai, Deqing Zou, Hai Jin:
PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures. Trustcom/BigDataSE/ISPA 2016: 683-690 - [c67]Zaid Ameen Abduljabbar, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Privacy-Preserving Image Retrieval in IoT-Cloud. Trustcom/BigDataSE/ISPA 2016: 799-806 - 2015
- [j31]Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Weizhong Qiang:
A lightweight software fault-tolerance system in the cloud environment. Concurr. Comput. Pract. Exp. 27(12): 2982-2998 (2015) - [j30]Weiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi, Laurence Tianruo Yang:
TEE: A virtual DRTM based execution environment for secure cloud-end computing. Future Gener. Comput. Syst. 49: 47-57 (2015) - [j29]Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai, Yang Xiang:
A privacy-preserving location tracking system for smartphones based on cloud storage. Secur. Commun. Networks 8(3): 446-458 (2015) - [c66]Zaid Ameen Abduljabbar, Hai Jin, Zaid Alaa Hussien, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment. IAS 2015: 61-66 - [c65]Zaid Alaa Hussien, Hai Jin, Zaid Ameen Abduljabbar, Ali A. Yassin, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext. IAS 2015: 73-78 - [c64]Kai Liu, Deqing Zou, Hai Jin:
UaaS: Software Update as a Service for the IaaS Cloud. SCC 2015: 483-490 - [c63]Feng Chen, Weizhong Qiang, Hai Jin, Deqing Zou, Duoqiang Wang:
Multi-version Execution for the Dynamic Updating of Cloud Applications. COMPSAC 2015: 185-190 - [c62]Yushuai Shi, Deqing Zou, Weizhong Qiang, Xiaofei Liao, Hai Jin:
CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems. CONIELECOMP 2015: 40-47 - [c61]Song Wu, Chuxiong Yan, Haibao Chen, Hai Jin, Wei Guo, Zhen Wang, Deqing Zou:
Evaluating Latency-Sensitive Applications: Performance Degradation in Datacenters with Restricted Power Budget. ICPP 2015: 639-648 - [c60]Kao Zhao, Deqing Zou, Hai Jin, Zhangbiaoge Tian, Weizhong Qiang, Weiqi Dai:
Privacy Protection for Perceptual Applications on Smartphones. IEEE MS 2015: 174-181 - [c59]Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin, Deqing Zou, Robert H. Deng:
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. WISEC 2015: 6:1-6:6 - 2014
- [j28]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou, Peng Xu:
Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing. Comput. J. 57(2): 241-254 (2014) - [j27]Ligang He, Deqing Zou, Zhang Zhang, Chao Chen, Hai Jin, Stephen A. Jarvis:
Developing resource consolidation frameworks for moldable virtual machines in clouds. Future Gener. Comput. Syst. 32: 69-81 (2014) - [j26]Deqing Zou, Weide Zheng, Wenbin Jiang, Hai Jin, Gang Chen:
Memshepherd: comprehensive memory bug fault-tolerance system. Secur. Commun. Networks 7(9): 1412-1419 (2014) - [j25]Jinfeng Yuan, Weizhong Qiang, Hai Jin, Deqing Zou:
CloudTaint: an elastic taint tracking framework for malware detection in the cloud. J. Supercomput. 70(3): 1433-1450 (2014) - [c58]Fengwei Wang, Hai Jin, Deqing Zou, Weizhong Qiang:
FDKeeper: A Quick and Open Failure Detector for Cloud Computing System. C3S2E 2014: 14:1-14:8 - [c57]Deqing Zou, Hao Wang, Hai Jin:
StrongUpdate: An Immediate Dynamic Software Update System for Multi-threaded Applications. HCC 2014: 365-379 - [c56]Deqing Zou, Hao Qin, Hai Jin, Weizhong Qiang, Zongfen Han, Xueguang Chen:
Improving Log-Based Fault Diagnosis by Log Classification. NPC 2014: 446-458 - [c55]Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai:
ONHelp: Components in Building Secure Cloud Based on OpenNebula. TrustCom 2014: 320-327 - [c54]Salah H. Abbdal, Hai Jin, Deqing Zou, Ali A. Yassen:
Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage. UIC/ATC/ScalCom 2014: 510-517 - 2013
- [j24]Hai Jin, Ge Cheng, Deqing Zou, Xinwen Zhang:
Cherub: Fine-grained application protection with on-demand virtualization. Comput. Math. Appl. 65(9): 1326-1338 (2013) - [j23]Deqing Zou, Wenrong Zhang, Weizhong Qiang, Guofu Xiang, Laurence Tianruo Yang, Hai Jin, Kan Hu:
Design and implementation of a trusted monitoring framework for cloud platforms. Future Gener. Comput. Syst. 29(8): 2092-2102 (2013) - [j22]Weizhong Qiang, Deqing Zou, Shenglan Wang, Laurence Tianruo Yang, Hai Jin, Lei Shi:
CloudAC: a cloud-oriented multilayer access control system for logic virtual domain. IET Inf. Secur. 7(1): 51-59 (2013) - [j21]Cai Fu, Min Li, Deqing Zou, Shuyan Qu, Lansheng Han, James Hyuk Park:
Community Vitality in Dynamic Temporal Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Zhenkai Liang, Weide Zheng, Xuanhua Shi:
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 10(6): 368-379 (2013) - [j19]Hai Jin, Guofu Xiang, Deqing Zou, Song Wu, Feng Zhao, Min Li, Weide Zheng:
A VMM-based intrusion prevention system in cloud computing environment. J. Supercomput. 66(3): 1133-1151 (2013) - 2012
- [j18]Weizhong Qiang, Aleksandr Konstantinov, Deqing Zou, Laurence Tianruo Yang:
A standards-based interoperable single sign-on framework in ARC Grid middleware. J. Netw. Comput. Appl. 35(3): 892-904 (2012) - [j17]Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia:
Task-based behavior detection of illegal codes. Math. Comput. Model. 55(1-2): 80-86 (2012) - [j16]Feng Zhao, Min Li, Weizhong Qiang, Hai Jin, Deqing Zou, Qin Zhang:
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas. Secur. Commun. Networks 5(10): 1169-1180 (2012) - [c53]Huafeng Kong, YunTing Lei, Zhang Zhang, Deqing Zou:
A Cloud Computing Management System Platform Based on Power-Sensitive Resource. APSCC 2012: 3-7 - [c52]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data. APSCC 2012: 263-270 - [c51]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Towards Privacy Preserving Mining over Distributed Cloud Databases. CGC 2012: 130-136 - [c50]Ali A. Yassin, Hai Jin, Ayad Ibrahim, Deqing Zou:
Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing. CGC 2012: 282-289 - [c49]Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Approximate Keyword-based Search over Encrypted Cloud Data. ICEBE 2012: 238-245 - [c48]Guofu Xiang, Hai Jin, Deqing Zou:
A comprehensive monitoring framework for virtual computing environment. ICOIN 2012: 551-556 - [c47]Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, Deqing Zou:
A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing. IPDPS Workshops 2012: 1210-1217 - [c46]Ali A. Yassin, Hai Jin, Ayad Ibrahim, Deqing Zou:
Encrypted Remote User Authentication Scheme by Using Smart Card. WISM 2012: 314-323 - [e2]James Jong Hyuk Park, Jongsung Kim, Deqing Zou, Yang Sun Lee:
Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012, Gwangju, Korea, September 6-8, 2012. Lecture Notes in Electrical Engineering 180, Springer 2012, ISBN 978-94-007-5082-1 [contents] - 2011
- [j15]Deqing Zou, Shangxin Du, Weide Zheng, Hai Jin:
Building Automated Trust Negotiation architecture in virtual computing environment. J. Supercomput. 55(1): 69-85 (2011) - [c45]Ligang He, Kewei Duan, Xueguang Chen, Deqing Zou, Zongfen Han, Ali Fadavinia, Stephen A. Jarvis:
Modelling Workflow Executions under Role-Based Authorisation Control. IEEE SCC 2011: 200-208 - [c44]Moussa Djiriba Traore, Hai Jin, Deqing Zou, Weizhong Qiang, Guofu Xiang:
RAPn: Network Attack Prediction Using Ranking Access Petri Net. ChinaGrid 2011: 108-115 - [c43]Ligang He, Deqing Zou, Zhang Zhang, Kai Yang, Hai Jin, Stephen A. Jarvis:
Optimizing Resource Consumptions in Clouds. GRID 2011: 42-49 - 2010
- [j14]Hai Jin, Guofu Xiang, Deqing Zou, Feng Zhao, Min Li, Chen Yu:
A guest-transparent file integrity monitoring method in virtualization environment. Comput. Math. Appl. 60(2): 256-266 (2010) - [j13]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang:
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing. Concurr. Comput. Pract. Exp. 22(13): 1893-1910 (2010) - [j12]Deqing Zou, Weide Zheng, Jinjiu Long, Hai Jin, Xueguang Chen:
Constructing trusted virtual execution environment in P2P grids. Future Gener. Comput. Syst. 26(5): 769-775 (2010) - [j11]Jong Hyuk Park, Deqing Zou, Tai-Hoon Kim, Javier López, Hangbae Chang:
Editorial. J. Intell. Manuf. 21(5): 593-594 (2010) - [c42]Weiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi:
TEE: a virtual DRTM based execution environment for secure cloud-end computing. CCS 2010: 663-665 - [c41]Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Weizhong Qiang, Gang Hu:
SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment. CLUSTER 2010: 97-106 - [c40]Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao:
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization. SRDS 2010: 72-81 - [c39]Alex K. Ohoussou, Hai Jin, Deqing Zou, Feng Zhao, Guofu Xiang, Ge Cheng:
Autonomous agent based intrusion detection in virtual computing environment. WCNIS 2010: 682-686
2000 – 2009
- 2009
- [j10]Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen:
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems. Comput. J. 52(8): 861-870 (2009) - [j9]Deqing Zou, Ligang He, Hai Jin, Xueguang Chen:
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment. J. Netw. Comput. Appl. 32(2): 402-411 (2009) - [c38]Deqing Zou, Jinjiu Long, Hai Jin:
Trusted Deployment of Virtual Execution Environment in Grid Systems. ASIAN 2009: 124-136 - [c37]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang, Min Li, Chen Yu, Guofu Xiang:
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure. GRID 2009: 113-119 - [c36]Deqing Zou, Lei Shi, Hai Jin:
DVM-MAC: A Mandatory Access Control System in Distributed Virtual Computing Environment. ICPADS 2009: 556-563 - [c35]Hai Jin, Guofu Xiang, Feng Zhao, Deqing Zou, Min Li, Lei Shi:
VMFence: a customized intrusion prevention system in distributed virtual computing environment. ICUIMC 2009: 391-399 - [c34]Ge Cheng, Hai Jin, Deqing Zou, Lei Shi, Alex K. Ohoussou:
CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions. SVM 2009: 43-54 - 2008
- [j8]Deqing Zou, Hai Jin, Jong Hyuk Park, Han-Chieh Chao, Yunfa Li:
Trusted virtual machine monitor-based group signature architecture. IET Commun. 2(10): 1311-1319 (2008) - [c33]Liu Hong, Hu Wan, Yu Wang, Xueguang Chen, Deqing Zou:
Extending HLA/RTI to WAN Based on Grid Service. APSCC 2008: 57-62 - [c32]Deqing Zou, Yunfa Li, Song Wu, Weizhong Qiang:
A Trusted Group Signature Architecture in Virtual Computing Environment. ATC 2008: 73-85 - [c31]Song Wu, Kai Wang, Hai Jin, Deqing Zou:
Heterogeneous Grid Workflow Management Based on Virtual Service. GCC 2008: 483-489 - [c30]Ge Cheng, Hai Jin, Deqing Zou, Alex K. Ohoussou, Feng Zhao:
A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. ICYCS 2008: 1481-1487 - [c29]Deqing Zou, Jong Hyuk Park, Laurence Tianruo Yang, Zhensong Liao, Tai-Hoon Kim:
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment. UIC 2008: 35-45 - 2007
- [j7]Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang:
A Novel Approach to Hide Credentials. Int. J. Netw. Secur. 4(3): 306-311 (2007) - [c28]Deqing Zou, Laurence Tianruo Yang, Weizhong Qiang, Xueguang Chen, Zongfen Han:
An Authentication and Access Control Framework for Group Communication Systems in Grid Environment. AINA 2007: 547-554 - [c27]Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han:
A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid. ATC 2007: 42-51 - [c26]Zhensong Liao, Hai Jin, Deqing Zou, Chisong Li:
An EMAIL Based Automated Trust Negotiation Model. CIS 2007: 789-793 - [c25]Yunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han:
A Scalable Service Scheme for Secure Group Communication in Grid. COMPSAC (1) 2007: 31-38 - [c24]Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen:
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. FGCN (2) 2007: 71-75 - [c23]Deqing Zou, Hai Jin, Xueguang Chen, Zongfen Han:
Grid Security Interoperation between CGSP and VEGA. FGCN (1) 2007: 510-515 - [c22]Zhensong Liao, Hai Jin, Deqing Zou:
A Hidden Credential Based Oblivious Automated Trust Negotiation Model. ICEBE 2007: 247-253 - [c21]Jong Hyuk Park, Deqing Zou:
Service, Security and Its Data Management for Ubiquitous Computing - Overview. PAKDD Workshops 2007: 500-501 - [e1]Takashi Washio, Zhi-Hua Zhou, Joshua Zhexue Huang, Xiaohua Hu, Jinyan Li, Chao Xie, Jieyue He, Deqing Zou, Kuan-Ching Li, Mário M. Freire:
Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4819, Springer 2007, ISBN 978-3-540-77016-9 [contents] - 2006
- [j6]Hai Jin, Xuanhua Shi, Weizhong Qiang, Deqing Zou:
DRIC: Dependable Grid Computing Framework. IEICE Trans. Inf. Syst. 89-D(2): 612-623 (2006) - [j5]Yunfa Li, Deqing Zou, Zongfen Han, Weizhong Qiang:
Research on Group Signature Scheme with Forward Security. J. Comput. Res. Dev. 43(12): 2069-2075 (2006) - [c20]Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou:
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ATC 2006: 227-235 - [c19]Hai Jin, Muzhou Xiong, Song Wu, Deqing Zou:
Replica Based Distributed Metadata Management in Grid Environment. International Conference on Computational Science (4) 2006: 1055-1062 - [c18]Hai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang:
A New Approach to Hide Policy for Automated Trust Negotiation. IWSEC 2006: 168-178 - 2005
- [j4]Hai Jin, Xuanhua Shi, Weizhong Qiang, Deqing Zou:
An adaptive meta-scheduler for data-intensive applications. Int. J. Grid Util. Comput. 1(1): 32-37 (2005) - [j3]Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:
RB-GACA: an RBAC based grid access control architecture. Int. J. Grid Util. Comput. 1(1): 61-70 (2005) - [j2]Deqing Zou, Hai Jin, Feng Mao, Zongfen Han, Xuping Tu:
Service organisation and information consistency for service grid. Int. J. Web Grid Serv. 1(1): 69-86 (2005) - [c17]Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou:
Joint Management of Authorization for Dynamic Virtual Organization. CIT 2005: 375-381 - [c16]Xuanhua Shi, Hai Jin, Zongfen Han, Weizhong Qiang, Song Wu, Deqing Zou:
ALTER: Adaptive Failure Detection Services for Grids. IEEE SCC 2005: 355-358 - [c15]Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:
VO-Sec: An Access Control Framework for Dynamic Virtual Organization. ACISP 2005: 370-381 - [c14]Feng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi:
QoS Oriented Dynamic Replica Cost Model for P2P Computing. ICDCS Workshops 2005: 822-828 - [c13]Deqing Zou, Weizhong Qiang, Xuanhua Shi:
A Formal General Framework and Service Access Model for Service Grid. ICECCS 2005: 349-356 - [c12]Yunfa Li, Hai Jin, Zongfen Han, Chao Xie, Deqing Zou, Hao Wu:
Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains. IPDPS 2005 - [c11]Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:
A Novel Authorization Mechanism for Service-Oriented Virtual Organization. ISCIS 2005: 382-391 - [c10]Hai Jin, Chuanjiang Yi, Song Wu, Li Qi, Deqing Zou:
Uniform Authorization Management in ChinaGrid Support Platform. ISPA Workshops 2005: 223-231 - 2004
- [c9]Hanhua Chen, Hai Jin, Minghu Zhang, Pengliu Tan, Deqing Zou, Pingpeng Yuan:
Early Experience in QoS-Based Service Grid Architecture. APWeb 2004: 924-927 - [c8]Hai Jin, Hanhua Chen, Jian Chen, Ping Kuang, Li Qi, Deqing Zou:
Real-Time Strategy and Practice in Service Grid. COMPSAC 2004: 161-166 - [c7]Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou:
A Novel VO-Based Access Control Model for Grid. GCC 2004: 293-300 - [c6]Xuanhua Shi, Hai Jin, Weizhong Qiang, Deqing Zou:
Reliability Analysis for Grid Computing. GCC 2004: 787-790 - [c5]Hai Jin, Hanhua Chen, Minghu Zhang, Deqing Zou:
RT-Grid: A QoS Oriented Service Grid Framework. PDCAT 2004: 345-348 - 2003
- [j1]Hai Jin, Deqing Zou, Hanhua Chen, Jianhua Sun, Song Wu:
Fault-Tolerant Grid Architecture and Practice. J. Comput. Sci. Technol. 18(4): 423-433 (2003) - [c4]Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou, Hao Zhang:
RB-GACA: A RBAC Based Grid Access Control Architecture. GCC (1) 2003: 487-494 - [c3]Deqing Zou, Hai Jin, Xingchang Dong, Weizhong Qiang, Xuanhua Shi:
HH-MDS: A QoS-Aware Domain Divided Information Service. GCC (2) 2003: 573-580 - [c2]Xuanhua Shi, Hai Jin, Weizhong Qiang, Deqing Zou:
An Adaptive Meta-scheduler for Data-Intensive Applications. GCC (2) 2003: 830-837 - [c1]Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han, Deqing Zou:
A Data Mining Based Intrusion Detection Model. IDEAL 2003: 677-684
Coauthor Index
aka: Laurence Tianruo Yang
aka: Ali A. Yassen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint