default search action
Shijun Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Linhan Li, Qianying Zhang, Zekun Xu, Shijun Zhao, Zhiping Shi, Yong Guan:
rOOM: A Rust-Based Linux Out of Memory Kernel Component. IEICE Trans. Inf. Syst. 107(3): 245-256 (2024) - [j9]Kun Qiu, Pak-Lok Poon, Shijun Zhao, Dave Towey, Lanlin Yu:
Improving the validation of multiple-object detection using a complex-network-community-based relevance metric. Knowl. Based Syst. 299: 112027 (2024) - [j8]Yan Dong, Shijun Zhao, Xuejin Sun, Qinghui Li:
Are the Cloud-Top Heights Retrieved From GOES-16/ABI and GOES-17/ABI Consistent? IEEE Trans. Geosci. Remote. Sens. 62: 1-9 (2024) - [i9]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - 2023
- [c17]Tao Zheng, Shijun Zhao, Kun Qiu, Pak-Lok Poon, Lanlin Yu:
Using Complex Network Communities to Evaluate the Correctness of Object Detection. DSA 2023: 743-750 - [i8]Biao Xu, Haijun Fu, Shasha Huang, Shihua Ma, Yaoxu Xiong, Jun Zhang, Xuepeng Xiang, Wenyu Lu, Ji-Jung Kai, Shijun Zhao:
Sluggish and Chemically-Biased Interstitial Diffusion in Concentrated Solid Solution Alloys: Mechanisms and Methods. CoRR abs/2311.16727 (2023) - 2022
- [j7]Shijun Zhao, Yulong Shan:
Study of the Algorithm for Wind Shear Detection with Lidar Based on Shear Intensity Factor. Algorithms 15(4): 133 (2022) - [c16]Linhan Li, Qianying Zhang, Shijun Zhao, Zhi-Ping Shi, Yong Guan:
Design and Implementation of OOM Module based on Rust. QRS Companion 2022: 774-775 - 2020
- [j6]Qianying Zhang, Shijun Zhao:
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0. Comput. Networks 179: 107369 (2020) - [j5]Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng:
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device. Secur. Commun. Networks 2020: 8957641:1-8957641:14 (2020) - [j4]Minghao Xian, Xichuan Liu, Min Yin, Kun Song, Shijun Zhao, Taichang Gao:
Rainfall Monitoring Based on Machine Learning by Earth-Space Link in the Ku Band. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 3656-3668 (2020) - [c15]Yuwei Ma, Qianying Zhang, Shijun Zhao, Guohui Wang, Ximeng Li, Zhiping Shi:
Formal Verification of Memory Isolation for the TrustZone-based TEE. APSEC 2020: 149-158
2010 – 2019
- 2019
- [j3]Meiyu Zhang, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. Secur. Commun. Networks 2019: 8690853:1-8690853:12 (2019) - [c14]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. CCS 2019: 1723-1740 - [c13]Jingbin Liu, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, Weifeng Luo:
Log-Based Control Flow Attestation for Embedded Devices. CSS (1) 2019: 117-132 - [c12]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. RAID 2019: 105-120 - [c11]Dongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
MicroTEE: Designing TEE OS Based on the Microkernel Architecture. TrustCom/BigDataSE 2019: 26-33 - [i7]Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan, Guohui Wang:
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0. CoRR abs/1906.06653 (2019) - [i6]Dongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
MicroTEE: Designing TEE OS Based on the Microkernel Architecture. CoRR abs/1908.07159 (2019) - 2018
- [j2]Wei Feng, Yu Qin, Shijun Zhao, Dengguo Feng:
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Networks 134: 167-182 (2018) - 2017
- [c10]Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices Based on PUFs. CANS 2017: 325-346 - [i5]Ning Li, Haopeng Liu, Bin Qiu, Wei Guo, Shijun Zhao, Kungang Li, Jie He:
Detection and Attention: Diagnosing Pulmonary Lung Cancer from CT by Imitating Physicians. CoRR abs/1712.05114 (2017) - [i4]Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices based on PUFs. IACR Cryptol. ePrint Arch. 2017: 991 (2017) - 2015
- [j1]Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng:
Security analysis of SM2 key exchange protocol in TPM2.0. Secur. Commun. Networks 8(3): 383-395 (2015) - [c9]Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices. ISPEC 2015: 154-167 - [c8]Shijun Zhao, Qianying Zhang:
A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0. TRUST 2015: 40-57 - [c7]Yingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, Dengguo Feng:
TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone. TrustCom/BigDataSE/ISPA (1) 2015: 41-48 - [i3]Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices. IACR Cryptol. ePrint Arch. 2015: 110 (2015) - 2014
- [c6]Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using On-Chip SRAM. TrustED@CCS 2014: 25-36 - [c5]Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng:
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices. ICICS 2014: 31-48 - [c4]Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. NSS 2014: 110-123 - [c3]Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng:
Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware. SecureComm (1) 2014: 343-361 - [i2]Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using SRAM PUFs. IACR Cryptol. ePrint Arch. 2014: 464 (2014) - [i1]Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:
Universally Composable secure TNC protocol based on IF-T binding to TLS. IACR Cryptol. ePrint Arch. 2014: 490 (2014) - 2011
- [c2]Aimin Yu, Shijun Zhao:
Enhancing Flexibility of TCG's TNC through Layered Property Attestation. TrustCom 2011: 751-756 - [c1]Yu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang:
A Property-Based Attestation Scheme with the Variable Privacy. TrustCom 2011: 1616-1623
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint