default search action
Qianying Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Linhan Li, Qianying Zhang, Zekun Xu, Shijun Zhao, Zhiping Shi, Yong Guan:
rOOM: A Rust-Based Linux Out of Memory Kernel Component. IEICE Trans. Inf. Syst. 107(3): 245-256 (2024) - [c21]Ximeng Li, Shanyan Chen, Yong Guan, Qianying Zhang, Guohui Wang, Zhiping Shi:
Refinement Verification of OS Services based on a Verified Preemptive Microkernel. FASE 2024: 188-209 - 2023
- [j10]Qianying Zhang, Mingxin Wang:
A nonlocal diffusion competition model with seasonal succession and free boundaries. Commun. Nonlinear Sci. Numer. Simul. 122: 107263 (2023) - [j9]Ximeng Li, Qianying Zhang, Guohui Wang, Zhi-Ping Shi, Yong Guan:
A unified proof technique for verifying program correctness with big-step semantics. J. Syst. Archit. 136: 102820 (2023) - [j8]Junqing Huang, Michael V. Ruzhansky, Qianying Zhang, Haihui Wang:
Intrinsic Image Transfer for Illumination Manipulation. IEEE Trans. Pattern Anal. Mach. Intell. 45(6): 7444-7456 (2023) - [c20]Leping Zhang, Qianying Zhang, Xinyue Wang, Ximeng Li, Guohui Wang, Zhiping Shi, Yong Guan:
Formal Verification of Interrupt Isolation for the TrustZone-based TEE. APSEC 2023: 309-318 - 2022
- [c19]Linhan Li, Qianying Zhang, Shijun Zhao, Zhi-Ping Shi, Yong Guan:
Design and Implementation of OOM Module based on Rust. QRS Companion 2022: 774-775 - 2021
- [c18]Ximeng Li, Qianying Zhang, Guohui Wang, Zhiping Shi, Yong Guan:
Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics. SETTA 2021: 61-80 - [i7]Junqing Huang, Michael V. Ruzhansky, Qianying Zhang, Haihui Wang:
Intrinsic Image Transfer for Illumination Manipulation. CoRR abs/2107.00704 (2021) - [i6]Ximeng Li, Qianying Zhang, Guohui Wang, Zhiping Shi, Yong Guan:
Reasoning about Iteration and Recursion Uniformly based on Big-step Semantics. CoRR abs/2108.01883 (2021) - 2020
- [j7]Qianying Zhang, Shijun Zhao:
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0. Comput. Networks 179: 107369 (2020) - [j6]Shanyan Chen, Guohui Wang, Ximeng Li, Qianying Zhang, Zhi-Ping Shi, Yong Guan:
Formalization of Camera Pose Estimation Algorithm based on Rodrigues Formula. Formal Aspects Comput. 32(4-6): 417-437 (2020) - [c17]Yuwei Ma, Qianying Zhang, Shijun Zhao, Guohui Wang, Ximeng Li, Zhiping Shi:
Formal Verification of Memory Isolation for the TrustZone-based TEE. APSEC 2020: 149-158 - [c16]Xiangyu Chen, Ximeng Li, Qianying Zhang, Zhiping Shi, Yong Guan:
Formalizing the Transaction Flow Process of Hyperledger Fabric. ICFEM 2020: 233-250
2010 – 2019
- 2019
- [j5]Li-Ming Li, Zhi-Ping Shi, Yong Guan, Qianying Zhang, Yong-Dong Li:
Formalization of Geometric Algebra in HOL Light. J. Autom. Reason. 63(3): 787-808 (2019) - [j4]Meiyu Zhang, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks. Secur. Commun. Networks 2019: 8690853:1-8690853:12 (2019) - [c15]Leping Zhang, Qianying Zhang, Guohui Wang, Zhiping Shi, Minhua Wu, Yong Guan:
Formal Modelling and Verification of Spinlocks at Instruction Level. APSEC 2019: 355-362 - [c14]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE. CCS 2019: 1723-1740 - [c13]Ximeng Li, Zhiping Shi, Qianying Zhang, Guohui Wang, Yong Guan, Ning Han:
Towards Verifying Ethereum Smart Contracts at Intermediate Language Level. ICFEM 2019: 121-137 - [c12]Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, Dengguo Feng:
Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks. RAID 2019: 105-120 - [c11]Dongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
MicroTEE: Designing TEE OS Based on the Microkernel Architecture. TrustCom/BigDataSE 2019: 26-33 - [i5]Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan, Guohui Wang:
A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0. CoRR abs/1906.06653 (2019) - [i4]Dongxu Ji, Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan:
MicroTEE: Designing TEE OS Based on the Microkernel Architecture. CoRR abs/1908.07159 (2019) - 2018
- [c10]Guohui Wang, Yong Guan, Zhiping Shi, Qianying Zhang, Xiaojuan Li, Yongdong Li:
Formalization of Symplectic Geometry in HOL-Light. ICFEM 2018: 270-283 - 2017
- [j3]Qianying Zhang, Zhiping Shi:
A New Way to Prevent UKS Attacks Using Hardware Security Chips. Int. J. Netw. Secur. 19(5): 823-831 (2017) - 2016
- [j2]Xiumei Yang, Yong Guan, Zhiping Shi, Aixuan Wu, Qianying Zhang, Jie Zhang:
函数矩阵及其微积分的高阶逻辑形式化 (Higher-order Logic Formalization of Function Matrix and its Calculus). 计算机科学 43(11): 24-29 (2016) - 2015
- [j1]Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng:
Security analysis of SM2 key exchange protocol in TPM2.0. Secur. Commun. Networks 8(3): 383-395 (2015) - [c9]Chaolin Wang, Shaobo Zhong, Qianying Zhang, Quanyi Huang:
Urban Disaster Comprehensive Risk Assessment Research Based on GIS: A Case Study of Changsha City, Hunan Province, China. GRMSE 2015: 95-106 - [c8]Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices. ISPEC 2015: 154-167 - [c7]Shijun Zhao, Qianying Zhang:
A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0. TRUST 2015: 40-57 - [i3]Shijun Zhao, Qianying Zhang:
sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices. IACR Cryptol. ePrint Arch. 2015: 110 (2015) - 2014
- [c6]Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using On-Chip SRAM. TrustED@CCS 2014: 25-36 - [c5]Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng:
Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices. ICICS 2014: 31-48 - [c4]Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. NSS 2014: 110-123 - [c3]Qianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng:
Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware. SecureComm (1) 2014: 343-361 - [i2]Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using SRAM PUFs. IACR Cryptol. ePrint Arch. 2014: 464 (2014) - [i1]Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng:
Universally Composable secure TNC protocol based on IF-T binding to TLS. IACR Cryptol. ePrint Arch. 2014: 490 (2014) - 2013
- [c2]Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang, Dexian Chang:
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications. TRUST 2013: 133-141 - 2011
- [c1]Yu Qin, Dexian Chang, Shijun Zhao, Qianying Zhang:
A Property-Based Attestation Scheme with the Variable Privacy. TrustCom 2011: 1616-1623
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint