default search action
Wanyu Zang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j13]Jin Han, Wanyu Zang, Meng Yu, Ravi S. Sandhu:
Quantify Co-Residency Risks in the Cloud Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 18(4): 1568-1579 (2021) - 2020
- [j12]Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(4): 1-15 (2020) - [c26]Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
On the Cost-Effectiveness of TrustZone Defense on ARM Platform. WISA 2020: 203-214
2010 – 2019
- 2019
- [j11]Naiwei Liu, Wanyu Zang, Songqing Chen, Meng Yu, Ravi S. Sandhu:
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform. EAI Endorsed Trans. Security Safety 6(19): e1 (2019) - 2018
- [c25]Li Liu, An Wang, Wanyu Zang, Meng Yu, Songqing Chen:
Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks. ICC 2018: 1-6 - [c24]Li Liu, An Wang, Wanyu Zang, Meng Yu, Menbai Xiao, Songqing Chen:
Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling. SecureComm (1) 2018: 491-511 - 2017
- [c23]Jin Han, Wanyu Zang, Songqing Chen, Meng Yu:
Reducing Security Risks of Clouds Through Virtual Machine Placement. DBSec 2017: 275-292 - 2016
- [j10]Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Wanyu Zang, Meng Yu:
Energy efficient approximate self-adaptive data collection in wireless sensor networks. Frontiers Comput. Sci. 10(5): 936-950 (2016) - 2015
- [j9]David S. Jackson, Wanyu Zang, Qijun Gu, Wei Cheng, Meng Yu:
Exploiting and defending trust models in cooperative spectrum sensing. EURASIP J. Wirel. Commun. Netw. 2015: 4 (2015) - [j8]David S. Jackson, Wanyu Zang, Qijun Gu, Meng Yu:
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing. J. Internet Serv. Inf. Secur. 5(2): 4-23 (2015) - [c22]Zili Zha, Min Li, Wanyu Zang, Meng Yu, Songqing Chen:
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system. ICNC 2015: 685-689 - 2014
- [j7]Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang:
Risk balance defense approach against intrusions for network server. Int. J. Inf. Sec. 13(3): 255-269 (2014) - [j6]Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu, Wanyu Zang:
Obtaining K-obfuscation for profile privacy in social networks. Secur. Commun. Networks 7(9): 1384-1398 (2014) - [c21]Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai:
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization. ESORICS (1) 2014: 310-325 - [c20]Bin Wang, Xiaochun Yang, Wanyu Zang, Meng Yu:
Approximate Self-Adaptive Data Collection in Wireless Sensor Networks. WASA 2014: 564-575 - [c19]David S. Jackson, Wanyu Zang, Qijun Gu, Wei Cheng:
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing. WASA 2014: 660-671 - 2013
- [j5]Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia:
Quantitative survivability evaluation of three virtual machine-based server architectures. J. Netw. Comput. Appl. 36(2): 781-790 (2013) - [c18]Min Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu:
MyCloud: supporting user-configured privacy protection in cloud computing. ACSAC 2013: 59-68 - 2012
- [c17]Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu:
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. ESORICS 2012: 289-306 - [c16]Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang:
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. SEC 2012: 388-399 - [c15]Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He:
Improving Cloud Survivability through Dependency based Virtual Machine Placement. SECRYPT 2012: 321-326 - [c14]Qijun Gu, Wanyu Zang, Meng Yu, Peng Liu:
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. TrustCom 2012: 793-800 - 2011
- [c13]Qijun Gu, Meng Yu, Wanyu Zang, Peng Liu:
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks. ICC 2011: 1-6 - 2010
- [j4]Meng Yu, Wanyu Zang, Peng Liu:
Recovery of data integrity under multi-tier architectures. IET Inf. Secur. 4(4): 344-351 (2010) - [c12]Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu:
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. SECRYPT 2010: 478-485 - [c11]Heywoong Kim, Qijun Gu, Meng Yu, Wanyu Zang, Peng Liu:
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++. SpringSim 2010: 101 - [e1]Qijun Gu, Wanyu Zang, Meng Yu:
Security in Emerging Wireless Communication and Networking Systems - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 42, Springer 2010, ISBN 978-3-642-11525-7 [contents]
2000 – 2009
- 2009
- [j3]Meng Yu, Peng Liu, Wanyu Zang:
The implementation and evaluation of a recovery system for workflows. J. Netw. Comput. Appl. 32(1): 158-183 (2009) - [c10]Wanyu Zang, Qijun Gu, Meng Yu, Peng Liu:
An Attack-Resilient Channel Assignment MAC Protocol. NBiS 2009: 246-253 - 2007
- [c9]Meng Yu, Wanyu Zang, Peng Liu:
Database Isolation and Filtering against Data Corruption Attacks. ACSAC 2007: 97-106 - [c8]Meng Yu, Wanyu Zang, Barbara Reagor:
Decentralized Trust Management based on the Reputation of Information Sources. ICNSC 2007: 212-217 - [p1]Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia:
Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94 - 2006
- [c7]Wanyu Zang, Meng Yu:
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. ICISS 2006: 289-302 - 2005
- [j2]Meng Yu, Peng Liu, Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations. J. Comput. Secur. 13(4): 623-658 (2005) - [j1]Peng Liu, Wanyu Zang, Meng Yu:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1): 78-118 (2005) - [c6]Meng Yu, Wanyu Zang, Peng Liu:
Defensive Execution of Transactional Processes against Attacks. ACSAC 2005: 515-526 - 2004
- [c5]Meng Yu, Peng Liu, Wanyu Zang:
Self-Healing Workflow Systems under Attacks. ICDCS 2004: 418-425 - 2003
- [c4]Meng Yu, Peng Liu, Wanyu Zang:
Multi-Version Attack Recovery for Workflow System. ACSAC 2003: 142-150 - [c3]Peng Liu, Wanyu Zang:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. CCS 2003: 179-189 - [c2]Meng Yu, Peng Liu, Wanyu Zang:
Intrusion Masking for Distributed Atomic Operations. SEC 2003: 229-240 - 2002
- [c1]Meng Yu, Minyi Guo, Yi Pan, Wanyu Zang, Li Xie:
JAPS-II: A Source to Source Parallelizing Compiler for Java. PDPTA 2002: 164-170
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint