Qiang, Weizhong
297  Ergebnisse:
Personensuche X
?
1

Contrastive Learning for Robust Android Malware Familial Cl..:

Wu, Yueming ; Dou, Shihan ; Zou, Deqing...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
3

SpecTerminator: Blocking Speculative Side Channels Based on..:

Jin, Hai ; He, Zhuo ; Qiang, Weizhong
ACM Transactions on Architecture and Code Optimization.  20 (2023)  1 - p. 1-26 , 2023
 
?
4

JSRevealer: A Robust Malicious JavaScript Detector against ..:

, In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Ren, Kunlun ; Qiang, Weizhong ; Wu, Yueming... - p. 339-351 , 2023
 
?
6

An Empirical Study on the Effects of Obfuscation on Static ..:

, In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis,
Ren, Kunlun ; Qiang, Weizhong ; Wu, Yueming... - p. 1420-1432 , 2023
 
?
 
?
8

AutoSlicer: Automatic Program Partitioning for Securing Sen..:

, In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Qiang, Weizhong ; Luo, Hao - p. 239-247 , 2022
 
?
10

CloudCFI: Context-Sensitive and Incremental CFI in the Clou..:

Qiang, Weizhong ; Huang, Yingda ; Jin, Hai..
IEEE Transactions on Cloud Computing.  9 (2021)  3 - p. 938-957 , 2021
 
?
11

Defending CNN against privacy leakage in edge computing via..:

Qiang, Weizhong ; Liu, Renwan ; Jin, Hai
Future Generation Computer Systems.  125 (2021)  - p. 460-470 , 2021
 
?
12

Differential Privacy Preservation for Smart Meter Systems:

, In: Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science,
Wu, Junfang ; Qiang, Weizhong ; Zhu, Tianqing... - p. 669-685 , 2020
 
?
13

A Tensor-Based Optimization Model for Secure Sustainable Cy..:

Feng, Jun ; Yang, Laurence T. ; Zhang, Ronghao...
IEEE Transactions on Sustainable Computing.  5 (2020)  2 - p. 223-234 , 2020
 
?
14

Performance and security in cloud computing:

Qiang, Weizhong
The Journal of Supercomputing.  75 (2019)  1 - p. 1-3 , 2019
 
?
15

Defending Against Flow Table Overloading Attack in Software..:

Yuan, Bin ; Zou, Deqing ; Yu, Shui...
IEEE Transactions on Services Computing.  12 (2019)  2 - p. 231-246 , 2019
 
1-15