Zang, Wanyu
29  results:
Search for persons X
?
1

Quantify Co-Residency Risks in the Cloud Through Deep Learn..:

Han, Jin ; Zang, Wanyu ; Yu, Meng.
IEEE Transactions on Dependable and Secure Computing.  18 (2021)  4 - p. 1568-1579 , 2021
 
?
2

Fabrication of gelatin microspheres containing ammonium hyd..:

Liu, He ; Zhang, Zheng ; Li, Jiaxin...
Biotechnology Letters.  43 (2021)  9 - p. 1747-1755 , 2021
 
?
 
?
4

On the Cost-Effectiveness of TrustZone Defense on ARM Platf..:

, In: Information Security Applications; Lecture Notes in Computer Science,
Liu, Naiwei ; Yu, Meng ; Zang, Wanyu. - p. 203-214 , 2020
 
?
6

Energy efficient approximate self-adaptive data collection ..:

Wang, Bin ; Yang, Xiaochun ; Wang, Guoren...
Frontiers of Computer Science.  10 (2016)  5 - p. 936-950 , 2016
 
?
7

Exploiting and defending trust models in cooperative spectr..:

Jackson, David S ; Zang, Wanyu ; Gu, Qijun..
EURASIP Journal on Wireless Communications and Networking.  2015 (2015)  1 - p. , 2015
 
?
8

Quantitative survivability evaluation of three virtual mach..:

Yang, Yan ; Zhang, Yulong ; Wang, Alex Hai...
Journal of Network and Computer Applications.  36 (2013)  2 - p. 781-790 , 2013
 
?
9

MyCloud : supporting user-configured privacy protection ..:

, In: Proceedings of the 29th Annual Computer Security Applications Conference,
Li, Min ; Zang, Wanyu ; Bai, Kun.. - p. 59-68 , 2013
 
?
10

Risk balance defense approach against intrusions for networ..:

Mu, Chengpo ; Yu, Meng ; Li, Yingjiu.
International Journal of Information Security.  13 (2013)  3 - p. 255-269 , 2013
 
?
11

The implementation and evaluation of a recovery system for ..:

Yu, Meng ; Liu, Peng ; Zang, Wanyu
Journal of Network and Computer Applications.  32 (2009)  1 - p. 158-183 , 2009
 
?
12

Incentive-based modeling and inference of attacker intent, ..:

Liu, Peng ; Zang, Wanyu ; Yu, Meng
ACM Transactions on Information and System Security.  8 (2005)  1 - p. 78-118 , 2005
 
?
13

Incentive-based modeling and inference of attacker intent, ..:

Liu, Peng ; Zang, Wanyu ; Yu, Meng
ACM Transactions on Information and System Security (TISSEC).  8 (2005)  1 - p. 78-118 , 2005
 
?
14

Incentive-based modeling and inference of attacker intent, ..:

, In: Proceedings of the 10th ACM conference on Computer and communications security,
Liu, Peng ; Zang, Wanyu - p. 179-189 , 2003
 
?
15

The Enhanced and Tunable Sustained Release of Pesticides Us..:

Yang, Jun ; Zang, Wanyu ; Zhang, Zheng..
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6926573/.  , 2019
 
1-15