BibTeX records: Deqing Zou

download as .bib file

@article{DBLP:journals/jnca/WangDLCZ24,
  author       = {Zeli Wang and
                  Weiqi Dai and
                  Ming Li and
                  Kim{-}Kwang Raymond Choo and
                  Deqing Zou},
  title        = {DFier: {A} directed vulnerability verifier for Ethereum smart contracts},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {231},
  pages        = {103984},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jnca.2024.103984},
  doi          = {10.1016/J.JNCA.2024.103984},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WangDLCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/FengYRZDZ24,
  author       = {Jun Feng and
                  Laurence T. Yang and
                  Bocheng Ren and
                  Deqing Zou and
                  Mianxiong Dong and
                  Shunli Zhang},
  title        = {Tensor Recurrent Neural Network With Differential Privacy},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {3},
  pages        = {683--693},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2023.3236868},
  doi          = {10.1109/TC.2023.3236868},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/FengYRZDZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuanYXCSLZJ24,
  author       = {Bin Yuan and
                  Maogen Yang and
                  Zheng Xu and
                  Qunjinming Chen and
                  Zhanxiang Song and
                  Zhen Li and
                  Deqing Zou and
                  Hai Jin},
  title        = {Leakage of Authorization-Data in IoT Device Sharing: New Attacks and
                  Countermeasure},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3196--3210},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3323713},
  doi          = {10.1109/TDSC.2023.3323713},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YuanYXCSLZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiLZCXZJ24,
  author       = {Weiqi Dai and
                  Jinkai Liu and
                  Yang Zhou and
                  Kim{-}Kwang Raymond Choo and
                  Xia Xie and
                  Deqing Zou and
                  Hai Jin},
  title        = {{PRBFPT:} {A} Practical Redactable Blockchain Framework With a Public
                  Trapdoor},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2425--2437},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3349855},
  doi          = {10.1109/TIFS.2024.3349855},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiLZCXZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/YuanZRCXZLZZJ24,
  author       = {Bin Yuan and
                  Chi Zhang and
                  Jiajun Ren and
                  Qunjinming Chen and
                  Biang Xu and
                  Qiankun Zhang and
                  Zhen Li and
                  Deqing Zou and
                  Fan Zhang and
                  Hai Jin},
  title        = {Toward Automated Attack Discovery in {SDN} Controllers Through Formal
                  Verification},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {3},
  pages        = {3636--3655},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2024.3386404},
  doi          = {10.1109/TNSM.2024.3386404},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/YuanZRCXZLZZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/DaiYZCZXJ24,
  author       = {Weiqi Dai and
                  Liangliang Yu and
                  Yang Zhou and
                  Kim{-}Kwang Raymond Choo and
                  Deqing Zou and
                  Xia Xie and
                  Hai Jin},
  title        = {{PASSP:} {A} Private Authorization Scheme Oriented Service Providers},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {4},
  pages        = {4888--4899},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2024.3420726},
  doi          = {10.1109/TNSM.2024.3420726},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/DaiYZCZXJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/ZhaoWZJ24,
  author       = {Haojun Zhao and
                  Yueming Wu and
                  Deqing Zou and
                  Hai Jin},
  title        = {An Empirical Study on Android Malware Characterization by Social Network
                  Analysis},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {73},
  number       = {1},
  pages        = {757--770},
  year         = {2024},
  url          = {https://doi.org/10.1109/TR.2023.3304389},
  doi          = {10.1109/TR.2023.3304389},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/ZhaoWZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/WuFSZJ24,
  author       = {Yueming Wu and
                  Siyue Feng and
                  Wenqi Suo and
                  Deqing Zou and
                  Hai Jin},
  title        = {Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone
                  Detection},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {73},
  number       = {2},
  pages        = {1310--1324},
  year         = {2024},
  url          = {https://doi.org/10.1109/TR.2023.3312294},
  doi          = {10.1109/TR.2023.3312294},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/WuFSZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/WangLZ0C24,
  author       = {Hongfei Wang and
                  Chenliang Luo and
                  Deqing Zou and
                  Hai Jin and
                  Wenjie Cai},
  title        = {Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2024, Valencia, Spain, March 25-27, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://ieeexplore.ieee.org/document/10546656},
  timestamp    = {Mon, 17 Jun 2024 14:45:14 +0200},
  biburl       = {https://dblp.org/rec/conf/date/WangLZ0C24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZhaoXCQZJ24,
  author       = {Yu Zhao and
                  Wenjie Xue and
                  Weijie Chen and
                  Weizhong Qiang and
                  Deqing Zou and
                  Hai Jin},
  title        = {Owl: Differential-Based Side-Channel Leakage Detection for {CUDA}
                  Applications},
  booktitle    = {54th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2024, Brisbane, Australia, June 24-27, 2024},
  pages        = {362--376},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/DSN58291.2024.00044},
  doi          = {10.1109/DSN58291.2024.00044},
  timestamp    = {Thu, 19 Sep 2024 11:23:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/ZhaoXCQZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenZZQZJ24,
  author       = {Weijie Chen and
                  Yu Zhao and
                  Yinqian Zhang and
                  Weizhong Qiang and
                  Deqing Zou and
                  Hai Jin},
  editor       = {Joaquin Garc{\'{\i}}a{-}Alfaro and
                  Rafal Kozik and
                  Michal Choras and
                  Sokratis K. Katsikas},
  title        = {ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel
                  Attacks},
  booktitle    = {Computer Security - {ESORICS} 2024 - 29th European Symposium on Research
                  in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings,
                  Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14985},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-70903-6\_2},
  doi          = {10.1007/978-3-031-70903-6\_2},
  timestamp    = {Mon, 16 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChenZZQZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/0027WZLZX0024,
  author       = {Zhen Li and
                  Ning Wang and
                  Deqing Zou and
                  Yating Li and
                  Ruqian Zhang and
                  Shouhuai Xu and
                  Chao Zhang and
                  Hai Jin},
  title        = {On the Effectiveness of Function-Level Vulnerability Detectors for
                  Inter-Procedural Vulnerabilities},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {157:1--157:12},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3639218},
  doi          = {10.1145/3597503.3639218},
  timestamp    = {Mon, 24 Jun 2024 15:20:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/0027WZLZX0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/FengSWZ0024,
  author       = {Siyue Feng and
                  Wenqi Suo and
                  Yueming Wu and
                  Deqing Zou and
                  Yang Liu and
                  Hai Jin},
  title        = {Machine Learning is All You Need: {A} Simple Token-based Approach
                  for Effective Code Clone Detection},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {222:1--222:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3639114},
  doi          = {10.1145/3597503.3639114},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/FengSWZ0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FengWXPZ0024,
  author       = {Siyue Feng and
                  Yueming Wu and
                  Wenjie Xue and
                  Sikui Pan and
                  Deqing Zou and
                  Yang Liu and
                  Hai Jin},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {{FIRE:} Combining Multi-Stage Filtering with Taint Analysis for Scalable
                  Recurring Vulnerability Detection},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/feng-siyue},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FengWXPZ0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-09767,
  author       = {Zhen Li and
                  Ning Wang and
                  Deqing Zou and
                  Yating Li and
                  Ruqian Zhang and
                  Shouhuai Xu and
                  Chao Zhang and
                  Hai Jin},
  title        = {On the Effectiveness of Function-Level Vulnerability Detectors for
                  Inter-Procedural Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/2401.09767},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.09767},
  doi          = {10.48550/ARXIV.2401.09767},
  eprinttype    = {arXiv},
  eprint       = {2401.09767},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-09767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LopesZAALRP23,
  author       = {Ivandro Ortet Lopes and
                  Deqing Zou and
                  Ihsan H. Abdulqadder and
                  Saeed Akbar and
                  Zhen Li and
                  Francis A. Ruambo and
                  Wagner Pereira},
  title        = {Network intrusion detection based on the temporal convolutional model},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103465},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103465},
  doi          = {10.1016/J.COSE.2023.103465},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AbdulqadderZA23,
  author       = {Ihsan H. Abdulqadder and
                  Deqing Zou and
                  Israa T. Aziz},
  title        = {The {DAG} blockchain: {A} secure edge assisted honeypot for attack
                  detection and multi-controller based load balancing in {SDN} 5G},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {141},
  pages        = {339--354},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.11.008},
  doi          = {10.1016/J.FUTURE.2022.11.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AbdulqadderZA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/YuanWWZJ23,
  author       = {Bin Yuan and
                  Jun Wan and
                  Yuhan Wu and
                  Deqing Zou and
                  Hai Jin},
  title        = {On the Security of Smart Home Systems: {A} Survey},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {38},
  number       = {2},
  pages        = {228--247},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11390-023-2488-3},
  doi          = {10.1007/S11390-023-2488-3},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/YuanWWZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YuanWYXWZJ23,
  author       = {Bin Yuan and
                  Yuhan Wu and
                  Maogen Yang and
                  Luyi Xing and
                  Xuchang Wang and
                  Deqing Zou and
                  Hai Jin},
  title        = {SmartPatch: Verifying the Authenticity of the Trigger-Event in the
                  IoT Platform},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1656--1674},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3162312},
  doi          = {10.1109/TDSC.2022.3162312},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YuanWYXWZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShiZXDJ23,
  author       = {Jian Shi and
                  Deqing Zou and
                  Shouhuai Xu and
                  Xianjun Deng and
                  Hai Jin},
  title        = {Does OpenBSD and Firefox's Security Improve With Time?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {2781--2793},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3153325},
  doi          = {10.1109/TDSC.2022.3153325},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShiZXDJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/HuFSJWZJ23,
  author       = {Yutao Hu and
                  Yilin Fang and
                  Yifan Sun and
                  Yaru Jia and
                  Yueming Wu and
                  Deqing Zou and
                  Hai Jin},
  title        = {Code2Img: Tree-Based Image Transformation for Scalable Code Clone
                  Detection},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {9},
  pages        = {4429--4442},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2023.3295801},
  doi          = {10.1109/TSE.2023.3295801},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/HuFSJWZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WangALSZL23,
  author       = {Jingyu Wang and
                  Jennifer Appiah{-}Kubi and
                  Lung{-}An Lee and
                  Dongyuan Shi and
                  Deqing Zou and
                  Chen{-}Ching Liu},
  title        = {An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid
                  Communications Under Key Leakage and Dishonest Insiders},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {14},
  number       = {2},
  pages        = {1210--1222},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSG.2022.3200405},
  doi          = {10.1109/TSG.2022.3200405},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/WangALSZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RenQWZZJ23,
  author       = {Kunlun Ren and
                  Weizhong Qiang and
                  Yueming Wu and
                  Yi Zhou and
                  Deqing Zou and
                  Hai Jin},
  title        = {JSRevealer: {A} Robust Malicious JavaScript Detector against Obfuscation},
  booktitle    = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023},
  pages        = {339--351},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSN58367.2023.00041},
  doi          = {10.1109/DSN58367.2023.00041},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/RenQWZZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuYWLZJ23,
  author       = {Yulun Wu and
                  Zeliang Yu and
                  Ming Wen and
                  Qiang Li and
                  Deqing Zou and
                  Hai Jin},
  title        = {Understanding the Threats of Upstream Vulnerabilities to Downstream
                  Projects in the Maven Ecosystem},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2023, Melbourne, Australia, May 14-20, 2023},
  pages        = {1046--1058},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE48619.2023.00095},
  doi          = {10.1109/ICSE48619.2023.00095},
  timestamp    = {Wed, 19 Jul 2023 10:09:12 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/WuYWLZJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/YuanLFWZLLJ23,
  author       = {Bin Yuan and
                  Yifan Lu and
                  Yilin Fang and
                  Yueming Wu and
                  Deqing Zou and
                  Zhen Li and
                  Zhi Li and
                  Hai Jin},
  title        = {Enhancing Deep Learning-based Vulnerability Detection by Building
                  Behavior Graph Model},
  booktitle    = {45th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2023, Melbourne, Australia, May 14-20, 2023},
  pages        = {2262--2274},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICSE48619.2023.00190},
  doi          = {10.1109/ICSE48619.2023.00190},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/YuanLFWZLLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/HuXFWYZ023,
  author       = {Tiancheng Hu and
                  Zijing Xu and
                  Yilin Fang and
                  Yueming Wu and
                  Bin Yuan and
                  Deqing Zou and
                  Hai Jin},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract
                  Syntax Tree},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598040},
  doi          = {10.1145/3597926.3598040},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/HuXFWYZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/Xie0JGHZ023,
  author       = {Zifan Xie and
                  Ming Wen and
                  Haoxiang Jia and
                  Xiaochen Guo and
                  Xiaotong Huang and
                  Deqing Zou and
                  Hai Jin},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {Precise and Efficient Patch Presence Test for Android Applications
                  against Code Obfuscation},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {347--359},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598061},
  doi          = {10.1145/3597926.3598061},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/Xie0JGHZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/HuWLPWZ023,
  author       = {Yutao Hu and
                  Suyuan Wang and
                  Wenke Li and
                  Junru Peng and
                  Yueming Wu and
                  Deqing Zou and
                  Hai Jin},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {1407--1419},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598145},
  doi          = {10.1145/3597926.3598145},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/HuWLPWZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/RenQWZZ023,
  author       = {Kunlun Ren and
                  Weizhong Qiang and
                  Yueming Wu and
                  Yi Zhou and
                  Deqing Zou and
                  Hai Jin},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {An Empirical Study on the Effects of Obfuscation on Static Machine
                  Learning-Based Malicious JavaScript Detectors},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {1420--1432},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598146},
  doi          = {10.1145/3597926.3598146},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/RenQWZZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiZZWLXCJ23,
  author       = {Zhen Li and
                  Ruqian Zhang and
                  Deqing Zou and
                  Ning Wang and
                  Yating Li and
                  Shouhuai Xu and
                  Chen Chen and
                  Hai Jin},
  title        = {Robin: {A} Novel Method to Produce Robust Interpreters for Deep Learning-Based
                  Code Classifiers},
  booktitle    = {38th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2023, Luxembourg, September 11-15, 2023},
  pages        = {27--39},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ASE56229.2023.00164},
  doi          = {10.1109/ASE56229.2023.00164},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/LiZZWLXCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZouFWS023,
  author       = {Deqing Zou and
                  Siyue Feng and
                  Yueming Wu and
                  Wenqi Suo and
                  Hai Jin},
  editor       = {Satish Chandra and
                  Kelly Blincoe and
                  Paolo Tonella},
  title        = {Tritor: Detecting Semantic Code Clones by Building Social Network-Based
                  Triads Model},
  booktitle    = {Proceedings of the 31st {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023},
  pages        = {771--783},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611643.3616354},
  doi          = {10.1145/3611643.3616354},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZouFWS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-10644,
  author       = {Zhen Li and
                  Ruqian Zhang and
                  Deqing Zou and
                  Ning Wang and
                  Yating Li and
                  Shouhuai Xu and
                  Chen Chen and
                  Hai Jin},
  title        = {Robin: {A} Novel Method to Produce Robust Interpreters for Deep Learning-Based
                  Code Classifiers},
  journal      = {CoRR},
  volume       = {abs/2309.10644},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.10644},
  doi          = {10.48550/ARXIV.2309.10644},
  eprinttype    = {arXiv},
  eprint       = {2309.10644},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-10644.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ChenZJXY22,
  author       = {Haoyu Chen and
                  Deqing Zou and
                  Hai Jin and
                  Shouhuai Xu and
                  Bin Yuan},
  title        = {{SAND:} semi-automated adaptive network defense via programmable rule
                  generation and deployment},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {7},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-020-3193-2},
  doi          = {10.1007/S11432-020-3193-2},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ChenZJXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LopesZARYJ22,
  author       = {Ivandro Ortet Lopes and
                  Deqing Zou and
                  Ihsan H. Abdulqadder and
                  Francis A. Ruambo and
                  Bin Yuan and
                  Hai Jin},
  title        = {Effective network intrusion detection via representation learning:
                  {A} Denoising AutoEncoder approach},
  journal      = {Comput. Commun.},
  volume       = {194},
  pages        = {55--65},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2022.07.027},
  doi          = {10.1016/J.COMCOM.2022.07.027},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/LopesZARYJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DaiTYCZ022,
  author       = {Weiqi Dai and
                  Shuyue Tuo and
                  Liangliang Yu and
                  Kim{-}Kwang Raymond Choo and
                  Deqing Zou and
                  Hai Jin},
  title        = {{HAPPS:} {A} Hidden Attribute and Privilege-Protection Data-Sharing
                  Scheme With Verifiability},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {24},
  pages        = {25538--25550},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3197708},
  doi          = {10.1109/JIOT.2022.3197708},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DaiTYCZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/HeZQWXDJ22,
  author       = {Muqing He and
                  Deqing Zou and
                  Weizhong Qiang and
                  Wenbo Wu and
                  Shouhuai Xu and
                  Xianjun Deng and
                  Hai Jin},
  title        = {Utility-Prioritized Differential Privacy for Quantitative Biomedical
                  Data},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {31},
  number       = {13},
  pages        = {2250236:1--2250236:23},
  year         = {2022},
  url          = {https://doi.org/10.1142/S021812662250236X},
  doi          = {10.1142/S021812662250236X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/HeZQWXDJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenYZJ22,
  author       = {Haoyu Chen and
                  Bin Yuan and
                  Deqing Zou and
                  Hai Jin},
  title        = {A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems
                  in 6G Networks},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {4},
  pages        = {150--158},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.002.2100655},
  doi          = {10.1109/MNET.002.2100655},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/ChenYZJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0027ZX0ZC22,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Hai Jin and
                  Yawei Zhu and
                  Zhaoxuan Chen},
  title        = {SySeVR: {A} Framework for Using Deep Learning to Detect Software Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2244--2258},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3051525},
  doi          = {10.1109/TDSC.2021.3051525},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/0027ZX0ZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZXCZ022,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Zhaoxuan Chen and
                  Yawei Zhu and
                  Hai Jin},
  title        = {VulDeeLocator: {A} Deep Learning-Based Fine-Grained Vulnerability
                  Detector},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2821--2837},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3076142},
  doi          = {10.1109/TDSC.2021.3076142},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiZXCZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/HeNYWDZA22,
  author       = {Yuanyuan He and
                  Jianbing Ni and
                  Laurence T. Yang and
                  Wei Wei and
                  Xianjun Deng and
                  Deqing Zou and
                  Syed Hassan Ahmed},
  title        = {Differentially Private Tripartite Intelligent Matching Against Inference
                  Attacks in Ride-Sharing Services},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {11},
  pages        = {22583--22595},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2021.3136386},
  doi          = {10.1109/TITS.2021.3136386},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/HeNYWDZA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JinWWDZZ22,
  author       = {Hai Jin and
                  Zeli Wang and
                  Ming Wen and
                  Weiqi Dai and
                  Yu Zhu and
                  Deqing Zou},
  title        = {Aroc: An Automatic Repair Framework for On-Chain Smart Contracts},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {48},
  number       = {11},
  pages        = {4611--4629},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSE.2021.3123170},
  doi          = {10.1109/TSE.2021.3123170},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JinWWDZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/ChenLZSZ22,
  author       = {Qi Chen and
                  Guohui Li and
                  Quan Zhou and
                  Si Shi and
                  Deqing Zou},
  title        = {Double Attention Convolutional Neural Network for Sequential Recommendation},
  journal      = {{ACM} Trans. Web},
  volume       = {16},
  number       = {4},
  pages        = {19:1--19:23},
  year         = {2022},
  url          = {https://doi.org/10.1145/3555350},
  doi          = {10.1145/3555350},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tweb/ChenLZSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangYYZ022,
  author       = {Zhechang Zhang and
                  Bin Yuan and
                  Kehan Yang and
                  Deqing Zou and
                  Hai Jin},
  title        = {StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy
                  Guidance},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {756--768},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3564650},
  doi          = {10.1145/3564625.3564650},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangYYZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuZD0X022,
  author       = {Yueming Wu and
                  Deqing Zou and
                  Shihan Dou and
                  Wei Yang and
                  Duo Xu and
                  Hai Jin},
  title        = {VulCNN: An Image-inspired Scalable Vulnerability Detection System},
  booktitle    = {44th {IEEE/ACM} 44th International Conference on Software Engineering,
                  {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022},
  pages        = {2365--2376},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510003.3510229},
  doi          = {10.1145/3510003.3510229},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/WuZD0X022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/WuFZ022,
  author       = {Yueming Wu and
                  Siyue Feng and
                  Deqing Zou and
                  Hai Jin},
  title        = {Detecting Semantic Code Clones by Building AST-based Markov Chains
                  Model},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {34:1--34:13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3560426},
  doi          = {10.1145/3551349.3560426},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/WuFZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/HuZPWS022,
  author       = {Yutao Hu and
                  Deqing Zou and
                  Junru Peng and
                  Yueming Wu and
                  Junjie Shan and
                  Hai Jin},
  title        = {TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {109:1--109:12},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3556927},
  doi          = {10.1145/3551349.3556927},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/HuZPWS022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/00480C0LXZ0Z22,
  author       = {Zhi Li and
                  Weijie Liu and
                  Hongbo Chen and
                  XiaoFeng Wang and
                  Xiaojing Liao and
                  Luyi Xing and
                  Mingming Zha and
                  Hai Jin and
                  Deqing Zou},
  title        = {Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining
                  on Continuous Integration Service Platforms},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2397--2412},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833803},
  doi          = {10.1109/SP46214.2022.9833803},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/00480C0LXZ0Z22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XiaZDJZ21,
  author       = {Yang Xia and
                  Tianqing Zhu and
                  Xiaofeng Ding and
                  Hai Jin and
                  Deqing Zou},
  title        = {Heterogeneous differential privacy for vertically partitioned databases},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {33},
  number       = {8},
  year         = {2021},
  url          = {https://doi.org/10.1002/cpe.5607},
  doi          = {10.1002/CPE.5607},
  timestamp    = {Fri, 28 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/XiaZDJZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangJDCZ21,
  author       = {Zeli Wang and
                  Hai Jin and
                  Weiqi Dai and
                  Kim{-}Kwang Raymond Choo and
                  Deqing Zou},
  title        = {Ethereum smart contract security research: survey and future research
                  opportunities},
  journal      = {Frontiers Comput. Sci.},
  volume       = {15},
  number       = {2},
  pages        = {152802},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11704-020-9284-9},
  doi          = {10.1007/S11704-020-9284-9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/WangJDCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/DaiWWLZJ21,
  author       = {Weiqi Dai and
                  Qinyuan Wang and
                  Zeli Wang and
                  Xiaobin Lin and
                  Deqing Zou and
                  Hai Jin},
  title        = {Trustzone-based secure lightweight wallet for hyperledger fabric},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {149},
  pages        = {66--75},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jpdc.2020.11.001},
  doi          = {10.1016/J.JPDC.2020.11.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/DaiWWLZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/QiangH0YZ21,
  author       = {Weizhong Qiang and
                  Yingda Huang and
                  Hai Jin and
                  Laurence T. Yang and
                  Deqing Zou},
  title        = {CloudCFI: Context-Sensitive and Incremental {CFI} in the Cloud Environment},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {3},
  pages        = {938--957},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2019.2902384},
  doi          = {10.1109/TCC.2019.2902384},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/QiangH0YZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JinLZY21,
  author       = {Hai Jin and
                  Zhi Li and
                  Deqing Zou and
                  Bin Yuan},
  title        = {{DSEOM:} {A} Framework for Dynamic Security Evaluation and Optimization
                  of {MTD} in Container-Based Cloud},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1125--1136},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2916666},
  doi          = {10.1109/TDSC.2019.2916666},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JinLZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZouWXLJ21,
  author       = {Deqing Zou and
                  Sujuan Wang and
                  Shouhuai Xu and
                  Zhen Li and
                  Hai Jin},
  title        = {{\textdollar}{\textbackslash}mu{\textdollar}{\(\mu\)}VulDeePecker:
                  {A} Deep Learning-Based System for Multiclass Vulnerability Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2224--2236},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2942930},
  doi          = {10.1109/TDSC.2019.2942930},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZouWXLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/AbdulqadderZAYD21,
  author       = {Ihsan H. Abdulqadder and
                  Deqing Zou and
                  Israa T. Aziz and
                  Bin Yuan and
                  Weiqi Dai},
  title        = {Deployment of Robust Security Scheme in {SDN} Based 5G Network over
                  {NFV} Enabled Cloud Environment},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {866--877},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2018.2879714},
  doi          = {10.1109/TETC.2018.2879714},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/AbdulqadderZAYD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiLCLZJ21,
  author       = {Weiqi Dai and
                  Yan Lv and
                  Kim{-}Kwang Raymond Choo and
                  Zhongze Liu and
                  Deqing Zou and
                  Hai Jin},
  title        = {{CRSA:} {A} Cryptocurrency Recovery Scheme Based on Hidden Assistance
                  Relationships},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4291--4305},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3104142},
  doi          = {10.1109/TIFS.2021.3104142},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiLCLZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/YuanLZYJ21,
  author       = {Bin Yuan and
                  Chen Lin and
                  Deqing Zou and
                  Laurence Tianruo Yang and
                  Hai Jin},
  title        = {Detecting Malicious Switches for a Secure Software-defined Tactile
                  Internet},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {21},
  number       = {4},
  pages        = {84:1--84:23},
  year         = {2021},
  url          = {https://doi.org/10.1145/3415146},
  doi          = {10.1145/3415146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/YuanLZYJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/ZouZXLJY21,
  author       = {Deqing Zou and
                  Yawei Zhu and
                  Shouhuai Xu and
                  Zhen Li and
                  Hai Jin and
                  Hengkai Ye},
  title        = {Interpreting Deep Learning-based Vulnerability Detector Predictions
                  Based on Heuristic Searching},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {30},
  number       = {2},
  pages        = {23:1--23:31},
  year         = {2021},
  url          = {https://doi.org/10.1145/3429444},
  doi          = {10.1145/3429444},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/ZouZXLJY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/ZouWYCYZDJ21,
  author       = {Deqing Zou and
                  Yueming Wu and
                  Siru Yang and
                  Anki Chauhan and
                  Wei Yang and
                  Jiangying Zhong and
                  Shihan Dou and
                  Hai Jin},
  title        = {IntDroid: Android Malware Detection Based on {API} Intimacy Analysis},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {30},
  number       = {3},
  pages        = {39:1--39:32},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442588},
  doi          = {10.1145/3442588},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/ZouWYCYZDJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiaYX000LZCZZ021,
  author       = {Yan Jia and
                  Bin Yuan and
                  Luyi Xing and
                  Dongfang Zhao and
                  Yifan Zhang and
                  XiaoFeng Wang and
                  Yijing Liu and
                  Kaimin Zheng and
                  Peyton Crnjak and
                  Yuqing Zhang and
                  Deqing Zou and
                  Hai Jin},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Who's In Control? On Security Risks of Disjointed IoT Device Management
                  Channels},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1289--1305},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484592},
  doi          = {10.1145/3460120.3484592},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiaYX000LZCZZ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/WuZYL021,
  author       = {Yueming Wu and
                  Deqing Zou and
                  Wei Yang and
                  Xiang Li and
                  Hai Jin},
  editor       = {Cristian Cadar and
                  Xiangyu Zhang},
  title        = {HomDroid: detecting Android covert malware by social-network homophily
                  analysis},
  booktitle    = {{ISSTA} '21: 30th {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021},
  pages        = {216--229},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460319.3464833},
  doi          = {10.1145/3460319.3464833},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/WuZYL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuanSDZCL021,
  author       = {Bin Yuan and
                  Shengyao Sun and
                  Xianjun Deng and
                  Deqing Zou and
                  Haoyu Chen and
                  Shenghui Li and
                  Hai Jin},
  title        = {Automatically derived stateful network functions including non-field
                  attributes},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {944--951},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00132},
  doi          = {10.1109/TRUSTCOM53373.2021.00132},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuanSDZCL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-03799,
  author       = {Yueming Wu and
                  Shihan Dou and
                  Deqing Zou and
                  Wei Yang and
                  Weizhong Qiang and
                  Hai Jin},
  title        = {Obfuscation-resilient Android Malware Analysis Based on Contrastive
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2107.03799},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.03799},
  eprinttype    = {arXiv},
  eprint       = {2107.03799},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-03799.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-04743,
  author       = {Yueming Wu and
                  Deqing Zou and
                  Wei Yang and
                  Xiang Li and
                  Hai Jin},
  title        = {HomDroid: Detecting Android Covert Malware by Social-Network Homophily
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/2107.04743},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.04743},
  eprinttype    = {arXiv},
  eprint       = {2107.04743},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-04743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-00669,
  author       = {Zhen Li and
                  Jing Tang and
                  Deqing Zou and
                  Qian Chen and
                  Shouhuai Xu and
                  Chao Zhang and
                  Yichen Li and
                  Hai Jin},
  title        = {Towards Making Deep Learning-based Vulnerability Detectors Robust},
  journal      = {CoRR},
  volume       = {abs/2108.00669},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.00669},
  eprinttype    = {arXiv},
  eprint       = {2108.00669},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-00669.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AbdulqadderZZAA20,
  author       = {Ihsan H. Abdulqadder and
                  Shijie Zhou and
                  Deqing Zou and
                  Israa T. Aziz and
                  Syed Muhammad Abrar Akber},
  title        = {Multi-layered intrusion detection and prevention in the {SDN/NFV}
                  enabled cloud of 5G networks using AI-based defense mechanisms},
  journal      = {Comput. Networks},
  volume       = {179},
  pages        = {107364},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107364},
  doi          = {10.1016/J.COMNET.2020.107364},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AbdulqadderZZAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuoZDJLS20,
  author       = {Peng Luo and
                  Deqing Zou and
                  Yajuan Du and
                  Hai Jin and
                  Changming Liu and
                  Jinan Shen},
  title        = {Static detection of real-world buffer overflow induced by loop},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101616},
  doi          = {10.1016/J.COSE.2019.101616},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuoZDJLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YuanZJYY20,
  author       = {Bin Yuan and
                  Deqing Zou and
                  Hai Jin and
                  Shui Yu and
                  Laurence T. Yang},
  title        = {HostWatcher: Protecting hosts in cloud data centers through software-defined
                  networking},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {105},
  pages        = {964--972},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2017.04.023},
  doi          = {10.1016/J.FUTURE.2017.04.023},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/YuanZJYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YuanLZZYJR20,
  author       = {Bin Yuan and
                  Chen Lin and
                  Huan Zhao and
                  Deqing Zou and
                  Laurence Tianruo Yang and
                  Hai Jin and
                  Chunming Rong},
  title        = {Secure Data Transportation With Software-Defined Networking and k-n
                  Secret Sharing for High-Confidence IoT Services},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {9},
  pages        = {7967--7981},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2993587},
  doi          = {10.1109/JIOT.2020.2993587},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YuanLZZYJR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangDCJZ20,
  author       = {Zeli Wang and
                  Weiqi Dai and
                  Kim{-}Kwang Raymond Choo and
                  Hai Jin and
                  Deqing Zou},
  title        = {{FSFC:} An input filter-based secure framework for smart contract},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {154},
  pages        = {102530},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102530},
  doi          = {10.1016/J.JNCA.2020.102530},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WangDCJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DaiDCCZ020,
  author       = {Weiqi Dai and
                  Chunkai Dai and
                  Kim{-}Kwang Raymond Choo and
                  Changze Cui and
                  Deqing Zou and
                  Hai Jin},
  title        = {{SDTE:} {A} Secure Blockchain-Based Data Trading Ecosystem},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {725--737},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2928256},
  doi          = {10.1109/TIFS.2019.2928256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DaiDCCZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/YuanZLZYJHY20,
  author       = {Bin Yuan and
                  Huan Zhao and
                  Chen Lin and
                  Deqing Zou and
                  Laurence Tianruo Yang and
                  Hai Jin and
                  Ligang He and
                  Shui Yu},
  title        = {Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained
                  Resource Management},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {2541--2554},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSE.2020.2981449},
  doi          = {10.1109/TNSE.2020.2981449},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/YuanZLZYJHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LiJZY20,
  author       = {Zhi Li and
                  Hai Jin and
                  Deqing Zou and
                  Bin Yuan},
  title        = {Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based
                  Cloud Environment},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {31},
  number       = {3},
  pages        = {695--706},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPDS.2019.2942591},
  doi          = {10.1109/TPDS.2019.2942591},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LiJZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/ZhangSYZS020,
  author       = {Pan Zhang and
                  Chengyu Song and
                  Heng Yin and
                  Deqing Zou and
                  Elaine Shi and
                  Hai Jin},
  editor       = {James R. Larus and
                  Luis Ceze and
                  Karin Strauss},
  title        = {Klotski: Efficient Obfuscated Execution against Controlled-Channel
                  Attacks},
  booktitle    = {{ASPLOS} '20: Architectural Support for Programming Languages and
                  Operating Systems, Lausanne, Switzerland, March 16-20, 2020},
  pages        = {1263--1276},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373376.3378487},
  doi          = {10.1145/3373376.3378487},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asplos/ZhangSYZS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/Zhang0FZ020,
  author       = {Shiqiang Zhang and
                  Song Wu and
                  Hao Fan and
                  Deqing Zou and
                  Hai Jin},
  editor       = {Zhiwen Yu and
                  Christian Becker and
                  Guoliang Xing},
  title        = {{BED:} {A} Block-Level Deduplication-Based Container Deployment Framework},
  booktitle    = {Green, Pervasive, and Cloud Computing - 15th International Conference,
                  {GPC} 2020, Xi'an, China, November 13-15, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12398},
  pages        = {504--518},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64243-3\_38},
  doi          = {10.1007/978-3-030-64243-3\_38},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/Zhang0FZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icct/AbdulqadderZZAA20,
  author       = {Ihsan H. Abdulqadder and
                  Shijie Zhou and
                  Deqing Zou and
                  Israa T. Aziz and
                  Syed Muhammad Abrar Akber},
  title        = {Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G
                  Enabled {SDN/NFV} Cloud of IoT},
  booktitle    = {20th {IEEE} International Conference on Communication Technology,
                  {ICCT} 2020, Nanning, China, October 28-31, 2020},
  pages        = {499--507},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCT50939.2020.9295823},
  doi          = {10.1109/ICCT50939.2020.9295823},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icct/AbdulqadderZZAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/WuZDYYCLJ20,
  author       = {Yueming Wu and
                  Deqing Zou and
                  Shihan Dou and
                  Siru Yang and
                  Wei Yang and
                  Feng Cheng and
                  Hong Liang and
                  Hai Jin},
  title        = {SCDetector: Software Functional Clone Detection Based on Semantic
                  Tokens Analysis},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2020, Melbourne, Australia, September 21-25, 2020},
  pages        = {821--833},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3324884.3416562},
  doi          = {10.1145/3324884.3416562},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/WuZDYYCLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/WangWLWQZMJ20,
  author       = {Shangwen Wang and
                  Ming Wen and
                  Bo Lin and
                  Hongjun Wu and
                  Yihao Qin and
                  Deqing Zou and
                  Xiaoguang Mao and
                  Hai Jin},
  title        = {Automated Patch Correctness Assessment: How Far are We?},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2020, Melbourne, Australia, September 21-25, 2020},
  pages        = {968--980},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3324884.3416590},
  doi          = {10.1145/3324884.3416590},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/WangWLWQZMJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiaXZ0Z20,
  author       = {Bin Yuan and
                  Yan Jia and
                  Luyi Xing and
                  Dongfang Zhao and
                  XiaoFeng Wang and
                  Deqing Zou and
                  Hai Jin and
                  Yuqing Zhang},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud
                  IoT Access Delegation},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1183--1200},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/yuan},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JiaXZ0Z20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-02334,
  author       = {Deqing Zou and
                  Sujuan Wang and
                  Shouhuai Xu and
                  Zhen Li and
                  Hai Jin},
  title        = {{\(\mu\)}VulDeePecker: {A} Deep Learning-Based System for Multiclass
                  Vulnerability Detection},
  journal      = {CoRR},
  volume       = {abs/2001.02334},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.02334},
  eprinttype    = {arXiv},
  eprint       = {2001.02334},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-02334.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-02350,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Zhaoxuan Chen and
                  Yawei Zhu and
                  Hai Jin},
  title        = {VulDeeLocator: {A} Deep Learning-based Fine-grained Vulnerability
                  Detector},
  journal      = {CoRR},
  volume       = {abs/2001.02350},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.02350},
  eprinttype    = {arXiv},
  eprint       = {2001.02350},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-02350.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiZTZSJ19,
  author       = {Zhen Li and
                  Deqing Zou and
                  Jing Tang and
                  Zhihao Zhang and
                  Mingqian Sun and
                  Hai Jin},
  title        = {A Comparative Study of Deep Learning-Based Vulnerability Detection
                  System},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {103184--103197},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2930578},
  doi          = {10.1109/ACCESS.2019.2930578},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiZTZSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HanZQFZ19,
  author       = {Lansheng Han and
                  Man Zhou and
                  Yekui Qian and
                  Cai Fu and
                  Deqing Zou},
  title        = {An Optimized Static Propositional Function Model to Detect Software
                  Vulnerability},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {143499--143510},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2943896},
  doi          = {10.1109/ACCESS.2019.2943896},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HanZQFZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZouZLWQJWY19,
  author       = {Deqing Zou and
                  Jian Zhao and
                  Weiming Li and
                  Yueming Wu and
                  Weizhong Qiang and
                  Hai Jin and
                  Ye Wu and
                  Yifei Yang},
  title        = {A Multigranularity Forensics and Analysis Method on Privacy Leakage
                  in Cloud Environment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {1484--1494},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2838569},
  doi          = {10.1109/JIOT.2018.2838569},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZouZLWQJWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/FengYDWZ19,
  author       = {Jun Feng and
                  Laurence T. Yang and
                  Guohui Dai and
                  Wei Wang and
                  Deqing Zou},
  title        = {A Secure High-Order Lanczos-Based Orthogonal Tensor {SVD} for Big
                  Data Reduction in Cloud Environment},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {5},
  number       = {3},
  pages        = {355--367},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBDATA.2018.2803841},
  doi          = {10.1109/TBDATA.2018.2803841},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/FengYDWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ShenZJYD19,
  author       = {Jinan Shen and
                  Deqing Zou and
                  Hai Jin and
                  Bin Yuan and
                  Weiqi Dai},
  title        = {A domain-divided configurable security model for cloud computing-based
                  telecommunication services},
  journal      = {J. Supercomput.},
  volume       = {75},
  number       = {1},
  pages        = {109--122},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11227-015-1587-5},
  doi          = {10.1007/S11227-015-1587-5},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ShenZJYD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YuanZYJQS19,
  author       = {Bin Yuan and
                  Deqing Zou and
                  Shui Yu and
                  Hai Jin and
                  Weizhong Qiang and
                  Jinan Shen},
  title        = {Defending Against Flow Table Overloading Attack in Software-Defined
                  Networks},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {231--246},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSC.2016.2602861},
  doi          = {10.1109/TSC.2016.2602861},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/YuanZYJQS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/ZouYL0019,
  author       = {Deqing Zou and
                  Ju Yang and
                  Zhen Li and
                  Hai Jin and
                  Xiaojing Ma},
  editor       = {Rodrigo Sanches Miani and
                  L{\'{a}}saro J. Camargos and
                  Bruno Bogaz Zarpel{\~{a}}o and
                  Erika Rosas and
                  Rafael Pasquini},
  title        = {AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity
                  Based on Attack Process},
  booktitle    = {Green, Pervasive, and Cloud Computing - 14th International Conference,
                  {GPC} 2019, Uberl{\^{a}}ndia, Brazil, May 26-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11484},
  pages        = {238--253},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-19223-5\_17},
  doi          = {10.1007/978-3-030-19223-5\_17},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/ZouYL0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/WuLZYZ019,
  author       = {Yueming Wu and
                  Xiaodi Li and
                  Deqing Zou and
                  Wei Yang and
                  Xin Zhang and
                  Hai Jin},
  title        = {MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network
                  Centrality Analysis},
  booktitle    = {34th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2019, San Diego, CA, USA, November 11-15, 2019},
  pages        = {139--150},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ASE.2019.00023},
  doi          = {10.1109/ASE.2019.00023},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/WuLZYZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AbdulqadderZAYL18,
  author       = {Ihsan H. Abdulqadder and
                  Deqing Zou and
                  Israa T. Aziz and
                  Bin Yuan and
                  Weiming Li},
  title        = {SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined
                  Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {8292--8301},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2797214},
  doi          = {10.1109/ACCESS.2018.2797214},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AbdulqadderZAYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZouLYCJ18,
  author       = {Deqing Zou and
                  Yu Lu and
                  Bin Yuan and
                  Haoyu Chen and
                  Hai Jin},
  title        = {A Fine-Grained Multi-Tenant Permission Management Framework for {SDN}
                  and {NFV}},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {25562--25572},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2828132},
  doi          = {10.1109/ACCESS.2018.2828132},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZouLYCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/0001LDZ18,
  author       = {Hai Jin and
                  Benxi Liu and
                  Yajuan Du and
                  Deqing Zou},
  title        = {BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks
                  via Secret Region Isolation},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {36341--36353},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2835838},
  doi          = {10.1109/ACCESS.2018.2835838},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/0001LDZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DaiDWCZJ18,
  author       = {Weiqi Dai and
                  Jun Deng and
                  Qinyuan Wang and
                  Changze Cui and
                  Deqing Zou and
                  Hai Jin},
  title        = {{SBLWT:} {A} Secure Blockchain Lightweight Wallet Based on Trustzone},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {40638--40648},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2856864},
  doi          = {10.1109/ACCESS.2018.2856864},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DaiDWCZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZouHYCJ18,
  author       = {Deqing Zou and
                  Zirong Huang and
                  Bin Yuan and
                  Haoyu Chen and
                  Hai Jin},
  title        = {Solving Anomalies in {NFV-SDN} Based Service Function Chaining Composition
                  for IoT Network},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {62286--62295},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2876314},
  doi          = {10.1109/ACCESS.2018.2876314},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZouHYCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/DaiDJQZXL18,
  author       = {Weiqi Dai and
                  Yukun Du and
                  Hai Jin and
                  Weizhong Qiang and
                  Deqing Zou and
                  Shouhuai Xu and
                  Zhongze Liu},
  title        = {RollSec: Automatically Secure Software States Against General Rollback},
  journal      = {Int. J. Parallel Program.},
  volume       = {46},
  number       = {4},
  pages        = {788--805},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10766-017-0523-0},
  doi          = {10.1007/S10766-017-0523-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpp/DaiDJQZXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DaiWQYZJXH18,
  author       = {Weiqi Dai and
                  Pengfei Wan and
                  Weizhong Qiang and
                  Laurence T. Yang and
                  Deqing Zou and
                  Hai Jin and
                  Shouhuai Xu and
                  Zirong Huang},
  title        = {TNGuard: Securing IoT Oriented Tenant Networks Based on {SDN}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {3},
  pages        = {1411--1423},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2018.2801317},
  doi          = {10.1109/JIOT.2018.2801317},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DaiWQYZJXH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AbdulqadderZAY18,
  author       = {Ihsan H. Abdulqadder and
                  Deqing Zou and
                  Israa T. Aziz and
                  Bin Yuan},
  title        = {Validating User Flows to Protect Software Defined Network Environments},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {1308678:1--1308678:14},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/1308678},
  doi          = {10.1155/2018/1308678},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AbdulqadderZAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LuoZJDZS18,
  author       = {Peng Luo and
                  Deqing Zou and
                  Hai Jin and
                  Yajuan Du and
                  Long Zheng and
                  Jinan Shen},
  title        = {DigHR: precise dynamic detection of hidden races with weak causal
                  relation analysis},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {6},
  pages        = {2684--2704},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-018-2307-8},
  doi          = {10.1007/S11227-018-2307-8},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LuoZJDZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/YuanJZYY18,
  author       = {Bin Yuan and
                  Hai Jin and
                  Deqing Zou and
                  Laurence Tianruo Yang and
                  Shui Yu},
  title        = {A Practical Byzantine-Based Approach for Faulty Switch Tolerance in
                  Software-Defined Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {15},
  number       = {2},
  pages        = {825--839},
  year         = {2018},
  url          = {https://doi.org/10.1109/TNSM.2018.2822668},
  doi          = {10.1109/TNSM.2018.2822668},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/YuanJZYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZouDL018,
  author       = {Deqing Zou and
                  Zhijun Deng and
                  Zhen Li and
                  Hai Jin},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Automatically Identifying Security Bug Reports via Multitype Features
                  Analysis},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {619--633},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_35},
  doi          = {10.1007/978-3-319-93638-3\_35},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZouDL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiuZLZ018,
  author       = {Changming Liu and
                  Deqing Zou and
                  Peng Luo and
                  Bin B. Zhu and
                  Hai Jin},
  title        = {A Heuristic Framework to Detect Concurrency Vulnerabilities},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {529--541},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274718},
  doi          = {10.1145/3274694.3274718},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiuZLZ018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/AbdulqadderZAY18,
  author       = {Ihsan H. Abdulqadder and
                  Deqing Zou and
                  Israa T. Aziz and
                  Bin Yuan},
  title        = {Enhanced Attack Aware Security Provisioning Scheme in {SDN/NFV} Enabled
                  over 5G Network},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487339},
  doi          = {10.1109/ICCCN.2018.8487339},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/AbdulqadderZAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/0002ZZC0Z18,
  author       = {Xiaojing Ma and
                  Bin Zhu and
                  Tao Zhang and
                  Sixing Cao and
                  Hai Jin and
                  Deqing Zou},
  title        = {Efficient privacy-preserving motion detection for {HEVC} compressed
                  video in cloud video surveillance},
  booktitle    = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19,
                  2018},
  pages        = {813--818},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFCOMW.2018.8406880},
  doi          = {10.1109/INFCOMW.2018.8406880},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/0002ZZC0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiZXO0WDZ18,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Xinyu Ou and
                  Hai Jin and
                  Sujuan Wang and
                  Zhijun Deng and
                  Yuyi Zhong},
  title        = {VulDeePecker: {A} Deep Learning-Based System for Vulnerability Detection},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-2\_Li\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiZXO0WDZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/LiZXJZCWW18,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Hai Jin and
                  Yawei Zhu and
                  Zhaoxuan Chen and
                  Sujuan Wang and
                  Jialai Wang},
  title        = {SySeVR: {A} Framework for Using Deep Learning to Detect Software Vulnerabilities},
  publisher    = {{IEEE} DataPort},
  year         = {2018},
  month        = nov,
  howpublished = {\url{https://doi.org/10.21227/fhg0-1b35}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/fhg0-1b35},
  doi          = {10.21227/FHG0-1B35},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/data/10/LiZXJZCWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01681,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Xinyu Ou and
                  Hai Jin and
                  Sujuan Wang and
                  Zhijun Deng and
                  Yuyi Zhong},
  title        = {VulDeePecker: {A} Deep Learning-Based System for Vulnerability Detection},
  journal      = {CoRR},
  volume       = {abs/1801.01681},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01681},
  eprinttype    = {arXiv},
  eprint       = {1801.01681},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-06756,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Hai Jin and
                  Yawei Zhu and
                  Zhaoxuan Chen and
                  Sujuan Wang and
                  Jialai Wang},
  title        = {SySeVR: {A} Framework for Using Deep Learning to Detect Software Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/1807.06756},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.06756},
  eprinttype    = {arXiv},
  eprint       = {1807.06756},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-06756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XuFLZZL17,
  author       = {Deliang Xu and
                  Cai Fu and
                  Guohui Li and
                  Deqing Zou and
                  Honghao Zhang and
                  Xiao{-}Yang Liu},
  title        = {Virtualization of the Encryption Card for Trust Access in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {20652--20667},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2754515},
  doi          = {10.1109/ACCESS.2017.2754515},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XuFLZZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QiangLSYZJ17,
  author       = {Weizhong Qiang and
                  Yuehua Liao and
                  Guozhong Sun and
                  Laurence T. Yang and
                  Deqing Zou and
                  Hai Jin},
  title        = {Patch-Related Vulnerability Detection Based on Symbolic Execution},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {20777--20784},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2676161},
  doi          = {10.1109/ACCESS.2017.2676161},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QiangLSYZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QiangXDZJ17,
  author       = {Weizhong Qiang and
                  Gongping Xu and
                  Weiqi Dai and
                  Deqing Zou and
                  Hai Jin},
  title        = {CloudVMI: {A} Cloud-Oriented Writable Virtual Machine Introspection},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {21962--21976},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2758356},
  doi          = {10.1109/ACCESS.2017.2758356},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QiangXDZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/RajehJZ17,
  author       = {Wahid Rajeh and
                  Hai Jin and
                  Deqing Zou},
  title        = {Saudi cloud infrastructure: a security analysis},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {12},
  pages        = {122102:1--122102:13},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-0322-7},
  doi          = {10.1007/S11432-016-0322-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/RajehJZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaacs/IbrahimJYZ17,
  author       = {Ayad Ibrahim and
                  Hai Jin and
                  Ali A. Yassin and
                  Deqing Zou},
  title        = {Privacy preserving search over multiple servers},
  journal      = {Int. J. Auton. Adapt. Commun. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {426--442},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJAACS.2017.10009675},
  doi          = {10.1504/IJAACS.2017.10009675},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaacs/IbrahimJYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/MaYXZZJ17,
  author       = {Xiaojing Ma and
                  Laurence T. Yang and
                  Yang Xiang and
                  Wenjun Kevin Zeng and
                  Deqing Zou and
                  Hai Jin},
  title        = {Fully Reversible Privacy Region Protection for Cloud Video Surveillance},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {5},
  number       = {3},
  pages        = {510--522},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCC.2015.2469651},
  doi          = {10.1109/TCC.2015.2469651},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/MaYXZZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangYLJZD17,
  author       = {Daibin Wang and
                  Haixia Yao and
                  Yingjiu Li and
                  Hai Jin and
                  Deqing Zou and
                  Robert H. Deng},
  title        = {A Secure, Usable, and Transparent Middleware for Permission Managers
                  on Android},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {350--362},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2479613},
  doi          = {10.1109/TDSC.2015.2479613},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangYLJZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LuoZJDS17,
  author       = {Peng Luo and
                  Deqing Zou and
                  Hai Jin and
                  Yajuan Du and
                  Jinan Shen},
  title        = {A dynamic predictive race detector for {C/C++} programs},
  journal      = {J. Supercomput.},
  volume       = {73},
  number       = {9},
  pages        = {3999--4019},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11227-017-1996-8},
  doi          = {10.1007/S11227-017-1996-8},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LuoZJDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QiangHZJWS17,
  author       = {Weizhong Qiang and
                  Yingda Huang and
                  Deqing Zou and
                  Hai Jin and
                  Shizhen Wang and
                  Guozhong Sun},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Fully Context-Sensitive {CFI} for {COTS} Binaries},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {435--442},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_28},
  doi          = {10.1007/978-3-319-59870-3\_28},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/QiangHZJWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/DuLSZJX17,
  author       = {Yajuan Du and
                  Qiao Li and
                  Liang Shi and
                  Deqing Zou and
                  Hai Jin and
                  Chun Jason Xue},
  title        = {Reducing {LDPC} Soft Sensing Latency by Lightweight Data Refresh for
                  Flash Read Performance Improvement},
  booktitle    = {Proceedings of the 54th Annual Design Automation Conference, {DAC}
                  2017, Austin, TX, USA, June 18-22, 2017},
  pages        = {23:1--23:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3061639.3062309},
  doi          = {10.1145/3061639.3062309},
  timestamp    = {Wed, 29 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/DuLSZJX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ZouQLWJSWZ17,
  author       = {Deqing Zou and
                  Hanchao Qi and
                  Zhen Li and
                  Song Wu and
                  Hai Jin and
                  Guozhong Sun and
                  Sujuan Wang and
                  Yuyi Zhong},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {{SCVD:} {A} New Semantics-Based Approach for Cloned Vulnerable Code
                  Detection},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {325--344},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_15},
  doi          = {10.1007/978-3-319-60876-1\_15},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ZouQLWJSWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/QiangCDZJL17,
  author       = {Weizhong Qiang and
                  Yong Cao and
                  Weiqi Dai and
                  Deqing Zou and
                  Hai Jin and
                  Benxi Liu},
  title        = {Libsec: {A} Hardware Virtualization-Based Isolation for Shared Library},
  booktitle    = {19th {IEEE} International Conference on High Performance Computing
                  and Communications; 15th {IEEE} International Conference on Smart
                  City; 3rd {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2017, Bangkok, Thailand, December 18-20, 2017},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.5},
  doi          = {10.1109/HPCC-SMARTCITY-DSS.2017.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/QiangCDZJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/JinDZ16,
  author       = {Hai Jin and
                  Weiqi Dai and
                  Deqing Zou},
  title        = {Theory and methodology of research on cloud security},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {5},
  pages        = {050105:1--050105:3},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-016-5549-1},
  doi          = {10.1007/S11432-016-5549-1},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/JinDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZouQJ16,
  author       = {Deqing Zou and
                  Hao Qin and
                  Hai Jin},
  title        = {UiLog: Improving Log-Based Fault Diagnosis by Log Analysis},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {31},
  number       = {5},
  pages        = {1038--1052},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11390-016-1678-7},
  doi          = {10.1007/S11390-016-1678-7},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ZouQJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WangHFZL16,
  author       = {Tao Wang and
                  Lansheng Han and
                  Cai Fu and
                  Deqing Zou and
                  Ming Liu},
  title        = {{\unicode{36719}}{\unicode{20214}}{\unicode{28431}}{\unicode{27934}}{\unicode{38745}}{\unicode{24577}}{\unicode{26816}}{\unicode{27979}}{\unicode{27169}}{\unicode{22411}}{\unicode{21450}}{\unicode{26816}}{\unicode{27979}}{\unicode{26694}}{\unicode{26550}}
                  (Static Detection Model and Framework for Software Vulnerability)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {43},
  number       = {5},
  pages        = {80--86},
  year         = {2016},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2016.05.015},
  doi          = {10.11896/J.ISSN.1002-137X.2016.05.015},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WangHFZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangJZXZC16,
  author       = {Daibin Wang and
                  Hai Jin and
                  Deqing Zou and
                  Peng Xu and
                  Tianqing Zhu and
                  Gang Chen},
  title        = {Taming transitive permission attack via bytecode rewriting on Android
                  application},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {13},
  pages        = {2100--2114},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1466},
  doi          = {10.1002/SEC.1466},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangJZXZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZouXM16,
  author       = {Deqing Zou and
                  Yang Xiang and
                  Geyong Min},
  title        = {Privacy preserving in cloud computing environment},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2752--2753},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1498},
  doi          = {10.1002/SEC.1498},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZouXM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QiangJRZJ16,
  author       = {Weizhong Qiang and
                  Changqing Jiang and
                  Longbo Ran and
                  Deqing Zou and
                  Hai Jin},
  title        = {{CDMCR:} multi-level fault-tolerant system for distributed applications
                  in cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2766--2778},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1187},
  doi          = {10.1002/SEC.1187},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QiangJRZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/WengLLZ16,
  author       = {Chuliang Weng and
                  Qian Liu and
                  Kenli Li and
                  Deqing Zou},
  title        = {CloudMon: Monitoring Virtual Machines in Clouds},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {12},
  pages        = {3787--3793},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2016.2560809},
  doi          = {10.1109/TC.2016.2560809},
  timestamp    = {Fri, 16 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/WengLLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/MaZYZJ16,
  author       = {Xiaojing Ma and
                  Wenjun Kevin Zeng and
                  Laurence T. Yang and
                  Deqing Zou and
                  Hai Jin},
  title        = {Lossless {ROI} Privacy Protection of {H.264/AVC} Compressed Surveillance
                  Videos},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {349--362},
  year         = {2016},
  url          = {https://doi.org/10.1109/TETC.2015.2460462},
  doi          = {10.1109/TETC.2015.2460462},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/MaZYZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ChenJZLZW16,
  author       = {Gang Chen and
                  Hai Jin and
                  Deqing Zou and
                  Zhenkai Liang and
                  Bing Bing Zhou and
                  Hao Wang},
  title        = {A Framework for Practical Dynamic Software Updating},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {4},
  pages        = {941--950},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2015.2430854},
  doi          = {10.1109/TPDS.2015.2430854},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ChenJZLZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiZXJQH16,
  author       = {Zhen Li and
                  Deqing Zou and
                  Shouhuai Xu and
                  Hai Jin and
                  Hanchao Qi and
                  Jie Hu},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {VulPecker: an automated vulnerability detection system based on code
                  similarity analysis},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {201--213},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991102},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LiZXJQH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/AbduljabbarJHYH16,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Zaid Alaa Hussien and
                  Ali A. Yassin and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  title        = {Towards Efficient Authentication Scheme with Biometric Key Management
                  in Cloud Environment},
  booktitle    = {2nd {IEEE} International Conference on Big Data Security on Cloud,
                  BigDataSecurity 2016, {IEEE} International Conference on High Performance
                  and Smart Computing, {HPSC} 2016, and {IEEE} International Conference
                  on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April
                  9-10, 2016},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.25},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.25},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/AbduljabbarJHYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/AbbdalJYAHHZ16,
  author       = {Salah H. Abbdal and
                  Hai Jin and
                  Ali A. Yassin and
                  Zaid Ameen Abduljabbar and
                  Mohammed Abdulridha Hussain and
                  Zaid Alaa Hussien and
                  Deqing Zou},
  title        = {An Efficient Public Verifiability and Data Integrity Using Multiple
                  TPAs in Cloud Data Storage},
  booktitle    = {2nd {IEEE} International Conference on Big Data Security on Cloud,
                  BigDataSecurity 2016, {IEEE} International Conference on High Performance
                  and Smart Computing, {HPSC} 2016, and {IEEE} International Conference
                  on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April
                  9-10, 2016},
  pages        = {412--417},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.26},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.26},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/AbbdalJYAHHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuXWJSZ16,
  author       = {Peng Xu and
                  Jun Xu and
                  Wei Wang and
                  Hai Jin and
                  Willy Susilo and
                  Deqing Zou},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Generally Hybrid Proxy Re-Encryption: {A} Secure Data Sharing among
                  Cryptographic Clouds},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {913--918},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897923},
  doi          = {10.1145/2897845.2897923},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuXWJSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/AbduljabbarJIHH16,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Ayad Ibrahim and
                  Zaid Alaa Hussien and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  editor       = {Xinyi Huang and
                  Yang Xiang and
                  Kuan{-}Ching Li},
  title        = {Towards Secure Private Image Matching},
  booktitle    = {Green, Pervasive, and Cloud Computing - 11th International Conference,
                  {GPC} 2016, Xi'an, China, May 6-8, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9663},
  pages        = {301--315},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39077-2\_20},
  doi          = {10.1007/978-3-319-39077-2\_20},
  timestamp    = {Thu, 24 Feb 2022 11:50:56 +0100},
  biburl       = {https://dblp.org/rec/conf/gpc/AbduljabbarJIHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/AbduljabbarJYHH16,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Ali A. Yassin and
                  Zaid Alaa Hussien and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  title        = {Robust scheme to protect authentication code of message/image documents
                  in cloud computing},
  booktitle    = {2016 International Conference on Computing, Networking and Communications,
                  {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCNC.2016.7440585},
  doi          = {10.1109/ICCNC.2016.7440585},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/AbduljabbarJYHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenDZJ16,
  author       = {Zilong Wen and
                  Weiqi Dai and
                  Deqing Zou and
                  Hai Jin},
  title        = {PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing
                  Infrastructures},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {683--690},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0126},
  doi          = {10.1109/TRUSTCOM.2016.0126},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenDZJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbduljabbarJIHH16,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Ayad Ibrahim and
                  Zaid Alaa Hussien and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  title        = {Privacy-Preserving Image Retrieval in IoT-Cloud},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {799--806},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0141},
  doi          = {10.1109/TRUSTCOM.2016.0141},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbduljabbarJIHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChenJZZQ15,
  author       = {Gang Chen and
                  Hai Jin and
                  Deqing Zou and
                  Bing Bing Zhou and
                  Weizhong Qiang},
  title        = {A lightweight software fault-tolerance system in the cloud environment},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {12},
  pages        = {2982--2998},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3190},
  doi          = {10.1002/CPE.3190},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChenJZZQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DaiJZXZSY15,
  author       = {Weiqi Dai and
                  Hai Jin and
                  Deqing Zou and
                  Shouhuai Xu and
                  Weide Zheng and
                  Lei Shi and
                  Laurence Tianruo Yang},
  title        = {{TEE:} {A} virtual {DRTM} based execution environment for secure cloud-end
                  computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {49},
  pages        = {47--57},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.future.2014.08.005},
  doi          = {10.1016/J.FUTURE.2014.08.005},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/DaiJZXZSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoJZDX15,
  author       = {Kao Zhao and
                  Hai Jin and
                  Deqing Zou and
                  Weiqi Dai and
                  Yang Xiang},
  title        = {A privacy-preserving location tracking system for smartphones based
                  on cloud storage},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {446--458},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.992},
  doi          = {10.1002/SEC.992},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoJZDX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AbduljabbarJHYH15,
  author       = {Zaid Ameen Abduljabbar and
                  Hai Jin and
                  Zaid Alaa Hussien and
                  Ali A. Yassin and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Robust image document authentication code with autonomous biometrie
                  key generation, selection, and updating in cloud environment},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492746},
  doi          = {10.1109/ISIAS.2015.7492746},
  timestamp    = {Thu, 22 Feb 2024 09:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbduljabbarJHYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HussienJAYHAZ15,
  author       = {Zaid Alaa Hussien and
                  Hai Jin and
                  Zaid Ameen Abduljabbar and
                  Ali A. Yassin and
                  Mohammed Abdulridha Hussain and
                  Salah H. Abbdal and
                  Deqing Zou},
  editor       = {Ajith Abraham and
                  Adel M. Alimi and
                  Abdelkrim Haqiq and
                  Dijiang Huang and
                  Dong Seong Kim and
                  Hannan Xiao and
                  Nizar Rokbani and
                  Mohamed Ben Halima and
                  Azah Kamilah Muda and
                  Kun Ma},
  title        = {Public auditing for secure data storage in cloud through a third party
                  auditor using modern ciphertext},
  booktitle    = {11th International Conference on Information Assurance and Security,
                  {IAS} 2015, Marrakech, Morocco, December 14-16, 2015},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIAS.2015.7492748},
  doi          = {10.1109/ISIAS.2015.7492748},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HussienJAYHAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/LiuZJ15,
  author       = {Kai Liu and
                  Deqing Zou and
                  Hai Jin},
  title        = {UaaS: Software Update as a Service for the IaaS Cloud},
  booktitle    = {2015 {IEEE} International Conference on Services Computing, {SCC}
                  2015, New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {483--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCC.2015.72},
  doi          = {10.1109/SCC.2015.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/LiuZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ChenQJZW15,
  author       = {Feng Chen and
                  Weizhong Qiang and
                  Hai Jin and
                  Deqing Zou and
                  Duoqiang Wang},
  editor       = {Sheikh Iqbal Ahamed and
                  Carl K. Chang and
                  William C. Chu and
                  Ivica Crnkovic and
                  Pao{-}Ann Hsiung and
                  Gang Huang and
                  Jingwei Yang},
  title        = {Multi-version Execution for the Dynamic Updating of Cloud Applications},
  booktitle    = {39th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2},
  pages        = {185--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/COMPSAC.2015.130},
  doi          = {10.1109/COMPSAC.2015.130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ChenQJZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conielecomp/ShiZQLJ15,
  author       = {Yushuai Shi and
                  Deqing Zou and
                  Weizhong Qiang and
                  Xiaofei Liao and
                  Hai Jin},
  title        = {CloudTB: {A} quick and reliable testbed for virtual machine based
                  cloud computing systems},
  booktitle    = {25. International Conference on Electronics, Communications and Computers,
                  {CONIELECOMP} 2015, Cholula, Puebla, Mexico, February 25-27, 2015},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CONIELECOMP.2015.7086956},
  doi          = {10.1109/CONIELECOMP.2015.7086956},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/conielecomp/ShiZQLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/WuYCJGWZ15,
  author       = {Song Wu and
                  Chuxiong Yan and
                  Haibao Chen and
                  Hai Jin and
                  Wei Guo and
                  Zhen Wang and
                  Deqing Zou},
  title        = {Evaluating Latency-Sensitive Applications: Performance Degradation
                  in Datacenters with Restricted Power Budget},
  booktitle    = {44th International Conference on Parallel Processing, {ICPP} 2015,
                  Beijing, China, September 1-4, 2015},
  pages        = {639--648},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICPP.2015.73},
  doi          = {10.1109/ICPP.2015.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpp/WuYCJGWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobserv/ZhaoZJTQD15,
  author       = {Kao Zhao and
                  Deqing Zou and
                  Hai Jin and
                  Zhangbiaoge Tian and
                  Weizhong Qiang and
                  Weiqi Dai},
  editor       = {Onur Altintas and
                  Jia Zhang},
  title        = {Privacy Protection for Perceptual Applications on Smartphones},
  booktitle    = {2015 {IEEE} International Conference on Mobile Services, {MS} 2015,
                  New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {174--181},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MobServ.2015.33},
  doi          = {10.1109/MOBSERV.2015.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobserv/ZhaoZJTQD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WangYLJZD15,
  author       = {Daibin Wang and
                  Haixia Yao and
                  Yingjiu Li and
                  Hai Jin and
                  Deqing Zou and
                  Robert H. Deng},
  title        = {{CICC:} a fine-grained, semantic-aware, and transparent approach to
                  preventing permission leaks for Android permission managers},
  booktitle    = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015},
  pages        = {6:1--6:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2766498.2766518},
  doi          = {10.1145/2766498.2766518},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WangYLJZD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/IbrahimJYZX14,
  author       = {Ayad Ibrahim and
                  Hai Jin and
                  Ali A. Yassin and
                  Deqing Zou and
                  Peng Xu},
  title        = {Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud
                  Computing},
  journal      = {Comput. J.},
  volume       = {57},
  number       = {2},
  pages        = {241--254},
  year         = {2014},
  url          = {https://doi.org/10.1093/comjnl/bxt045},
  doi          = {10.1093/COMJNL/BXT045},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/IbrahimJYZX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HeZZCJJ14,
  author       = {Ligang He and
                  Deqing Zou and
                  Zhang Zhang and
                  Chao Chen and
                  Hai Jin and
                  Stephen A. Jarvis},
  title        = {Developing resource consolidation frameworks for moldable virtual
                  machines in clouds},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {32},
  pages        = {69--81},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2012.05.015},
  doi          = {10.1016/J.FUTURE.2012.05.015},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HeZZCJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZouZJJC14,
  author       = {Deqing Zou and
                  Weide Zheng and
                  Wenbin Jiang and
                  Hai Jin and
                  Gang Chen},
  title        = {Memshepherd: comprehensive memory bug fault-tolerance system},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {9},
  pages        = {1412--1419},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.849},
  doi          = {10.1002/SEC.849},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZouZJJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YuanQJZ14,
  author       = {Jinfeng Yuan and
                  Weizhong Qiang and
                  Hai Jin and
                  Deqing Zou},
  title        = {CloudTaint: an elastic taint tracking framework for malware detection
                  in the cloud},
  journal      = {J. Supercomput.},
  volume       = {70},
  number       = {3},
  pages        = {1433--1450},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-014-1235-5},
  doi          = {10.1007/S11227-014-1235-5},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/YuanQJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c3s2e/WangJZQ14,
  author       = {Fengwei Wang and
                  Hai Jin and
                  Deqing Zou and
                  Weizhong Qiang},
  editor       = {Bipin C. Desai},
  title        = {FDKeeper: {A} Quick and Open Failure Detector for Cloud Computing
                  System},
  booktitle    = {International C* Conference on Computer Science {\&} Software
                  Engineering, {C3S2E} '14, Montreal, QC, Canada - August 03 - 05, 2014},
  pages        = {14:1--14:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2641483.2641539},
  doi          = {10.1145/2641483.2641539},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c3s2e/WangJZQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hucc/ZouWJ14,
  author       = {Deqing Zou and
                  Hao Wang and
                  Hai Jin},
  editor       = {Qiaohong Zu and
                  Bo Hu and
                  Ning Gu and
                  Sopheap Seng},
  title        = {StrongUpdate: An Immediate Dynamic Software Update System for Multi-threaded
                  Applications},
  booktitle    = {Human Centered Computing - First International Conference, {HCC} 2014,
                  Phnom Penh, Cambodia, November 27-29, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8944},
  pages        = {365--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15554-8\_30},
  doi          = {10.1007/978-3-319-15554-8\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/hucc/ZouWJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/ZouQJQHC14,
  author       = {Deqing Zou and
                  Hao Qin and
                  Hai Jin and
                  Weizhong Qiang and
                  Zongfen Han and
                  Xueguang Chen},
  editor       = {Ching{-}Hsien Hsu and
                  Xuanhua Shi and
                  Valentina Salapura},
  title        = {Improving Log-Based Fault Diagnosis by Log Classification},
  booktitle    = {Network and Parallel Computing - 11th {IFIP} {WG} 10.3 International
                  Conference, {NPC} 2014, Ilan, Taiwan, September 18-20, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8707},
  pages        = {446--458},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44917-2\_37},
  doi          = {10.1007/978-3-662-44917-2\_37},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/ZouQJQHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoJZD14,
  author       = {Kao Zhao and
                  Hai Jin and
                  Deqing Zou and
                  Weiqi Dai},
  title        = {ONHelp: Components in Building Secure Cloud Based on OpenNebula},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {320--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.43},
  doi          = {10.1109/TRUSTCOM.2014.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoJZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/AbbdalJZY14,
  author       = {Salah H. Abbdal and
                  Hai Jin and
                  Deqing Zou and
                  Ali A. Yassen},
  title        = {Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage},
  booktitle    = {2014 {IEEE} 11th Intl Conf on Ubiquitous Intelligence and Computing
                  and 2014 {IEEE} 11th Intl Conf on Autonomic and Trusted Computing
                  and 2014 {IEEE} 14th Intl Conf on Scalable Computing and Communications
                  and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014},
  pages        = {510--517},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/UIC-ATC-ScalCom.2014.17},
  doi          = {10.1109/UIC-ATC-SCALCOM.2014.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/AbbdalJZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/JinCZZ13,
  author       = {Hai Jin and
                  Ge Cheng and
                  Deqing Zou and
                  Xinwen Zhang},
  title        = {Cherub: Fine-grained application protection with on-demand virtualization},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {9},
  pages        = {1326--1338},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2012.02.001},
  doi          = {10.1016/J.CAMWA.2012.02.001},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/JinCZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZouZQXYJH13,
  author       = {Deqing Zou and
                  Wenrong Zhang and
                  Weizhong Qiang and
                  Guofu Xiang and
                  Laurence Tianruo Yang and
                  Hai Jin and
                  Kan Hu},
  title        = {Design and implementation of a trusted monitoring framework for cloud
                  platforms},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {29},
  number       = {8},
  pages        = {2092--2102},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.future.2012.12.020},
  doi          = {10.1016/J.FUTURE.2012.12.020},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZouZQXYJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/QiangZWYJS13,
  author       = {Weizhong Qiang and
                  Deqing Zou and
                  Shenglan Wang and
                  Laurence Tianruo Yang and
                  Hai Jin and
                  Lei Shi},
  title        = {CloudAC: a cloud-oriented multilayer access control system for logic
                  virtual domain},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {51--59},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0094},
  doi          = {10.1049/IET-IFS.2012.0094},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/QiangZWYJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/FuLZQHP13,
  author       = {Cai Fu and
                  Min Li and
                  Deqing Zou and
                  Shuyan Qu and
                  Lansheng Han and
                  James Hyuk Park},
  title        = {Community Vitality in Dynamic Temporal Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/281565},
  doi          = {10.1155/2013/281565},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/FuLZQHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenJZZLZS13,
  author       = {Gang Chen and
                  Hai Jin and
                  Deqing Zou and
                  Bing Bing Zhou and
                  Zhenkai Liang and
                  Weide Zheng and
                  Xuanhua Shi},
  title        = {SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {6},
  pages        = {368--379},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.25},
  doi          = {10.1109/TDSC.2013.25},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenJZZLZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/JinXZWZLZ13,
  author       = {Hai Jin and
                  Guofu Xiang and
                  Deqing Zou and
                  Song Wu and
                  Feng Zhao and
                  Min Li and
                  Weide Zheng},
  title        = {A VMM-based intrusion prevention system in cloud computing environment},
  journal      = {J. Supercomput.},
  volume       = {66},
  number       = {3},
  pages        = {1133--1151},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-011-0608-2},
  doi          = {10.1007/S11227-011-0608-2},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/JinXZWZLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/QiangKZY12,
  author       = {Weizhong Qiang and
                  Aleksandr Konstantinov and
                  Deqing Zou and
                  Laurence Tianruo Yang},
  title        = {A standards-based interoperable single sign-on framework in {ARC}
                  Grid middleware},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {3},
  pages        = {892--904},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.03.006},
  doi          = {10.1016/J.JNCA.2011.03.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/QiangKZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/HanFZLJ12,
  author       = {Lansheng Han and
                  Cai Fu and
                  Deqing Zou and
                  Changhoon Lee and
                  Wenjing Jia},
  title        = {Task-based behavior detection of illegal codes},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {80--86},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.01.052},
  doi          = {10.1016/J.MCM.2011.01.052},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/HanFZLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoLQJZZ12,
  author       = {Feng Zhao and
                  Min Li and
                  Weizhong Qiang and
                  Hai Jin and
                  Deqing Zou and
                  Qin Zhang},
  title        = {Proactive recovery approach for intrusion tolerance with dynamic configuration
                  of physical and virtual replicas},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {10},
  pages        = {1169--1180},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.423},
  doi          = {10.1002/SEC.423},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoLQJZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/KongLZZ12,
  author       = {Huafeng Kong and
                  YunTing Lei and
                  Zhang Zhang and
                  Deqing Zou},
  title        = {A Cloud Computing Management System Platform Based on Power-Sensitive
                  Resource},
  booktitle    = {2012 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2012,
                  Guilin, China, December 6-8, 2012},
  pages        = {3--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/APSCC.2012.33},
  doi          = {10.1109/APSCC.2012.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/KongLZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/IbrahimJYZ12,
  author       = {Ayad Ibrahim and
                  Hai Jin and
                  Ali A. Yassin and
                  Deqing Zou},
  title        = {Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted
                  Cloud Data},
  booktitle    = {2012 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2012,
                  Guilin, China, December 6-8, 2012},
  pages        = {263--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/APSCC.2012.59},
  doi          = {10.1109/APSCC.2012.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/IbrahimJYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgc/IbrahimJYZ12,
  author       = {Ayad Ibrahim and
                  Hai Jin and
                  Ali A. Yassin and
                  Deqing Zou},
  editor       = {Jianxun Liu and
                  Jinjun Chen and
                  Guandong Xu},
  title        = {Towards Privacy Preserving Mining over Distributed Cloud Databases},
  booktitle    = {2012 Second International Conference on Cloud and Green Computing,
                  {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012},
  pages        = {130--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CGC.2012.86},
  doi          = {10.1109/CGC.2012.86},
  timestamp    = {Wed, 07 Aug 2024 10:36:47 +0200},
  biburl       = {https://dblp.org/rec/conf/cgc/IbrahimJYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgc/YassinJIZ12,
  author       = {Ali A. Yassin and
                  Hai Jin and
                  Ayad Ibrahim and
                  Deqing Zou},
  editor       = {Jianxun Liu and
                  Jinjun Chen and
                  Guandong Xu},
  title        = {Anonymous Password Authentication Scheme by Using Digital Signature
                  and Fingerprint in Cloud Computing},
  booktitle    = {2012 Second International Conference on Cloud and Green Computing,
                  {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012},
  pages        = {282--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CGC.2012.91},
  doi          = {10.1109/CGC.2012.91},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cgc/YassinJIZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/IbrahimJYZ12,
  author       = {Ayad Ibrahim and
                  Hai Jin and
                  Ali A. Yassin and
                  Deqing Zou},
  title        = {Approximate Keyword-based Search over Encrypted Cloud Data},
  booktitle    = {Ninth {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2012, Hangzhou, China, September 9-11, 2012},
  pages        = {238--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICEBE.2012.46},
  doi          = {10.1109/ICEBE.2012.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/IbrahimJYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/XiangJZ12,
  author       = {Guofu Xiang and
                  Hai Jin and
                  Deqing Zou},
  editor       = {Younghan Kim and
                  Cheeha Kim and
                  Panjai Tantatsanawong},
  title        = {A comprehensive monitoring framework for virtual computing environment},
  booktitle    = {2012 International Conference on Information Networking, {ICOIN} 2012,
                  Bali, Indonesia, February 1-3, 2012},
  pages        = {551--556},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICOIN.2012.6164438},
  doi          = {10.1109/ICOIN.2012.6164438},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/XiangJZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/YassinJIQZ12,
  author       = {Ali A. Yassin and
                  Hai Jin and
                  Ayad Ibrahim and
                  Weizhong Qiang and
                  Deqing Zou},
  title        = {A Practical Privacy-preserving Password Authentication Scheme for
                  Cloud Computing},
  booktitle    = {26th {IEEE} International Parallel and Distributed Processing Symposium
                  Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25,
                  2012},
  pages        = {1210--1217},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IPDPSW.2012.148},
  doi          = {10.1109/IPDPSW.2012.148},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/YassinJIQZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wism/YassinJIZ12,
  author       = {Ali A. Yassin and
                  Hai Jin and
                  Ayad Ibrahim and
                  Deqing Zou},
  editor       = {Fu Lee Wang and
                  Jingsheng Lei and
                  Zhiguo Gong and
                  Xiangfeng Luo},
  title        = {Encrypted Remote User Authentication Scheme by Using Smart Card},
  booktitle    = {Web Information Systems and Mining - International Conference, {WISM}
                  2012, Chengdu, China, October 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7529},
  pages        = {314--323},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33469-6\_42},
  doi          = {10.1007/978-3-642-33469-6\_42},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wism/YassinJIZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itcs2/2012,
  editor       = {James Jong Hyuk Park and
                  Jongsung Kim and
                  Deqing Zou and
                  Yang Sun Lee},
  title        = {Information Technology Convergence, Secure and Trust Computing, and
                  Data Management - {ITCS} 2012 {\&} {STA} 2012, Gwangju, Korea,
                  September 6-8, 2012},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {180},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-5083-8},
  doi          = {10.1007/978-94-007-5083-8},
  isbn         = {978-94-007-5082-1},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcs2/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ZouDZJ11,
  author       = {Deqing Zou and
                  Shangxin Du and
                  Weide Zheng and
                  Hai Jin},
  title        = {Building Automated Trust Negotiation architecture in virtual computing
                  environment},
  journal      = {J. Supercomput.},
  volume       = {55},
  number       = {1},
  pages        = {69--85},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11227-009-0358-6},
  doi          = {10.1007/S11227-009-0358-6},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ZouDZJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/HeDCZHFJ11,
  author       = {Ligang He and
                  Kewei Duan and
                  Xueguang Chen and
                  Deqing Zou and
                  Zongfen Han and
                  Ali Fadavinia and
                  Stephen A. Jarvis},
  editor       = {Hans{-}Arno Jacobsen and
                  Yan Wang and
                  Patrick Hung},
  title        = {Modelling Workflow Executions under Role-Based Authorisation Control},
  booktitle    = {{IEEE} International Conference on Services Computing, {SCC} 2011,
                  Washington, DC, USA, 4-9 July, 2011},
  pages        = {200--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SCC.2011.56},
  doi          = {10.1109/SCC.2011.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/HeDCZHFJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinagrid/TraoreJZQX11,
  author       = {Moussa Djiriba Traore and
                  Hai Jin and
                  Deqing Zou and
                  Weizhong Qiang and
                  Guofu Xiang},
  title        = {RAPn: Network Attack Prediction Using Ranking Access Petri Net},
  booktitle    = {Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning,
                  China, Aug. 22-23, 2011},
  pages        = {108--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ChinaGrid.2011.22},
  doi          = {10.1109/CHINAGRID.2011.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chinagrid/TraoreJZQX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grid/HeZZYJJ11,
  author       = {Ligang He and
                  Deqing Zou and
                  Zhang Zhang and
                  Kai Yang and
                  Hai Jin and
                  Stephen A. Jarvis},
  editor       = {Shantenu Jha and
                  Nils gentschen Felde and
                  Rajkumar Buyya and
                  Gilles Fedak},
  title        = {Optimizing Resource Consumptions in Clouds},
  booktitle    = {12th {IEEE/ACM} International Conference on Grid Computing, {GRID}
                  2011, Lyon, France, September 21-23, 2011},
  pages        = {42--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/Grid.2011.15},
  doi          = {10.1109/GRID.2011.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/grid/HeZZYJJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/JinXZZLY10,
  author       = {Hai Jin and
                  Guofu Xiang and
                  Deqing Zou and
                  Feng Zhao and
                  Min Li and
                  Chen Yu},
  title        = {A guest-transparent file integrity monitoring method in virtualization
                  environment},
  journal      = {Comput. Math. Appl.},
  volume       = {60},
  number       = {2},
  pages        = {256--266},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.camwa.2010.01.007},
  doi          = {10.1016/J.CAMWA.2010.01.007},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/JinXZZLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChengJZZ10,
  author       = {Ge Cheng and
                  Hai Jin and
                  Deqing Zou and
                  Xinwen Zhang},
  title        = {Building dynamic and transparent integrity measurement and protection
                  for virtualized platform in cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {22},
  number       = {13},
  pages        = {1893--1910},
  year         = {2010},
  url          = {https://doi.org/10.1002/cpe.1614},
  doi          = {10.1002/CPE.1614},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChengJZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZouZLJC10,
  author       = {Deqing Zou and
                  Weide Zheng and
                  Jinjiu Long and
                  Hai Jin and
                  Xueguang Chen},
  title        = {Constructing trusted virtual execution environment in {P2P} grids},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {26},
  number       = {5},
  pages        = {769--775},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.future.2009.05.020},
  doi          = {10.1016/J.FUTURE.2009.05.020},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZouZLJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/ParkZKLC10,
  author       = {Jong Hyuk Park and
                  Deqing Zou and
                  Tai{-}Hoon Kim and
                  Javier L{\'{o}}pez and
                  Hangbae Chang},
  title        = {Editorial},
  journal      = {J. Intell. Manuf.},
  volume       = {21},
  number       = {5},
  pages        = {593--594},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10845-009-0263-0},
  doi          = {10.1007/S10845-009-0263-0},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/ParkZKLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaiJZXZS10,
  author       = {Weiqi Dai and
                  Hai Jin and
                  Deqing Zou and
                  Shouhuai Xu and
                  Weide Zheng and
                  Lei Shi},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {{TEE:} a virtual {DRTM} based execution environment for secure cloud-end
                  computing},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {663--665},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866390},
  doi          = {10.1145/1866307.1866390},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DaiJZXZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cluster/ChenJZZQH10,
  author       = {Gang Chen and
                  Hai Jin and
                  Deqing Zou and
                  Bing Bing Zhou and
                  Weizhong Qiang and
                  Gang Hu},
  title        = {SHelp: Automatic Self-Healing for Multiple Application Instances in
                  a Virtual Machine Environment},
  booktitle    = {Proceedings of the 2010 {IEEE} International Conference on Cluster
                  Computing, Heraklion, Crete, Greece, 20-24 September, 2010},
  pages        = {97--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CLUSTER.2010.18},
  doi          = {10.1109/CLUSTER.2010.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cluster/ChenJZZQH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XiangJZZWZ10,
  author       = {Guofu Xiang and
                  Hai Jin and
                  Deqing Zou and
                  Xinwen Zhang and
                  Sha Wen and
                  Feng Zhao},
  title        = {VMDriver: {A} Driver-Based Monitoring Mechanism for Virtualization},
  booktitle    = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
                  New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages        = {72--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SRDS.2010.38},
  doi          = {10.1109/SRDS.2010.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/XiangJZZWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/OhoussouJZZXC10,
  author       = {Alex K. Ohoussou and
                  Hai Jin and
                  Deqing Zou and
                  Feng Zhao and
                  Guofu Xiang and
                  Ge Cheng},
  title        = {Autonomous agent based intrusion detection in virtual computing environment},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {682--686},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541866},
  doi          = {10.1109/WCINS.2010.5541866},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/OhoussouJZZXC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZouPKC09,
  author       = {Deqing Zou and
                  Jong Hyuk Park and
                  Tai{-}Hoon Kim and
                  Xueguang Chen},
  title        = {{SH-CRBAC:} Integrating Attribute and Status Constraints into the
                  {RBAC} Model in Smart Home Systems},
  journal      = {Comput. J.},
  volume       = {52},
  number       = {8},
  pages        = {861--870},
  year         = {2009},
  url          = {https://doi.org/10.1093/comjnl/bxn046},
  doi          = {10.1093/COMJNL/BXN046},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZouPKC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZouHJC09,
  author       = {Deqing Zou and
                  Ligang He and
                  Hai Jin and
                  Xueguang Chen},
  title        = {{CRBAC:} Imposing multi-grained constraints on the {RBAC} model in
                  the multi-application environment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {32},
  number       = {2},
  pages        = {402--411},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jnca.2008.02.015},
  doi          = {10.1016/J.JNCA.2008.02.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZouHJC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/ZouLJ09,
  author       = {Deqing Zou and
                  Jinjiu Long and
                  Hai Jin},
  editor       = {Anupam Datta},
  title        = {Trusted Deployment of Virtual Execution Environment in Grid Systems},
  booktitle    = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5913},
  pages        = {124--136},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4\_10},
  doi          = {10.1007/978-3-642-10622-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/ZouLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grid/ChengJZZLYX09,
  author       = {Ge Cheng and
                  Hai Jin and
                  Deqing Zou and
                  Xinwen Zhang and
                  Min Li and
                  Chen Yu and
                  Guofu Xiang},
  title        = {Building dynamic integrity protection for multiple independent authorities
                  in virtualization-based infrastructure},
  booktitle    = {Proceedings of the 2009 10th {IEEE/ACM} International Conference on
                  Grid Computing, October 13-15, 2009, Banff, Alberta, Canada},
  pages        = {113--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/GRID.2009.5353079},
  doi          = {10.1109/GRID.2009.5353079},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/grid/ChengJZZLYX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZouSJ09,
  author       = {Deqing Zou and
                  Lei Shi and
                  Hai Jin},
  title        = {{DVM-MAC:} {A} Mandatory Access Control System in Distributed Virtual
                  Computing Environment},
  booktitle    = {15th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2009, Shenzhen, China, December 8-11, 2009},
  pages        = {556--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICPADS.2009.128},
  doi          = {10.1109/ICPADS.2009.128},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/ZouSJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/JinXZZLS09,
  author       = {Hai Jin and
                  Guofu Xiang and
                  Feng Zhao and
                  Deqing Zou and
                  Min Li and
                  Lei Shi},
  editor       = {Won Kim and
                  Hyung{-}Jin Choi and
                  Dongho Won},
  title        = {VMFence: a customized intrusion prevention system in distributed virtual
                  computing environment},
  booktitle    = {Proceedings of the 3rd International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2009, Suwon, Korea, January
                  15-16, 2009},
  pages        = {391--399},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1516241.1516310},
  doi          = {10.1145/1516241.1516310},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/JinXZZLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/svm2/Cheng0ZSO09,
  author       = {Ge Cheng and
                  Hai Jin and
                  Deqing Zou and
                  Lei Shi and
                  Alex K. Ohoussou},
  editor       = {Latifa Boursas and
                  Mark Carlson and
                  Hai Jin and
                  Michelle Sibilla and
                  Kes Wold},
  title        = {{CFCC:} {A} Covert Flows Confinement Mechanism for Virtual Machine
                  Coalitions},
  booktitle    = {Systems and Virtualization Management. Standards and the Cloud - Third
                  International {DMTF} Academic Alliance Workshop, {SVM} 2009, Wuhan,
                  China, September 22-23, 2009. Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {71},
  pages        = {43--54},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14944-3\_6},
  doi          = {10.1007/978-3-642-14944-3\_6},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/svm2/Cheng0ZSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/ZouJPCL08,
  author       = {Deqing Zou and
                  Hai Jin and
                  Jong Hyuk Park and
                  Han{-}Chieh Chao and
                  Yunfa Li},
  title        = {Trusted virtual machine monitor-based group signature architecture},
  journal      = {{IET} Commun.},
  volume       = {2},
  number       = {10},
  pages        = {1311--1319},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-com:20080010},
  doi          = {10.1049/IET-COM:20080010},
  timestamp    = {Wed, 27 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-com/ZouJPCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/HongWWCZ08,
  author       = {Liu Hong and
                  Hu Wan and
                  Yu Wang and
                  Xueguang Chen and
                  Deqing Zou},
  title        = {Extending {HLA/RTI} to {WAN} Based on Grid Service},
  booktitle    = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008},
  pages        = {57--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/APSCC.2008.91},
  doi          = {10.1109/APSCC.2008.91},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apscc/HongWWCZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/ZouLWQ08,
  author       = {Deqing Zou and
                  Yunfa Li and
                  Song Wu and
                  Weizhong Qiang},
  editor       = {Chunming Rong and
                  Martin Gilje Jaatun and
                  Frode Eika Sandnes and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {A Trusted Group Signature Architecture in Virtual Computing Environment},
  booktitle    = {Autonomic and Trusted Computing, 5th International Conference, {ATC}
                  2008, Oslo, Norway, June 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5060},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69295-9\_8},
  doi          = {10.1007/978-3-540-69295-9\_8},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/ZouLWQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/WuWJZ08,
  author       = {Song Wu and
                  Kai Wang and
                  Hai Jin and
                  Deqing Zou},
  title        = {Heterogeneous Grid Workflow Management Based on Virtual Service},
  booktitle    = {Seventh International Conference on Grid and Cooperative Computing,
                  {GCC} 2008, Shenzhen, China, October 24-26, 2008},
  pages        = {483--489},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/GCC.2008.60},
  doi          = {10.1109/GCC.2008.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/WuWJZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/ChengJZOZ08,
  author       = {Ge Cheng and
                  Hai Jin and
                  Deqing Zou and
                  Alex K. Ohoussou and
                  Feng Zhao},
  title        = {A Prioritized Chinese Wall Model for Managing the Covert Information
                  Flows in Virtual Machine Systems},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {1481--1487},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.534},
  doi          = {10.1109/ICYCS.2008.534},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/ChengJZOZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/ZouPYLK08,
  author       = {Deqing Zou and
                  Jong Hyuk Park and
                  Laurence Tianruo Yang and
                  Zhensong Liao and
                  Tai{-}Hoon Kim},
  editor       = {Frode Eika Sandnes and
                  Yan Zhang and
                  Chunming Rong and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {A Formal Framework for Expressing Trust Negotiation in the Ubiquitous
                  Computing Environment},
  booktitle    = {Ubiquitous Intelligence and Computing, 5th International Conference,
                  {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5061},
  pages        = {35--45},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69293-5\_5},
  doi          = {10.1007/978-3-540-69293-5\_5},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/ZouPYLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiaoJZQ07,
  author       = {Zhensong Liao and
                  Hai Jin and
                  Deqing Zou and
                  Weizhong Qiang},
  title        = {A Novel Approach to Hide Credentials},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {306--311},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p306-311.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiaoJZQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ZouYQCH07,
  author       = {Deqing Zou and
                  Laurence Tianruo Yang and
                  Weizhong Qiang and
                  Xueguang Chen and
                  Zongfen Han},
  title        = {An Authentication and Access Control Framework for Group Communication
                  Systems in Grid Environment},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), May 21-23, 2007, Niagara Falls, Canada},
  pages        = {547--554},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINA.2007.33},
  doi          = {10.1109/AINA.2007.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ZouYQCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/LiJZCH07,
  author       = {Yunfa Li and
                  Hai Jin and
                  Deqing Zou and
                  Jieyun Chen and
                  Zongfen Han},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {A Digital Signature Mechanism and Authentication Scheme for Group
                  Communication in Grid},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {42--51},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_7},
  doi          = {10.1007/978-3-540-73547-2\_7},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/LiJZCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiaoJZL07,
  author       = {Zhensong Liao and
                  Hai Jin and
                  Deqing Zou and
                  Chisong Li},
  title        = {An {EMAIL} Based Automated Trust Negotiation Model},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {789--793},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.121},
  doi          = {10.1109/CIS.2007.121},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiaoJZL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/LiJZCH07,
  author       = {Yunfa Li and
                  Hai Jin and
                  Deqing Zou and
                  Jieyun Chen and
                  Zongfen Han},
  title        = {A Scalable Service Scheme for Secure Group Communication in Grid},
  booktitle    = {31st Annual International Computer Software and Applications Conference,
                  {COMPSAC} 2007, Beijing, China, July 24-27, 2007. Volume 1},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/COMPSAC.2007.38},
  doi          = {10.1109/COMPSAC.2007.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/LiJZCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/ZouPKC07,
  author       = {Deqing Zou and
                  Jong Hyuk Park and
                  Tai{-}Hoon Kim and
                  Xueguang Chen},
  title        = {Integrating Attribute and Status Constraint into the {RBAC} Model
                  for Access Control in Ubiquitous Systems},
  booktitle    = {Future Generation Communication and Networking, {FGCN} 2007, Ramada
                  Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings},
  pages        = {71--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FGCN.2007.152},
  doi          = {10.1109/FGCN.2007.152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/ZouPKC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/ZouJCH07,
  author       = {Deqing Zou and
                  Hai Jin and
                  Xueguang Chen and
                  Zongfen Han},
  title        = {Grid Security Interoperation between {CGSP} and {VEGA}},
  booktitle    = {Future Generation Communication and Networking, {FGCN} 2007, Ramada
                  Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings},
  pages        = {510--515},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FGCN.2007.142},
  doi          = {10.1109/FGCN.2007.142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/ZouJCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/LiaoJZ07,
  author       = {Zhensong Liao and
                  Hai Jin and
                  Deqing Zou},
  editor       = {Shing{-}Chi Cheung and
                  Yinsheng Li and
                  Kuo{-}Ming Chao and
                  Muhammad Younas and
                  Jen{-}Yao Chung},
  title        = {A Hidden Credential Based Oblivious Automated Trust Negotiation Model},
  booktitle    = {Proceedings of {ICEBE} 2007, {IEEE} International Conference on e-Business
                  Engineering and the Workshops {SOAIC} 2007, {SOSE} 2007, {SOKM} 2007,
                  24-26 October, 2007, Hong Kong, China},
  pages        = {247--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICEBE.2007.59},
  doi          = {10.1109/ICEBE.2007.59},
  timestamp    = {Fri, 02 Aug 2024 10:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icebe/LiaoJZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/ParkZ07,
  author       = {Jong Hyuk Park and
                  Deqing Zou},
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {Service, Security and Its Data Management for Ubiquitous Computing
                  - Overview},
  booktitle    = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  pages        = {500--501},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3\_50},
  doi          = {10.1007/978-3-540-77018-3\_50},
  timestamp    = {Mon, 19 Aug 2024 08:30:10 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/ParkZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pakdd/2007w,
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3},
  doi          = {10.1007/978-3-540-77018-3},
  isbn         = {978-3-540-77016-9},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/2007w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/JinSQZ06,
  author       = {Hai Jin and
                  Xuanhua Shi and
                  Weizhong Qiang and
                  Deqing Zou},
  title        = {{DRIC:} Dependable Grid Computing Framework},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {89-D},
  number       = {2},
  pages        = {612--623},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietisy/e89-d.2.612},
  doi          = {10.1093/IETISY/E89-D.2.612},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/JinSQZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcrd/LiZHQ06,
  author       = {Yunfa Li and
                  Deqing Zou and
                  Zongfen Han and
                  Weizhong Qiang},
  title        = {Research on Group Signature Scheme with Forward Security},
  journal      = {J. Comput. Res. Dev.},
  volume       = {43},
  number       = {12},
  pages        = {2069--2075},
  year         = {2006},
  url          = {http://WWW.CQVIP.COM/QK/94913X/200612/23426043.html},
  timestamp    = {Wed, 27 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcrd/LiZHQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/YanQSCZZ06,
  author       = {Fei Yan and
                  Weizhong Qiang and
                  Zhi{-}Dong Shen and
                  Chunrun Chen and
                  Huanguo Zhang and
                  Deqing Zou},
  editor       = {Laurence Tianruo Yang and
                  Hai Jin and
                  Jianhua Ma and
                  Theo Ungerer},
  title        = {Daonity: An Experience on Enhancing Grid Security by Trusted Computing
                  Technology},
  booktitle    = {Autonomic and Trusted Computing, Third International Conference, {ATC}
                  2006, Wuhan, China, September 3-6, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4158},
  pages        = {227--235},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11839569\_22},
  doi          = {10.1007/11839569\_22},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/YanQSCZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/JinXWZ06,
  author       = {Hai Jin and
                  Muzhou Xiong and
                  Song Wu and
                  Deqing Zou},
  editor       = {Vassil N. Alexandrov and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Replica Based Distributed Metadata Management in Grid Environment},
  booktitle    = {Computational Science - {ICCS} 2006, 6th International Conference,
                  Reading, UK, May 28-31, 2006, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3994},
  pages        = {1055--1062},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11758549\_140},
  doi          = {10.1007/11758549\_140},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/JinXWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JinLZQ06,
  author       = {Hai Jin and
                  Zhensong Liao and
                  Deqing Zou and
                  Weizhong Qiang},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {A New Approach to Hide Policy for Automated Trust Negotiation},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {168--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_12},
  doi          = {10.1007/11908739\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JinLZQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/JinSQZ05,
  author       = {Hai Jin and
                  Xuanhua Shi and
                  Weizhong Qiang and
                  Deqing Zou},
  title        = {An adaptive meta-scheduler for data-intensive applications},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {32--37},
  year         = {2005},
  url          = {https://doi.org/10.1504/IJGUC.2005.007058},
  doi          = {10.1504/IJGUC.2005.007058},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/JinSQZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/JinQSZ05,
  author       = {Hai Jin and
                  Weizhong Qiang and
                  Xuanhua Shi and
                  Deqing Zou},
  title        = {{RB-GACA:} an {RBAC} based grid access control architecture},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {61--70},
  year         = {2005},
  url          = {https://doi.org/10.1504/IJGUC.2005.007061},
  doi          = {10.1504/IJGUC.2005.007061},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/JinQSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/ZouJMHT05,
  author       = {Deqing Zou and
                  Hai Jin and
                  Feng Mao and
                  Zongfen Han and
                  Xuping Tu},
  title        = {Service organisation and information consistency for service grid},
  journal      = {Int. J. Web Grid Serv.},
  volume       = {1},
  number       = {1},
  pages        = {69--86},
  year         = {2005},
  url          = {https://doi.org/10.1504/IJWGS.2005.007550},
  doi          = {10.1504/IJWGS.2005.007550},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwgs/ZouJMHT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/QiangJSZ05,
  author       = {Weizhong Qiang and
                  Hai Jin and
                  Xuanhua Shi and
                  Deqing Zou},
  title        = {Joint Management of Authorization for Dynamic Virtual Organization},
  booktitle    = {Fifth International Conference on Computer and Information Technology
                  {(CIT} 2005), 21-23 September 2005, Shanghai, China},
  pages        = {375--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CIT.2005.134},
  doi          = {10.1109/CIT.2005.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/QiangJSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/ShiJHQWZ05,
  author       = {Xuanhua Shi and
                  Hai Jin and
                  Zongfen Han and
                  Weizhong Qiang and
                  Song Wu and
                  Deqing Zou},
  title        = {{ALTER:} Adaptive Failure Detection Services for Grids},
  booktitle    = {2005 {IEEE} International Conference on Services Computing {(SCC}
                  2005), 11-15 July 2005, Orlando, FL, {USA}},
  pages        = {355--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SCC.2005.23},
  doi          = {10.1109/SCC.2005.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/ShiJHQWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JinQSZ05,
  author       = {Hai Jin and
                  Weizhong Qiang and
                  Xuanhua Shi and
                  Deqing Zou},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {VO-Sec: An Access Control Framework for Dynamic Virtual Organization},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {370--381},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_31},
  doi          = {10.1007/11506157\_31},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JinQSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/MaoJZCQ05,
  author       = {Feng Mao and
                  Hai Jin and
                  Deqing Zou and
                  Baoli Chen and
                  Li Qi},
  title        = {QoS Oriented Dynamic Replica Cost Model for {P2P} Computing},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {822--828},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.117},
  doi          = {10.1109/ICDCSW.2005.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/MaoJZCQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/ZouQS05,
  author       = {Deqing Zou and
                  Weizhong Qiang and
                  Xuanhua Shi},
  title        = {A Formal General Framework and Service Access Model for Service Grid},
  booktitle    = {10th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2005), 16-20 June 2005, Shanghai, China},
  pages        = {349--356},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECCS.2005.9},
  doi          = {10.1109/ICECCS.2005.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/ZouQS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/LiJHXZW05,
  author       = {Yunfa Li and
                  Hai Jin and
                  Zongfen Han and
                  Chao Xie and
                  Deqing Zou and
                  Hao Wu},
  title        = {Aeneas: Real-Time Performance Evaluation Approach for Distributed
                  Programs with Reliability-Constrains},
  booktitle    = {19th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2005), {CD-ROM} / Abstracts Proceedings, 4-8 April 2005, Denver, CO,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IPDPS.2005.84},
  doi          = {10.1109/IPDPS.2005.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/LiJHXZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/JinQSZ05,
  author       = {Hai Jin and
                  Weizhong Qiang and
                  Xuanhua Shi and
                  Deqing Zou},
  editor       = {Pinar Yolum and
                  Tunga G{\"{u}}ng{\"{o}}r and
                  Fikret S. G{\"{u}}rgen and
                  Can C. {\"{O}}zturan},
  title        = {A Novel Authorization Mechanism for Service-Oriented Virtual Organization},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2005, 20th International
                  Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3733},
  pages        = {382--391},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11569596\_41},
  doi          = {10.1007/11569596\_41},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/JinQSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/JinYWQZ05,
  author       = {Hai Jin and
                  Chuanjiang Yi and
                  Song Wu and
                  Li Qi and
                  Deqing Zou},
  editor       = {Guihai Chen and
                  Yi Pan and
                  Minyi Guo and
                  Jian Lu},
  title        = {Uniform Authorization Management in ChinaGrid Support Platform},
  booktitle    = {Parallel and Distributed Processing and Applications - {ISPA} 2005
                  Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC,
                  IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3759},
  pages        = {223--231},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576259\_25},
  doi          = {10.1007/11576259\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/JinYWQZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/ChenJZTZY04,
  author       = {Hanhua Chen and
                  Hai Jin and
                  Minghu Zhang and
                  Pengliu Tan and
                  Deqing Zou and
                  Pingpeng Yuan},
  editor       = {Jeffrey Xu Yu and
                  Xuemin Lin and
                  Hongjun Lu and
                  Yanchun Zhang},
  title        = {Early Experience in QoS-Based Service Grid Architecture},
  booktitle    = {Advanced Web Technologies and Applications, 6th Asia-Pacific Web Conference,
                  APWeb 2004, Hangzhou, China, April 14-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3007},
  pages        = {924--927},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24655-8\_107},
  doi          = {10.1007/978-3-540-24655-8\_107},
  timestamp    = {Mon, 16 Mar 2020 17:44:09 +0100},
  biburl       = {https://dblp.org/rec/conf/apweb/ChenJZTZY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/JinCCKQZ04,
  author       = {Hai Jin and
                  Hanhua Chen and
                  Jian Chen and
                  Ping Kuang and
                  Li Qi and
                  Deqing Zou},
  title        = {Real-Time Strategy and Practice in Service Grid},
  booktitle    = {28th International Computer Software and Applications Conference {(COMPSAC}
                  2004), Design and Assessment of Trustworthy Software-Based Systems,
                  27-30 September 2004, Hong Kong, China, Proceedings},
  pages        = {161--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CMPSAC.2004.1342821},
  doi          = {10.1109/CMPSAC.2004.1342821},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/JinCCKQZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/QiangJSZ04,
  author       = {Weizhong Qiang and
                  Hai Jin and
                  Xuanhua Shi and
                  Deqing Zou},
  editor       = {Hai Jin and
                  Yi Pan and
                  Nong Xiao and
                  Jianhua Sun},
  title        = {A Novel VO-Based Access Control Model for Grid},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
                  Wuhan, China, October 21-24, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3251},
  pages        = {293--300},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30208-7\_43},
  doi          = {10.1007/978-3-540-30208-7\_43},
  timestamp    = {Fri, 26 Feb 2021 08:55:11 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/QiangJSZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ShiJQZ04,
  author       = {Xuanhua Shi and
                  Hai Jin and
                  Weizhong Qiang and
                  Deqing Zou},
  editor       = {Hai Jin and
                  Yi Pan and
                  Nong Xiao and
                  Jianhua Sun},
  title        = {Reliability Analysis for Grid Computing},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
                  Wuhan, China, October 21-24, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3251},
  pages        = {787--790},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30208-7\_105},
  doi          = {10.1007/978-3-540-30208-7\_105},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/ShiJQZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/JinCZZ04,
  author       = {Hai Jin and
                  Hanhua Chen and
                  Minghu Zhang and
                  Deqing Zou},
  editor       = {Kim{-}Meow Liew and
                  Hong Shen and
                  Simon See and
                  Wentong Cai and
                  Pingzhi Fan and
                  Susumu Horiguchi},
  title        = {RT-Grid: {A} QoS Oriented Service Grid Framework},
  booktitle    = {Parallel and Distributed Computing: Applications and Technologies,
                  5th International Conference, {PDCAT} 2004, Singapore, December 8-10,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3320},
  pages        = {345--348},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30501-9\_73},
  doi          = {10.1007/978-3-540-30501-9\_73},
  timestamp    = {Fri, 12 Jun 2020 16:01:21 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/JinCZZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/HaiZCSW03,
  author       = {Hai Jin and
                  Deqing Zou and
                  Hanhua Chen and
                  Jianhua Sun and
                  Song Wu},
  title        = {Fault-Tolerant Grid Architecture and Practice},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {18},
  number       = {4},
  pages        = {423--433},
  year         = {2003},
  url          = {https://doi.org/10.1007/BF02948916},
  doi          = {10.1007/BF02948916},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/HaiZCSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/QiangJSZZ03,
  author       = {Weizhong Qiang and
                  Hai Jin and
                  Xuanhua Shi and
                  Deqing Zou and
                  Hao Zhang},
  editor       = {Minglu Li and
                  Xian{-}He Sun and
                  Qianni Deng and
                  Jun Ni},
  title        = {{RB-GACA:} {A} {RBAC} Based Grid Access Control Architecture},
  booktitle    = {Grid and Cooperative Computing, Second International Workshop, {GCC}
                  2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3032},
  pages        = {487--494},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24679-4\_91},
  doi          = {10.1007/978-3-540-24679-4\_91},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/QiangJSZZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ZouJDQS03,
  author       = {Deqing Zou and
                  Hai Jin and
                  Xingchang Dong and
                  Weizhong Qiang and
                  Xuanhua Shi},
  editor       = {Minglu Li and
                  Xian{-}He Sun and
                  Qianni Deng and
                  Jun Ni},
  title        = {{HH-MDS:} {A} QoS-Aware Domain Divided Information Service},
  booktitle    = {Grid and Cooperative Computing, Second International Workshop, {GCC}
                  2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3033},
  pages        = {573--580},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24680-0\_93},
  doi          = {10.1007/978-3-540-24680-0\_93},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/ZouJDQS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ShiJQZ03,
  author       = {Xuanhua Shi and
                  Hai Jin and
                  Weizhong Qiang and
                  Deqing Zou},
  editor       = {Minglu Li and
                  Xian{-}He Sun and
                  Qianni Deng and
                  Jun Ni},
  title        = {An Adaptive Meta-scheduler for Data-Intensive Applications},
  booktitle    = {Grid and Cooperative Computing, Second International Workshop, {GCC}
                  2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3033},
  pages        = {830--837},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24680-0\_132},
  doi          = {10.1007/978-3-540-24680-0\_132},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/ShiJQZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideal/SunJCHZ03,
  author       = {Jianhua Sun and
                  Hai Jin and
                  Hao Chen and
                  Zongfen Han and
                  Deqing Zou},
  editor       = {Jiming Liu and
                  Yiu{-}ming Cheung and
                  Hujun Yin},
  title        = {A Data Mining Based Intrusion Detection Model},
  booktitle    = {Intelligent Data Engineering and Automated Learning, 4th International
                  Conference, {IDEAL} 2003, Hong Kong, China, March 21-23, 2003, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2690},
  pages        = {677--684},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45080-1\_91},
  doi          = {10.1007/978-3-540-45080-1\_91},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ideal/SunJCHZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}