default search action
BibTeX records: Deqing Zou
@article{DBLP:journals/jnca/WangDLCZ24, author = {Zeli Wang and Weiqi Dai and Ming Li and Kim{-}Kwang Raymond Choo and Deqing Zou}, title = {DFier: {A} directed vulnerability verifier for Ethereum smart contracts}, journal = {J. Netw. Comput. Appl.}, volume = {231}, pages = {103984}, year = {2024}, url = {https://doi.org/10.1016/j.jnca.2024.103984}, doi = {10.1016/J.JNCA.2024.103984}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WangDLCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/FengYRZDZ24, author = {Jun Feng and Laurence T. Yang and Bocheng Ren and Deqing Zou and Mianxiong Dong and Shunli Zhang}, title = {Tensor Recurrent Neural Network With Differential Privacy}, journal = {{IEEE} Trans. Computers}, volume = {73}, number = {3}, pages = {683--693}, year = {2024}, url = {https://doi.org/10.1109/TC.2023.3236868}, doi = {10.1109/TC.2023.3236868}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/FengYRZDZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuanYXCSLZJ24, author = {Bin Yuan and Maogen Yang and Zheng Xu and Qunjinming Chen and Zhanxiang Song and Zhen Li and Deqing Zou and Hai Jin}, title = {Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {3196--3210}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3323713}, doi = {10.1109/TDSC.2023.3323713}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuanYXCSLZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiLZCXZJ24, author = {Weiqi Dai and Jinkai Liu and Yang Zhou and Kim{-}Kwang Raymond Choo and Xia Xie and Deqing Zou and Hai Jin}, title = {{PRBFPT:} {A} Practical Redactable Blockchain Framework With a Public Trapdoor}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2425--2437}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3349855}, doi = {10.1109/TIFS.2024.3349855}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DaiLZCXZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/YuanZRCXZLZZJ24, author = {Bin Yuan and Chi Zhang and Jiajun Ren and Qunjinming Chen and Biang Xu and Qiankun Zhang and Zhen Li and Deqing Zou and Fan Zhang and Hai Jin}, title = {Toward Automated Attack Discovery in {SDN} Controllers Through Formal Verification}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {3}, pages = {3636--3655}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2024.3386404}, doi = {10.1109/TNSM.2024.3386404}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/YuanZRCXZLZZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/DaiYZCZXJ24, author = {Weiqi Dai and Liangliang Yu and Yang Zhou and Kim{-}Kwang Raymond Choo and Deqing Zou and Xia Xie and Hai Jin}, title = {{PASSP:} {A} Private Authorization Scheme Oriented Service Providers}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {4}, pages = {4888--4899}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2024.3420726}, doi = {10.1109/TNSM.2024.3420726}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/DaiYZCZXJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/ZhaoWZJ24, author = {Haojun Zhao and Yueming Wu and Deqing Zou and Hai Jin}, title = {An Empirical Study on Android Malware Characterization by Social Network Analysis}, journal = {{IEEE} Trans. Reliab.}, volume = {73}, number = {1}, pages = {757--770}, year = {2024}, url = {https://doi.org/10.1109/TR.2023.3304389}, doi = {10.1109/TR.2023.3304389}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/ZhaoWZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/WuFSZJ24, author = {Yueming Wu and Siyue Feng and Wenqi Suo and Deqing Zou and Hai Jin}, title = {Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone Detection}, journal = {{IEEE} Trans. Reliab.}, volume = {73}, number = {2}, pages = {1310--1324}, year = {2024}, url = {https://doi.org/10.1109/TR.2023.3312294}, doi = {10.1109/TR.2023.3312294}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/WuFSZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/WangLZ0C24, author = {Hongfei Wang and Chenliang Luo and Deqing Zou and Hai Jin and Wenjie Cai}, title = {Gradient Boosting-Accelerated Evolution for Multiple-Fault Diagnosis}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2024, Valencia, Spain, March 25-27, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://ieeexplore.ieee.org/document/10546656}, timestamp = {Mon, 17 Jun 2024 14:45:14 +0200}, biburl = {https://dblp.org/rec/conf/date/WangLZ0C24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhaoXCQZJ24, author = {Yu Zhao and Wenjie Xue and Weijie Chen and Weizhong Qiang and Deqing Zou and Hai Jin}, title = {Owl: Differential-Based Side-Channel Leakage Detection for {CUDA} Applications}, booktitle = {54th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2024, Brisbane, Australia, June 24-27, 2024}, pages = {362--376}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DSN58291.2024.00044}, doi = {10.1109/DSN58291.2024.00044}, timestamp = {Thu, 19 Sep 2024 11:23:38 +0200}, biburl = {https://dblp.org/rec/conf/dsn/ZhaoXCQZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChenZZQZJ24, author = {Weijie Chen and Yu Zhao and Yinqian Zhang and Weizhong Qiang and Deqing Zou and Hai Jin}, editor = {Joaquin Garc{\'{\i}}a{-}Alfaro and Rafal Kozik and Michal Choras and Sokratis K. Katsikas}, title = {ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks}, booktitle = {Computer Security - {ESORICS} 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14985}, pages = {24--44}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-70903-6\_2}, doi = {10.1007/978-3-031-70903-6\_2}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChenZZQZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/0027WZLZX0024, author = {Zhen Li and Ning Wang and Deqing Zou and Yating Li and Ruqian Zhang and Shouhuai Xu and Chao Zhang and Hai Jin}, title = {On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities}, booktitle = {Proceedings of the 46th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024}, pages = {157:1--157:12}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3597503.3639218}, doi = {10.1145/3597503.3639218}, timestamp = {Mon, 24 Jun 2024 15:20:25 +0200}, biburl = {https://dblp.org/rec/conf/icse/0027WZLZX0024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/FengSWZ0024, author = {Siyue Feng and Wenqi Suo and Yueming Wu and Deqing Zou and Yang Liu and Hai Jin}, title = {Machine Learning is All You Need: {A} Simple Token-based Approach for Effective Code Clone Detection}, booktitle = {Proceedings of the 46th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024}, pages = {222:1--222:13}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3597503.3639114}, doi = {10.1145/3597503.3639114}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/FengSWZ0024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FengWXPZ0024, author = {Siyue Feng and Yueming Wu and Wenjie Xue and Sikui Pan and Deqing Zou and Yang Liu and Hai Jin}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {{FIRE:} Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/feng-siyue}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/FengWXPZ0024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-09767, author = {Zhen Li and Ning Wang and Deqing Zou and Yating Li and Ruqian Zhang and Shouhuai Xu and Chao Zhang and Hai Jin}, title = {On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities}, journal = {CoRR}, volume = {abs/2401.09767}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.09767}, doi = {10.48550/ARXIV.2401.09767}, eprinttype = {arXiv}, eprint = {2401.09767}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-09767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LopesZAALRP23, author = {Ivandro Ortet Lopes and Deqing Zou and Ihsan H. Abdulqadder and Saeed Akbar and Zhen Li and Francis A. Ruambo and Wagner Pereira}, title = {Network intrusion detection based on the temporal convolutional model}, journal = {Comput. Secur.}, volume = {135}, pages = {103465}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103465}, doi = {10.1016/J.COSE.2023.103465}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AbdulqadderZA23, author = {Ihsan H. Abdulqadder and Deqing Zou and Israa T. Aziz}, title = {The {DAG} blockchain: {A} secure edge assisted honeypot for attack detection and multi-controller based load balancing in {SDN} 5G}, journal = {Future Gener. Comput. Syst.}, volume = {141}, pages = {339--354}, year = {2023}, url = {https://doi.org/10.1016/j.future.2022.11.008}, doi = {10.1016/J.FUTURE.2022.11.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AbdulqadderZA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/YuanWWZJ23, author = {Bin Yuan and Jun Wan and Yuhan Wu and Deqing Zou and Hai Jin}, title = {On the Security of Smart Home Systems: {A} Survey}, journal = {J. Comput. Sci. Technol.}, volume = {38}, number = {2}, pages = {228--247}, year = {2023}, url = {https://doi.org/10.1007/s11390-023-2488-3}, doi = {10.1007/S11390-023-2488-3}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/YuanWWZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YuanWYXWZJ23, author = {Bin Yuan and Yuhan Wu and Maogen Yang and Luyi Xing and Xuchang Wang and Deqing Zou and Hai Jin}, title = {SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1656--1674}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3162312}, doi = {10.1109/TDSC.2022.3162312}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YuanWYXWZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShiZXDJ23, author = {Jian Shi and Deqing Zou and Shouhuai Xu and Xianjun Deng and Hai Jin}, title = {Does OpenBSD and Firefox's Security Improve With Time?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {2781--2793}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3153325}, doi = {10.1109/TDSC.2022.3153325}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShiZXDJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/HuFSJWZJ23, author = {Yutao Hu and Yilin Fang and Yifan Sun and Yaru Jia and Yueming Wu and Deqing Zou and Hai Jin}, title = {Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {9}, pages = {4429--4442}, year = {2023}, url = {https://doi.org/10.1109/TSE.2023.3295801}, doi = {10.1109/TSE.2023.3295801}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/HuFSJWZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/WangALSZL23, author = {Jingyu Wang and Jennifer Appiah{-}Kubi and Lung{-}An Lee and Dongyuan Shi and Deqing Zou and Chen{-}Ching Liu}, title = {An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders}, journal = {{IEEE} Trans. Smart Grid}, volume = {14}, number = {2}, pages = {1210--1222}, year = {2023}, url = {https://doi.org/10.1109/TSG.2022.3200405}, doi = {10.1109/TSG.2022.3200405}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/WangALSZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/RenQWZZJ23, author = {Kunlun Ren and Weizhong Qiang and Yueming Wu and Yi Zhou and Deqing Zou and Hai Jin}, title = {JSRevealer: {A} Robust Malicious JavaScript Detector against Obfuscation}, booktitle = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023}, pages = {339--351}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSN58367.2023.00041}, doi = {10.1109/DSN58367.2023.00041}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/RenQWZZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/WuYWLZJ23, author = {Yulun Wu and Zeliang Yu and Ming Wen and Qiang Li and Deqing Zou and Hai Jin}, title = {Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2023, Melbourne, Australia, May 14-20, 2023}, pages = {1046--1058}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE48619.2023.00095}, doi = {10.1109/ICSE48619.2023.00095}, timestamp = {Wed, 19 Jul 2023 10:09:12 +0200}, biburl = {https://dblp.org/rec/conf/icse/WuYWLZJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/YuanLFWZLLJ23, author = {Bin Yuan and Yifan Lu and Yilin Fang and Yueming Wu and Deqing Zou and Zhen Li and Zhi Li and Hai Jin}, title = {Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2023, Melbourne, Australia, May 14-20, 2023}, pages = {2262--2274}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE48619.2023.00190}, doi = {10.1109/ICSE48619.2023.00190}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/YuanLFWZLLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/HuXFWYZ023, author = {Tiancheng Hu and Zijing Xu and Yilin Fang and Yueming Wu and Bin Yuan and Deqing Zou and Hai Jin}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {89--100}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598040}, doi = {10.1145/3597926.3598040}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/HuXFWYZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/Xie0JGHZ023, author = {Zifan Xie and Ming Wen and Haoxiang Jia and Xiaochen Guo and Xiaotong Huang and Deqing Zou and Hai Jin}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {347--359}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598061}, doi = {10.1145/3597926.3598061}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/Xie0JGHZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/HuWLPWZ023, author = {Yutao Hu and Suyuan Wang and Wenke Li and Junru Peng and Yueming Wu and Deqing Zou and Hai Jin}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {1407--1419}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598145}, doi = {10.1145/3597926.3598145}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/HuWLPWZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/RenQWZZ023, author = {Kunlun Ren and Weizhong Qiang and Yueming Wu and Yi Zhou and Deqing Zou and Hai Jin}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {1420--1432}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598146}, doi = {10.1145/3597926.3598146}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/RenQWZZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/LiZZWLXCJ23, author = {Zhen Li and Ruqian Zhang and Deqing Zou and Ning Wang and Yating Li and Shouhuai Xu and Chen Chen and Hai Jin}, title = {Robin: {A} Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers}, booktitle = {38th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2023, Luxembourg, September 11-15, 2023}, pages = {27--39}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ASE56229.2023.00164}, doi = {10.1109/ASE56229.2023.00164}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/LiZZWLXCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ZouFWS023, author = {Deqing Zou and Siyue Feng and Yueming Wu and Wenqi Suo and Hai Jin}, editor = {Satish Chandra and Kelly Blincoe and Paolo Tonella}, title = {Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model}, booktitle = {Proceedings of the 31st {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023}, pages = {771--783}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3611643.3616354}, doi = {10.1145/3611643.3616354}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/ZouFWS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-10644, author = {Zhen Li and Ruqian Zhang and Deqing Zou and Ning Wang and Yating Li and Shouhuai Xu and Chen Chen and Hai Jin}, title = {Robin: {A} Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers}, journal = {CoRR}, volume = {abs/2309.10644}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.10644}, doi = {10.48550/ARXIV.2309.10644}, eprinttype = {arXiv}, eprint = {2309.10644}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-10644.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ChenZJXY22, author = {Haoyu Chen and Deqing Zou and Hai Jin and Shouhuai Xu and Bin Yuan}, title = {{SAND:} semi-automated adaptive network defense via programmable rule generation and deployment}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {7}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.1007/s11432-020-3193-2}, doi = {10.1007/S11432-020-3193-2}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ChenZJXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LopesZARYJ22, author = {Ivandro Ortet Lopes and Deqing Zou and Ihsan H. Abdulqadder and Francis A. Ruambo and Bin Yuan and Hai Jin}, title = {Effective network intrusion detection via representation learning: {A} Denoising AutoEncoder approach}, journal = {Comput. Commun.}, volume = {194}, pages = {55--65}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2022.07.027}, doi = {10.1016/J.COMCOM.2022.07.027}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/LopesZARYJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DaiTYCZ022, author = {Weiqi Dai and Shuyue Tuo and Liangliang Yu and Kim{-}Kwang Raymond Choo and Deqing Zou and Hai Jin}, title = {{HAPPS:} {A} Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {24}, pages = {25538--25550}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3197708}, doi = {10.1109/JIOT.2022.3197708}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DaiTYCZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/HeZQWXDJ22, author = {Muqing He and Deqing Zou and Weizhong Qiang and Wenbo Wu and Shouhuai Xu and Xianjun Deng and Hai Jin}, title = {Utility-Prioritized Differential Privacy for Quantitative Biomedical Data}, journal = {J. Circuits Syst. Comput.}, volume = {31}, number = {13}, pages = {2250236:1--2250236:23}, year = {2022}, url = {https://doi.org/10.1142/S021812662250236X}, doi = {10.1142/S021812662250236X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/HeZQWXDJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenYZJ22, author = {Haoyu Chen and Bin Yuan and Deqing Zou and Hai Jin}, title = {A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks}, journal = {{IEEE} Netw.}, volume = {36}, number = {4}, pages = {150--158}, year = {2022}, url = {https://doi.org/10.1109/MNET.002.2100655}, doi = {10.1109/MNET.002.2100655}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/ChenYZJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0027ZX0ZC22, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Hai Jin and Yawei Zhu and Zhaoxuan Chen}, title = {SySeVR: {A} Framework for Using Deep Learning to Detect Software Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2244--2258}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3051525}, doi = {10.1109/TDSC.2021.3051525}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/0027ZX0ZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZXCZ022, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Zhaoxuan Chen and Yawei Zhu and Hai Jin}, title = {VulDeeLocator: {A} Deep Learning-Based Fine-Grained Vulnerability Detector}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2821--2837}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3076142}, doi = {10.1109/TDSC.2021.3076142}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZXCZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/HeNYWDZA22, author = {Yuanyuan He and Jianbing Ni and Laurence T. Yang and Wei Wei and Xianjun Deng and Deqing Zou and Syed Hassan Ahmed}, title = {Differentially Private Tripartite Intelligent Matching Against Inference Attacks in Ride-Sharing Services}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {11}, pages = {22583--22595}, year = {2022}, url = {https://doi.org/10.1109/TITS.2021.3136386}, doi = {10.1109/TITS.2021.3136386}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/HeNYWDZA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JinWWDZZ22, author = {Hai Jin and Zeli Wang and Ming Wen and Weiqi Dai and Yu Zhu and Deqing Zou}, title = {Aroc: An Automatic Repair Framework for On-Chain Smart Contracts}, journal = {{IEEE} Trans. Software Eng.}, volume = {48}, number = {11}, pages = {4611--4629}, year = {2022}, url = {https://doi.org/10.1109/TSE.2021.3123170}, doi = {10.1109/TSE.2021.3123170}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JinWWDZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/ChenLZSZ22, author = {Qi Chen and Guohui Li and Quan Zhou and Si Shi and Deqing Zou}, title = {Double Attention Convolutional Neural Network for Sequential Recommendation}, journal = {{ACM} Trans. Web}, volume = {16}, number = {4}, pages = {19:1--19:23}, year = {2022}, url = {https://doi.org/10.1145/3555350}, doi = {10.1145/3555350}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tweb/ChenLZSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangYYZ022, author = {Zhechang Zhang and Bin Yuan and Kehan Yang and Deqing Zou and Hai Jin}, title = {StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {756--768}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3564650}, doi = {10.1145/3564625.3564650}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangYYZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/WuZD0X022, author = {Yueming Wu and Deqing Zou and Shihan Dou and Wei Yang and Duo Xu and Hai Jin}, title = {VulCNN: An Image-inspired Scalable Vulnerability Detection System}, booktitle = {44th {IEEE/ACM} 44th International Conference on Software Engineering, {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022}, pages = {2365--2376}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510003.3510229}, doi = {10.1145/3510003.3510229}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/WuZD0X022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/WuFZ022, author = {Yueming Wu and Siyue Feng and Deqing Zou and Hai Jin}, title = {Detecting Semantic Code Clones by Building AST-based Markov Chains Model}, booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2022, Rochester, MI, USA, October 10-14, 2022}, pages = {34:1--34:13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551349.3560426}, doi = {10.1145/3551349.3560426}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/WuFZ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/HuZPWS022, author = {Yutao Hu and Deqing Zou and Junru Peng and Yueming Wu and Junjie Shan and Hai Jin}, title = {TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection}, booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2022, Rochester, MI, USA, October 10-14, 2022}, pages = {109:1--109:12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551349.3556927}, doi = {10.1145/3551349.3556927}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/HuZPWS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/00480C0LXZ0Z22, author = {Zhi Li and Weijie Liu and Hongbo Chen and XiaoFeng Wang and Xiaojing Liao and Luyi Xing and Mingming Zha and Hai Jin and Deqing Zou}, title = {Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2397--2412}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833803}, doi = {10.1109/SP46214.2022.9833803}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/00480C0LXZ0Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/XiaZDJZ21, author = {Yang Xia and Tianqing Zhu and Xiaofeng Ding and Hai Jin and Deqing Zou}, title = {Heterogeneous differential privacy for vertically partitioned databases}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {8}, year = {2021}, url = {https://doi.org/10.1002/cpe.5607}, doi = {10.1002/CPE.5607}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/XiaZDJZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangJDCZ21, author = {Zeli Wang and Hai Jin and Weiqi Dai and Kim{-}Kwang Raymond Choo and Deqing Zou}, title = {Ethereum smart contract security research: survey and future research opportunities}, journal = {Frontiers Comput. Sci.}, volume = {15}, number = {2}, pages = {152802}, year = {2021}, url = {https://doi.org/10.1007/s11704-020-9284-9}, doi = {10.1007/S11704-020-9284-9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangJDCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/DaiWWLZJ21, author = {Weiqi Dai and Qinyuan Wang and Zeli Wang and Xiaobin Lin and Deqing Zou and Hai Jin}, title = {Trustzone-based secure lightweight wallet for hyperledger fabric}, journal = {J. Parallel Distributed Comput.}, volume = {149}, pages = {66--75}, year = {2021}, url = {https://doi.org/10.1016/j.jpdc.2020.11.001}, doi = {10.1016/J.JPDC.2020.11.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/DaiWWLZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/QiangH0YZ21, author = {Weizhong Qiang and Yingda Huang and Hai Jin and Laurence T. Yang and Deqing Zou}, title = {CloudCFI: Context-Sensitive and Incremental {CFI} in the Cloud Environment}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {3}, pages = {938--957}, year = {2021}, url = {https://doi.org/10.1109/TCC.2019.2902384}, doi = {10.1109/TCC.2019.2902384}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/QiangH0YZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JinLZY21, author = {Hai Jin and Zhi Li and Deqing Zou and Bin Yuan}, title = {{DSEOM:} {A} Framework for Dynamic Security Evaluation and Optimization of {MTD} in Container-Based Cloud}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1125--1136}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2916666}, doi = {10.1109/TDSC.2019.2916666}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JinLZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZouWXLJ21, author = {Deqing Zou and Sujuan Wang and Shouhuai Xu and Zhen Li and Hai Jin}, title = {{\textdollar}{\textbackslash}mu{\textdollar}{\(\mu\)}VulDeePecker: {A} Deep Learning-Based System for Multiclass Vulnerability Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2224--2236}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2942930}, doi = {10.1109/TDSC.2019.2942930}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZouWXLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/AbdulqadderZAYD21, author = {Ihsan H. Abdulqadder and Deqing Zou and Israa T. Aziz and Bin Yuan and Weiqi Dai}, title = {Deployment of Robust Security Scheme in {SDN} Based 5G Network over {NFV} Enabled Cloud Environment}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {2}, pages = {866--877}, year = {2021}, url = {https://doi.org/10.1109/TETC.2018.2879714}, doi = {10.1109/TETC.2018.2879714}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/AbdulqadderZAYD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiLCLZJ21, author = {Weiqi Dai and Yan Lv and Kim{-}Kwang Raymond Choo and Zhongze Liu and Deqing Zou and Hai Jin}, title = {{CRSA:} {A} Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4291--4305}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3104142}, doi = {10.1109/TIFS.2021.3104142}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiLCLZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/YuanLZYJ21, author = {Bin Yuan and Chen Lin and Deqing Zou and Laurence Tianruo Yang and Hai Jin}, title = {Detecting Malicious Switches for a Secure Software-defined Tactile Internet}, journal = {{ACM} Trans. Internet Techn.}, volume = {21}, number = {4}, pages = {84:1--84:23}, year = {2021}, url = {https://doi.org/10.1145/3415146}, doi = {10.1145/3415146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/YuanLZYJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ZouZXLJY21, author = {Deqing Zou and Yawei Zhu and Shouhuai Xu and Zhen Li and Hai Jin and Hengkai Ye}, title = {Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {30}, number = {2}, pages = {23:1--23:31}, year = {2021}, url = {https://doi.org/10.1145/3429444}, doi = {10.1145/3429444}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/ZouZXLJY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ZouWYCYZDJ21, author = {Deqing Zou and Yueming Wu and Siru Yang and Anki Chauhan and Wei Yang and Jiangying Zhong and Shihan Dou and Hai Jin}, title = {IntDroid: Android Malware Detection Based on {API} Intimacy Analysis}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {30}, number = {3}, pages = {39:1--39:32}, year = {2021}, url = {https://doi.org/10.1145/3442588}, doi = {10.1145/3442588}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/ZouWYCYZDJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiaYX000LZCZZ021, author = {Yan Jia and Bin Yuan and Luyi Xing and Dongfang Zhao and Yifan Zhang and XiaoFeng Wang and Yijing Liu and Kaimin Zheng and Peyton Crnjak and Yuqing Zhang and Deqing Zou and Hai Jin}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Who's In Control? On Security Risks of Disjointed IoT Device Management Channels}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1289--1305}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484592}, doi = {10.1145/3460120.3484592}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiaYX000LZCZZ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/WuZYL021, author = {Yueming Wu and Deqing Zou and Wei Yang and Xiang Li and Hai Jin}, editor = {Cristian Cadar and Xiangyu Zhang}, title = {HomDroid: detecting Android covert malware by social-network homophily analysis}, booktitle = {{ISSTA} '21: 30th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021}, pages = {216--229}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460319.3464833}, doi = {10.1145/3460319.3464833}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/WuZYL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanSDZCL021, author = {Bin Yuan and Shengyao Sun and Xianjun Deng and Deqing Zou and Haoyu Chen and Shenghui Li and Hai Jin}, title = {Automatically derived stateful network functions including non-field attributes}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {944--951}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00132}, doi = {10.1109/TRUSTCOM53373.2021.00132}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuanSDZCL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-03799, author = {Yueming Wu and Shihan Dou and Deqing Zou and Wei Yang and Weizhong Qiang and Hai Jin}, title = {Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning}, journal = {CoRR}, volume = {abs/2107.03799}, year = {2021}, url = {https://arxiv.org/abs/2107.03799}, eprinttype = {arXiv}, eprint = {2107.03799}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-03799.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-04743, author = {Yueming Wu and Deqing Zou and Wei Yang and Xiang Li and Hai Jin}, title = {HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis}, journal = {CoRR}, volume = {abs/2107.04743}, year = {2021}, url = {https://arxiv.org/abs/2107.04743}, eprinttype = {arXiv}, eprint = {2107.04743}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-04743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-00669, author = {Zhen Li and Jing Tang and Deqing Zou and Qian Chen and Shouhuai Xu and Chao Zhang and Yichen Li and Hai Jin}, title = {Towards Making Deep Learning-based Vulnerability Detectors Robust}, journal = {CoRR}, volume = {abs/2108.00669}, year = {2021}, url = {https://arxiv.org/abs/2108.00669}, eprinttype = {arXiv}, eprint = {2108.00669}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-00669.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AbdulqadderZZAA20, author = {Ihsan H. Abdulqadder and Shijie Zhou and Deqing Zou and Israa T. Aziz and Syed Muhammad Abrar Akber}, title = {Multi-layered intrusion detection and prevention in the {SDN/NFV} enabled cloud of 5G networks using AI-based defense mechanisms}, journal = {Comput. Networks}, volume = {179}, pages = {107364}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107364}, doi = {10.1016/J.COMNET.2020.107364}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AbdulqadderZZAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuoZDJLS20, author = {Peng Luo and Deqing Zou and Yajuan Du and Hai Jin and Changming Liu and Jinan Shen}, title = {Static detection of real-world buffer overflow induced by loop}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101616}, doi = {10.1016/J.COSE.2019.101616}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuoZDJLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YuanZJYY20, author = {Bin Yuan and Deqing Zou and Hai Jin and Shui Yu and Laurence T. Yang}, title = {HostWatcher: Protecting hosts in cloud data centers through software-defined networking}, journal = {Future Gener. Comput. Syst.}, volume = {105}, pages = {964--972}, year = {2020}, url = {https://doi.org/10.1016/j.future.2017.04.023}, doi = {10.1016/J.FUTURE.2017.04.023}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/YuanZJYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YuanLZZYJR20, author = {Bin Yuan and Chen Lin and Huan Zhao and Deqing Zou and Laurence Tianruo Yang and Hai Jin and Chunming Rong}, title = {Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {9}, pages = {7967--7981}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2993587}, doi = {10.1109/JIOT.2020.2993587}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YuanLZZYJR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangDCJZ20, author = {Zeli Wang and Weiqi Dai and Kim{-}Kwang Raymond Choo and Hai Jin and Deqing Zou}, title = {{FSFC:} An input filter-based secure framework for smart contract}, journal = {J. Netw. Comput. Appl.}, volume = {154}, pages = {102530}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102530}, doi = {10.1016/J.JNCA.2020.102530}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WangDCJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DaiDCCZ020, author = {Weiqi Dai and Chunkai Dai and Kim{-}Kwang Raymond Choo and Changze Cui and Deqing Zou and Hai Jin}, title = {{SDTE:} {A} Secure Blockchain-Based Data Trading Ecosystem}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {725--737}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2928256}, doi = {10.1109/TIFS.2019.2928256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DaiDCCZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/YuanZLZYJHY20, author = {Bin Yuan and Huan Zhao and Chen Lin and Deqing Zou and Laurence Tianruo Yang and Hai Jin and Ligang He and Shui Yu}, title = {Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {7}, number = {4}, pages = {2541--2554}, year = {2020}, url = {https://doi.org/10.1109/TNSE.2020.2981449}, doi = {10.1109/TNSE.2020.2981449}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/YuanZLZYJHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LiJZY20, author = {Zhi Li and Hai Jin and Deqing Zou and Bin Yuan}, title = {Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {31}, number = {3}, pages = {695--706}, year = {2020}, url = {https://doi.org/10.1109/TPDS.2019.2942591}, doi = {10.1109/TPDS.2019.2942591}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LiJZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/ZhangSYZS020, author = {Pan Zhang and Chengyu Song and Heng Yin and Deqing Zou and Elaine Shi and Hai Jin}, editor = {James R. Larus and Luis Ceze and Karin Strauss}, title = {Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks}, booktitle = {{ASPLOS} '20: Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, March 16-20, 2020}, pages = {1263--1276}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3373376.3378487}, doi = {10.1145/3373376.3378487}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asplos/ZhangSYZS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/Zhang0FZ020, author = {Shiqiang Zhang and Song Wu and Hao Fan and Deqing Zou and Hai Jin}, editor = {Zhiwen Yu and Christian Becker and Guoliang Xing}, title = {{BED:} {A} Block-Level Deduplication-Based Container Deployment Framework}, booktitle = {Green, Pervasive, and Cloud Computing - 15th International Conference, {GPC} 2020, Xi'an, China, November 13-15, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12398}, pages = {504--518}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64243-3\_38}, doi = {10.1007/978-3-030-64243-3\_38}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/Zhang0FZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/AbdulqadderZZAA20, author = {Ihsan H. Abdulqadder and Shijie Zhou and Deqing Zou and Israa T. Aziz and Syed Muhammad Abrar Akber}, title = {Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled {SDN/NFV} Cloud of IoT}, booktitle = {20th {IEEE} International Conference on Communication Technology, {ICCT} 2020, Nanning, China, October 28-31, 2020}, pages = {499--507}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCT50939.2020.9295823}, doi = {10.1109/ICCT50939.2020.9295823}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icct/AbdulqadderZZAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/WuZDYYCLJ20, author = {Yueming Wu and Deqing Zou and Shihan Dou and Siru Yang and Wei Yang and Feng Cheng and Hong Liang and Hai Jin}, title = {SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis}, booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September 21-25, 2020}, pages = {821--833}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1145/3324884.3416562}, doi = {10.1145/3324884.3416562}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/WuZDYYCLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/WangWLWQZMJ20, author = {Shangwen Wang and Ming Wen and Bo Lin and Hongjun Wu and Yihao Qin and Deqing Zou and Xiaoguang Mao and Hai Jin}, title = {Automated Patch Correctness Assessment: How Far are We?}, booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September 21-25, 2020}, pages = {968--980}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1145/3324884.3416590}, doi = {10.1145/3324884.3416590}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/WangWLWQZMJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiaXZ0Z20, author = {Bin Yuan and Yan Jia and Luyi Xing and Dongfang Zhao and XiaoFeng Wang and Deqing Zou and Hai Jin and Yuqing Zhang}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1183--1200}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/yuan}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JiaXZ0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-02334, author = {Deqing Zou and Sujuan Wang and Shouhuai Xu and Zhen Li and Hai Jin}, title = {{\(\mu\)}VulDeePecker: {A} Deep Learning-Based System for Multiclass Vulnerability Detection}, journal = {CoRR}, volume = {abs/2001.02334}, year = {2020}, url = {http://arxiv.org/abs/2001.02334}, eprinttype = {arXiv}, eprint = {2001.02334}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-02334.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-02350, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Zhaoxuan Chen and Yawei Zhu and Hai Jin}, title = {VulDeeLocator: {A} Deep Learning-based Fine-grained Vulnerability Detector}, journal = {CoRR}, volume = {abs/2001.02350}, year = {2020}, url = {http://arxiv.org/abs/2001.02350}, eprinttype = {arXiv}, eprint = {2001.02350}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-02350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiZTZSJ19, author = {Zhen Li and Deqing Zou and Jing Tang and Zhihao Zhang and Mingqian Sun and Hai Jin}, title = {A Comparative Study of Deep Learning-Based Vulnerability Detection System}, journal = {{IEEE} Access}, volume = {7}, pages = {103184--103197}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2930578}, doi = {10.1109/ACCESS.2019.2930578}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiZTZSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HanZQFZ19, author = {Lansheng Han and Man Zhou and Yekui Qian and Cai Fu and Deqing Zou}, title = {An Optimized Static Propositional Function Model to Detect Software Vulnerability}, journal = {{IEEE} Access}, volume = {7}, pages = {143499--143510}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2943896}, doi = {10.1109/ACCESS.2019.2943896}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HanZQFZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZouZLWQJWY19, author = {Deqing Zou and Jian Zhao and Weiming Li and Yueming Wu and Weizhong Qiang and Hai Jin and Ye Wu and Yifei Yang}, title = {A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {1484--1494}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2838569}, doi = {10.1109/JIOT.2018.2838569}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZouZLWQJWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/FengYDWZ19, author = {Jun Feng and Laurence T. Yang and Guohui Dai and Wei Wang and Deqing Zou}, title = {A Secure High-Order Lanczos-Based Orthogonal Tensor {SVD} for Big Data Reduction in Cloud Environment}, journal = {{IEEE} Trans. Big Data}, volume = {5}, number = {3}, pages = {355--367}, year = {2019}, url = {https://doi.org/10.1109/TBDATA.2018.2803841}, doi = {10.1109/TBDATA.2018.2803841}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/FengYDWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ShenZJYD19, author = {Jinan Shen and Deqing Zou and Hai Jin and Bin Yuan and Weiqi Dai}, title = {A domain-divided configurable security model for cloud computing-based telecommunication services}, journal = {J. Supercomput.}, volume = {75}, number = {1}, pages = {109--122}, year = {2019}, url = {https://doi.org/10.1007/s11227-015-1587-5}, doi = {10.1007/S11227-015-1587-5}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ShenZJYD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YuanZYJQS19, author = {Bin Yuan and Deqing Zou and Shui Yu and Hai Jin and Weizhong Qiang and Jinan Shen}, title = {Defending Against Flow Table Overloading Attack in Software-Defined Networks}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {12}, number = {2}, pages = {231--246}, year = {2019}, url = {https://doi.org/10.1109/TSC.2016.2602861}, doi = {10.1109/TSC.2016.2602861}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/YuanZYJQS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/ZouYL0019, author = {Deqing Zou and Ju Yang and Zhen Li and Hai Jin and Xiaojing Ma}, editor = {Rodrigo Sanches Miani and L{\'{a}}saro J. Camargos and Bruno Bogaz Zarpel{\~{a}}o and Erika Rosas and Rafael Pasquini}, title = {AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process}, booktitle = {Green, Pervasive, and Cloud Computing - 14th International Conference, {GPC} 2019, Uberl{\^{a}}ndia, Brazil, May 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11484}, pages = {238--253}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-19223-5\_17}, doi = {10.1007/978-3-030-19223-5\_17}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/ZouYL0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/WuLZYZ019, author = {Yueming Wu and Xiaodi Li and Deqing Zou and Wei Yang and Xin Zhang and Hai Jin}, title = {MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis}, booktitle = {34th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2019, San Diego, CA, USA, November 11-15, 2019}, pages = {139--150}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ASE.2019.00023}, doi = {10.1109/ASE.2019.00023}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/WuLZYZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AbdulqadderZAYL18, author = {Ihsan H. Abdulqadder and Deqing Zou and Israa T. Aziz and Bin Yuan and Weiming Li}, title = {SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {8292--8301}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2797214}, doi = {10.1109/ACCESS.2018.2797214}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AbdulqadderZAYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZouLYCJ18, author = {Deqing Zou and Yu Lu and Bin Yuan and Haoyu Chen and Hai Jin}, title = {A Fine-Grained Multi-Tenant Permission Management Framework for {SDN} and {NFV}}, journal = {{IEEE} Access}, volume = {6}, pages = {25562--25572}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2828132}, doi = {10.1109/ACCESS.2018.2828132}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZouLYCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/0001LDZ18, author = {Hai Jin and Benxi Liu and Yajuan Du and Deqing Zou}, title = {BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation}, journal = {{IEEE} Access}, volume = {6}, pages = {36341--36353}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2835838}, doi = {10.1109/ACCESS.2018.2835838}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/0001LDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DaiDWCZJ18, author = {Weiqi Dai and Jun Deng and Qinyuan Wang and Changze Cui and Deqing Zou and Hai Jin}, title = {{SBLWT:} {A} Secure Blockchain Lightweight Wallet Based on Trustzone}, journal = {{IEEE} Access}, volume = {6}, pages = {40638--40648}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2856864}, doi = {10.1109/ACCESS.2018.2856864}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DaiDWCZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZouHYCJ18, author = {Deqing Zou and Zirong Huang and Bin Yuan and Haoyu Chen and Hai Jin}, title = {Solving Anomalies in {NFV-SDN} Based Service Function Chaining Composition for IoT Network}, journal = {{IEEE} Access}, volume = {6}, pages = {62286--62295}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2876314}, doi = {10.1109/ACCESS.2018.2876314}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZouHYCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/DaiDJQZXL18, author = {Weiqi Dai and Yukun Du and Hai Jin and Weizhong Qiang and Deqing Zou and Shouhuai Xu and Zhongze Liu}, title = {RollSec: Automatically Secure Software States Against General Rollback}, journal = {Int. J. Parallel Program.}, volume = {46}, number = {4}, pages = {788--805}, year = {2018}, url = {https://doi.org/10.1007/s10766-017-0523-0}, doi = {10.1007/S10766-017-0523-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/DaiDJQZXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DaiWQYZJXH18, author = {Weiqi Dai and Pengfei Wan and Weizhong Qiang and Laurence T. Yang and Deqing Zou and Hai Jin and Shouhuai Xu and Zirong Huang}, title = {TNGuard: Securing IoT Oriented Tenant Networks Based on {SDN}}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {3}, pages = {1411--1423}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2018.2801317}, doi = {10.1109/JIOT.2018.2801317}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DaiWQYZJXH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AbdulqadderZAY18, author = {Ihsan H. Abdulqadder and Deqing Zou and Israa T. Aziz and Bin Yuan}, title = {Validating User Flows to Protect Software Defined Network Environments}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {1308678:1--1308678:14}, year = {2018}, url = {https://doi.org/10.1155/2018/1308678}, doi = {10.1155/2018/1308678}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/AbdulqadderZAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LuoZJDZS18, author = {Peng Luo and Deqing Zou and Hai Jin and Yajuan Du and Long Zheng and Jinan Shen}, title = {DigHR: precise dynamic detection of hidden races with weak causal relation analysis}, journal = {J. Supercomput.}, volume = {74}, number = {6}, pages = {2684--2704}, year = {2018}, url = {https://doi.org/10.1007/s11227-018-2307-8}, doi = {10.1007/S11227-018-2307-8}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LuoZJDZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/YuanJZYY18, author = {Bin Yuan and Hai Jin and Deqing Zou and Laurence Tianruo Yang and Shui Yu}, title = {A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {15}, number = {2}, pages = {825--839}, year = {2018}, url = {https://doi.org/10.1109/TNSM.2018.2822668}, doi = {10.1109/TNSM.2018.2822668}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/YuanJZYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZouDL018, author = {Deqing Zou and Zhijun Deng and Zhen Li and Hai Jin}, editor = {Willy Susilo and Guomin Yang}, title = {Automatically Identifying Security Bug Reports via Multitype Features Analysis}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {619--633}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_35}, doi = {10.1007/978-3-319-93638-3\_35}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZouDL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuZLZ018, author = {Changming Liu and Deqing Zou and Peng Luo and Bin B. Zhu and Hai Jin}, title = {A Heuristic Framework to Detect Concurrency Vulnerabilities}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {529--541}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274718}, doi = {10.1145/3274694.3274718}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiuZLZ018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/AbdulqadderZAY18, author = {Ihsan H. Abdulqadder and Deqing Zou and Israa T. Aziz and Bin Yuan}, title = {Enhanced Attack Aware Security Provisioning Scheme in {SDN/NFV} Enabled over 5G Network}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487339}, doi = {10.1109/ICCCN.2018.8487339}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/AbdulqadderZAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/0002ZZC0Z18, author = {Xiaojing Ma and Bin Zhu and Tao Zhang and Sixing Cao and Hai Jin and Deqing Zou}, title = {Efficient privacy-preserving motion detection for {HEVC} compressed video in cloud video surveillance}, booktitle = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19, 2018}, pages = {813--818}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFCOMW.2018.8406880}, doi = {10.1109/INFCOMW.2018.8406880}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/0002ZZC0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiZXO0WDZ18, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Xinyu Ou and Hai Jin and Sujuan Wang and Zhijun Deng and Yuyi Zhong}, title = {VulDeePecker: {A} Deep Learning-Based System for Vulnerability Detection}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-2\_Li\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiZXO0WDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/LiZXJZCWW18, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Hai Jin and Yawei Zhu and Zhaoxuan Chen and Sujuan Wang and Jialai Wang}, title = {SySeVR: {A} Framework for Using Deep Learning to Detect Software Vulnerabilities}, publisher = {{IEEE} DataPort}, year = {2018}, month = nov, howpublished = {\url{https://doi.org/10.21227/fhg0-1b35}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/fhg0-1b35}, doi = {10.21227/FHG0-1B35}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/LiZXJZCWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01681, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Xinyu Ou and Hai Jin and Sujuan Wang and Zhijun Deng and Yuyi Zhong}, title = {VulDeePecker: {A} Deep Learning-Based System for Vulnerability Detection}, journal = {CoRR}, volume = {abs/1801.01681}, year = {2018}, url = {http://arxiv.org/abs/1801.01681}, eprinttype = {arXiv}, eprint = {1801.01681}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-06756, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Hai Jin and Yawei Zhu and Zhaoxuan Chen and Sujuan Wang and Jialai Wang}, title = {SySeVR: {A} Framework for Using Deep Learning to Detect Software Vulnerabilities}, journal = {CoRR}, volume = {abs/1807.06756}, year = {2018}, url = {http://arxiv.org/abs/1807.06756}, eprinttype = {arXiv}, eprint = {1807.06756}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-06756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XuFLZZL17, author = {Deliang Xu and Cai Fu and Guohui Li and Deqing Zou and Honghao Zhang and Xiao{-}Yang Liu}, title = {Virtualization of the Encryption Card for Trust Access in Cloud Computing}, journal = {{IEEE} Access}, volume = {5}, pages = {20652--20667}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2754515}, doi = {10.1109/ACCESS.2017.2754515}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XuFLZZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QiangLSYZJ17, author = {Weizhong Qiang and Yuehua Liao and Guozhong Sun and Laurence T. Yang and Deqing Zou and Hai Jin}, title = {Patch-Related Vulnerability Detection Based on Symbolic Execution}, journal = {{IEEE} Access}, volume = {5}, pages = {20777--20784}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2676161}, doi = {10.1109/ACCESS.2017.2676161}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QiangLSYZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QiangXDZJ17, author = {Weizhong Qiang and Gongping Xu and Weiqi Dai and Deqing Zou and Hai Jin}, title = {CloudVMI: {A} Cloud-Oriented Writable Virtual Machine Introspection}, journal = {{IEEE} Access}, volume = {5}, pages = {21962--21976}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2758356}, doi = {10.1109/ACCESS.2017.2758356}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QiangXDZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/RajehJZ17, author = {Wahid Rajeh and Hai Jin and Deqing Zou}, title = {Saudi cloud infrastructure: a security analysis}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {12}, pages = {122102:1--122102:13}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-0322-7}, doi = {10.1007/S11432-016-0322-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/RajehJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaacs/IbrahimJYZ17, author = {Ayad Ibrahim and Hai Jin and Ali A. Yassin and Deqing Zou}, title = {Privacy preserving search over multiple servers}, journal = {Int. J. Auton. Adapt. Commun. Syst.}, volume = {10}, number = {4}, pages = {426--442}, year = {2017}, url = {https://doi.org/10.1504/IJAACS.2017.10009675}, doi = {10.1504/IJAACS.2017.10009675}, timestamp = {Sun, 30 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaacs/IbrahimJYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/MaYXZZJ17, author = {Xiaojing Ma and Laurence T. Yang and Yang Xiang and Wenjun Kevin Zeng and Deqing Zou and Hai Jin}, title = {Fully Reversible Privacy Region Protection for Cloud Video Surveillance}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {5}, number = {3}, pages = {510--522}, year = {2017}, url = {https://doi.org/10.1109/TCC.2015.2469651}, doi = {10.1109/TCC.2015.2469651}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/MaYXZZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangYLJZD17, author = {Daibin Wang and Haixia Yao and Yingjiu Li and Hai Jin and Deqing Zou and Robert H. Deng}, title = {A Secure, Usable, and Transparent Middleware for Permission Managers on Android}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {4}, pages = {350--362}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2479613}, doi = {10.1109/TDSC.2015.2479613}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangYLJZD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LuoZJDS17, author = {Peng Luo and Deqing Zou and Hai Jin and Yajuan Du and Jinan Shen}, title = {A dynamic predictive race detector for {C/C++} programs}, journal = {J. Supercomput.}, volume = {73}, number = {9}, pages = {3999--4019}, year = {2017}, url = {https://doi.org/10.1007/s11227-017-1996-8}, doi = {10.1007/S11227-017-1996-8}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LuoZJDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/QiangHZJWS17, author = {Weizhong Qiang and Yingda Huang and Deqing Zou and Hai Jin and Shizhen Wang and Guozhong Sun}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Fully Context-Sensitive {CFI} for {COTS} Binaries}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {435--442}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_28}, doi = {10.1007/978-3-319-59870-3\_28}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/QiangHZJWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/DuLSZJX17, author = {Yajuan Du and Qiao Li and Liang Shi and Deqing Zou and Hai Jin and Chun Jason Xue}, title = {Reducing {LDPC} Soft Sensing Latency by Lightweight Data Refresh for Flash Read Performance Improvement}, booktitle = {Proceedings of the 54th Annual Design Automation Conference, {DAC} 2017, Austin, TX, USA, June 18-22, 2017}, pages = {23:1--23:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3061639.3062309}, doi = {10.1145/3061639.3062309}, timestamp = {Wed, 29 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/DuLSZJX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ZouQLWJSWZ17, author = {Deqing Zou and Hanchao Qi and Zhen Li and Song Wu and Hai Jin and Guozhong Sun and Sujuan Wang and Yuyi Zhong}, editor = {Michalis Polychronakis and Michael Meier}, title = {{SCVD:} {A} New Semantics-Based Approach for Cloned Vulnerable Code Detection}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {325--344}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_15}, doi = {10.1007/978-3-319-60876-1\_15}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ZouQLWJSWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/QiangCDZJL17, author = {Weizhong Qiang and Yong Cao and Weiqi Dai and Deqing Zou and Hai Jin and Benxi Liu}, title = {Libsec: {A} Hardware Virtualization-Based Isolation for Shared Library}, booktitle = {19th {IEEE} International Conference on High Performance Computing and Communications; 15th {IEEE} International Conference on Smart City; 3rd {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2017, Bangkok, Thailand, December 18-20, 2017}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.5}, doi = {10.1109/HPCC-SMARTCITY-DSS.2017.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/QiangCDZJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/JinDZ16, author = {Hai Jin and Weiqi Dai and Deqing Zou}, title = {Theory and methodology of research on cloud security}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {5}, pages = {050105:1--050105:3}, year = {2016}, url = {https://doi.org/10.1007/s11432-016-5549-1}, doi = {10.1007/S11432-016-5549-1}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/JinDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZouQJ16, author = {Deqing Zou and Hao Qin and Hai Jin}, title = {UiLog: Improving Log-Based Fault Diagnosis by Log Analysis}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {5}, pages = {1038--1052}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1678-7}, doi = {10.1007/S11390-016-1678-7}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ZouQJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WangHFZL16, author = {Tao Wang and Lansheng Han and Cai Fu and Deqing Zou and Ming Liu}, title = {{\unicode{36719}}{\unicode{20214}}{\unicode{28431}}{\unicode{27934}}{\unicode{38745}}{\unicode{24577}}{\unicode{26816}}{\unicode{27979}}{\unicode{27169}}{\unicode{22411}}{\unicode{21450}}{\unicode{26816}}{\unicode{27979}}{\unicode{26694}}{\unicode{26550}} (Static Detection Model and Framework for Software Vulnerability)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {5}, pages = {80--86}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.05.015}, doi = {10.11896/J.ISSN.1002-137X.2016.05.015}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/WangHFZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangJZXZC16, author = {Daibin Wang and Hai Jin and Deqing Zou and Peng Xu and Tianqing Zhu and Gang Chen}, title = {Taming transitive permission attack via bytecode rewriting on Android application}, journal = {Secur. Commun. Networks}, volume = {9}, number = {13}, pages = {2100--2114}, year = {2016}, url = {https://doi.org/10.1002/sec.1466}, doi = {10.1002/SEC.1466}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangJZXZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZouXM16, author = {Deqing Zou and Yang Xiang and Geyong Min}, title = {Privacy preserving in cloud computing environment}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2752--2753}, year = {2016}, url = {https://doi.org/10.1002/sec.1498}, doi = {10.1002/SEC.1498}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZouXM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QiangJRZJ16, author = {Weizhong Qiang and Changqing Jiang and Longbo Ran and Deqing Zou and Hai Jin}, title = {{CDMCR:} multi-level fault-tolerant system for distributed applications in cloud}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2766--2778}, year = {2016}, url = {https://doi.org/10.1002/sec.1187}, doi = {10.1002/SEC.1187}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QiangJRZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/WengLLZ16, author = {Chuliang Weng and Qian Liu and Kenli Li and Deqing Zou}, title = {CloudMon: Monitoring Virtual Machines in Clouds}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {12}, pages = {3787--3793}, year = {2016}, url = {https://doi.org/10.1109/TC.2016.2560809}, doi = {10.1109/TC.2016.2560809}, timestamp = {Fri, 16 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/WengLLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/MaZYZJ16, author = {Xiaojing Ma and Wenjun Kevin Zeng and Laurence T. Yang and Deqing Zou and Hai Jin}, title = {Lossless {ROI} Privacy Protection of {H.264/AVC} Compressed Surveillance Videos}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {4}, number = {3}, pages = {349--362}, year = {2016}, url = {https://doi.org/10.1109/TETC.2015.2460462}, doi = {10.1109/TETC.2015.2460462}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/MaZYZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ChenJZLZW16, author = {Gang Chen and Hai Jin and Deqing Zou and Zhenkai Liang and Bing Bing Zhou and Hao Wang}, title = {A Framework for Practical Dynamic Software Updating}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {27}, number = {4}, pages = {941--950}, year = {2016}, url = {https://doi.org/10.1109/TPDS.2015.2430854}, doi = {10.1109/TPDS.2015.2430854}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ChenJZLZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiZXJQH16, author = {Zhen Li and Deqing Zou and Shouhuai Xu and Hai Jin and Hanchao Qi and Jie Hu}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {VulPecker: an automated vulnerability detection system based on code similarity analysis}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {201--213}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991102}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LiZXJQH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/AbduljabbarJHYH16, author = {Zaid Ameen Abduljabbar and Hai Jin and Zaid Alaa Hussien and Ali A. Yassin and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, title = {Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment}, booktitle = {2nd {IEEE} International Conference on Big Data Security on Cloud, BigDataSecurity 2016, {IEEE} International Conference on High Performance and Smart Computing, {HPSC} 2016, and {IEEE} International Conference on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April 9-10, 2016}, pages = {146--151}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.25}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.25}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/AbduljabbarJHYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/AbbdalJYAHHZ16, author = {Salah H. Abbdal and Hai Jin and Ali A. Yassin and Zaid Ameen Abduljabbar and Mohammed Abdulridha Hussain and Zaid Alaa Hussien and Deqing Zou}, title = {An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage}, booktitle = {2nd {IEEE} International Conference on Big Data Security on Cloud, BigDataSecurity 2016, {IEEE} International Conference on High Performance and Smart Computing, {HPSC} 2016, and {IEEE} International Conference on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April 9-10, 2016}, pages = {412--417}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.26}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.26}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/AbbdalJYAHHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuXWJSZ16, author = {Peng Xu and Jun Xu and Wei Wang and Hai Jin and Willy Susilo and Deqing Zou}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Generally Hybrid Proxy Re-Encryption: {A} Secure Data Sharing among Cryptographic Clouds}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {913--918}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897923}, doi = {10.1145/2897845.2897923}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuXWJSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/AbduljabbarJIHH16, author = {Zaid Ameen Abduljabbar and Hai Jin and Ayad Ibrahim and Zaid Alaa Hussien and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, editor = {Xinyi Huang and Yang Xiang and Kuan{-}Ching Li}, title = {Towards Secure Private Image Matching}, booktitle = {Green, Pervasive, and Cloud Computing - 11th International Conference, {GPC} 2016, Xi'an, China, May 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9663}, pages = {301--315}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39077-2\_20}, doi = {10.1007/978-3-319-39077-2\_20}, timestamp = {Thu, 24 Feb 2022 11:50:56 +0100}, biburl = {https://dblp.org/rec/conf/gpc/AbduljabbarJIHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/AbduljabbarJYHH16, author = {Zaid Ameen Abduljabbar and Hai Jin and Ali A. Yassin and Zaid Alaa Hussien and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, title = {Robust scheme to protect authentication code of message/image documents in cloud computing}, booktitle = {2016 International Conference on Computing, Networking and Communications, {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICCNC.2016.7440585}, doi = {10.1109/ICCNC.2016.7440585}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/AbduljabbarJYHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenDZJ16, author = {Zilong Wen and Weiqi Dai and Deqing Zou and Hai Jin}, title = {PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {683--690}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0126}, doi = {10.1109/TRUSTCOM.2016.0126}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenDZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbduljabbarJIHH16, author = {Zaid Ameen Abduljabbar and Hai Jin and Ayad Ibrahim and Zaid Alaa Hussien and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, title = {Privacy-Preserving Image Retrieval in IoT-Cloud}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {799--806}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0141}, doi = {10.1109/TRUSTCOM.2016.0141}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbduljabbarJIHH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChenJZZQ15, author = {Gang Chen and Hai Jin and Deqing Zou and Bing Bing Zhou and Weizhong Qiang}, title = {A lightweight software fault-tolerance system in the cloud environment}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {12}, pages = {2982--2998}, year = {2015}, url = {https://doi.org/10.1002/cpe.3190}, doi = {10.1002/CPE.3190}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChenJZZQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DaiJZXZSY15, author = {Weiqi Dai and Hai Jin and Deqing Zou and Shouhuai Xu and Weide Zheng and Lei Shi and Laurence Tianruo Yang}, title = {{TEE:} {A} virtual {DRTM} based execution environment for secure cloud-end computing}, journal = {Future Gener. Comput. Syst.}, volume = {49}, pages = {47--57}, year = {2015}, url = {https://doi.org/10.1016/j.future.2014.08.005}, doi = {10.1016/J.FUTURE.2014.08.005}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/DaiJZXZSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoJZDX15, author = {Kao Zhao and Hai Jin and Deqing Zou and Weiqi Dai and Yang Xiang}, title = {A privacy-preserving location tracking system for smartphones based on cloud storage}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {446--458}, year = {2015}, url = {https://doi.org/10.1002/sec.992}, doi = {10.1002/SEC.992}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoJZDX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AbduljabbarJHYH15, author = {Zaid Ameen Abduljabbar and Hai Jin and Zaid Alaa Hussien and Ali A. Yassin and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {61--66}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492746}, doi = {10.1109/ISIAS.2015.7492746}, timestamp = {Thu, 22 Feb 2024 09:42:25 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbduljabbarJHYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HussienJAYHAZ15, author = {Zaid Alaa Hussien and Hai Jin and Zaid Ameen Abduljabbar and Ali A. Yassin and Mohammed Abdulridha Hussain and Salah H. Abbdal and Deqing Zou}, editor = {Ajith Abraham and Adel M. Alimi and Abdelkrim Haqiq and Dijiang Huang and Dong Seong Kim and Hannan Xiao and Nizar Rokbani and Mohamed Ben Halima and Azah Kamilah Muda and Kun Ma}, title = {Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext}, booktitle = {11th International Conference on Information Assurance and Security, {IAS} 2015, Marrakech, Morocco, December 14-16, 2015}, pages = {73--78}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISIAS.2015.7492748}, doi = {10.1109/ISIAS.2015.7492748}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/HussienJAYHAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/LiuZJ15, author = {Kai Liu and Deqing Zou and Hai Jin}, title = {UaaS: Software Update as a Service for the IaaS Cloud}, booktitle = {2015 {IEEE} International Conference on Services Computing, {SCC} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {483--490}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SCC.2015.72}, doi = {10.1109/SCC.2015.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/LiuZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ChenQJZW15, author = {Feng Chen and Weizhong Qiang and Hai Jin and Deqing Zou and Duoqiang Wang}, editor = {Sheikh Iqbal Ahamed and Carl K. Chang and William C. Chu and Ivica Crnkovic and Pao{-}Ann Hsiung and Gang Huang and Jingwei Yang}, title = {Multi-version Execution for the Dynamic Updating of Cloud Applications}, booktitle = {39th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2015, Taichung, Taiwan, July 1-5, 2015. Volume 2}, pages = {185--190}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/COMPSAC.2015.130}, doi = {10.1109/COMPSAC.2015.130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ChenQJZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conielecomp/ShiZQLJ15, author = {Yushuai Shi and Deqing Zou and Weizhong Qiang and Xiaofei Liao and Hai Jin}, title = {CloudTB: {A} quick and reliable testbed for virtual machine based cloud computing systems}, booktitle = {25. International Conference on Electronics, Communications and Computers, {CONIELECOMP} 2015, Cholula, Puebla, Mexico, February 25-27, 2015}, pages = {40--47}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CONIELECOMP.2015.7086956}, doi = {10.1109/CONIELECOMP.2015.7086956}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/conielecomp/ShiZQLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/WuYCJGWZ15, author = {Song Wu and Chuxiong Yan and Haibao Chen and Hai Jin and Wei Guo and Zhen Wang and Deqing Zou}, title = {Evaluating Latency-Sensitive Applications: Performance Degradation in Datacenters with Restricted Power Budget}, booktitle = {44th International Conference on Parallel Processing, {ICPP} 2015, Beijing, China, September 1-4, 2015}, pages = {639--648}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICPP.2015.73}, doi = {10.1109/ICPP.2015.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpp/WuYCJGWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobserv/ZhaoZJTQD15, author = {Kao Zhao and Deqing Zou and Hai Jin and Zhangbiaoge Tian and Weizhong Qiang and Weiqi Dai}, editor = {Onur Altintas and Jia Zhang}, title = {Privacy Protection for Perceptual Applications on Smartphones}, booktitle = {2015 {IEEE} International Conference on Mobile Services, {MS} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {174--181}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MobServ.2015.33}, doi = {10.1109/MOBSERV.2015.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobserv/ZhaoZJTQD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WangYLJZD15, author = {Daibin Wang and Haixia Yao and Yingjiu Li and Hai Jin and Deqing Zou and Robert H. Deng}, title = {{CICC:} a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers}, booktitle = {Proceedings of the 8th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, New York, NY, USA, June 22-26, 2015}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2766498.2766518}, doi = {10.1145/2766498.2766518}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WangYLJZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/IbrahimJYZX14, author = {Ayad Ibrahim and Hai Jin and Ali A. Yassin and Deqing Zou and Peng Xu}, title = {Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing}, journal = {Comput. J.}, volume = {57}, number = {2}, pages = {241--254}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt045}, doi = {10.1093/COMJNL/BXT045}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/IbrahimJYZX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HeZZCJJ14, author = {Ligang He and Deqing Zou and Zhang Zhang and Chao Chen and Hai Jin and Stephen A. Jarvis}, title = {Developing resource consolidation frameworks for moldable virtual machines in clouds}, journal = {Future Gener. Comput. Syst.}, volume = {32}, pages = {69--81}, year = {2014}, url = {https://doi.org/10.1016/j.future.2012.05.015}, doi = {10.1016/J.FUTURE.2012.05.015}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HeZZCJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZouZJJC14, author = {Deqing Zou and Weide Zheng and Wenbin Jiang and Hai Jin and Gang Chen}, title = {Memshepherd: comprehensive memory bug fault-tolerance system}, journal = {Secur. Commun. Networks}, volume = {7}, number = {9}, pages = {1412--1419}, year = {2014}, url = {https://doi.org/10.1002/sec.849}, doi = {10.1002/SEC.849}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZouZJJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YuanQJZ14, author = {Jinfeng Yuan and Weizhong Qiang and Hai Jin and Deqing Zou}, title = {CloudTaint: an elastic taint tracking framework for malware detection in the cloud}, journal = {J. Supercomput.}, volume = {70}, number = {3}, pages = {1433--1450}, year = {2014}, url = {https://doi.org/10.1007/s11227-014-1235-5}, doi = {10.1007/S11227-014-1235-5}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/YuanQJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c3s2e/WangJZQ14, author = {Fengwei Wang and Hai Jin and Deqing Zou and Weizhong Qiang}, editor = {Bipin C. Desai}, title = {FDKeeper: {A} Quick and Open Failure Detector for Cloud Computing System}, booktitle = {International C* Conference on Computer Science {\&} Software Engineering, {C3S2E} '14, Montreal, QC, Canada - August 03 - 05, 2014}, pages = {14:1--14:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2641483.2641539}, doi = {10.1145/2641483.2641539}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/c3s2e/WangJZQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hucc/ZouWJ14, author = {Deqing Zou and Hao Wang and Hai Jin}, editor = {Qiaohong Zu and Bo Hu and Ning Gu and Sopheap Seng}, title = {StrongUpdate: An Immediate Dynamic Software Update System for Multi-threaded Applications}, booktitle = {Human Centered Computing - First International Conference, {HCC} 2014, Phnom Penh, Cambodia, November 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8944}, pages = {365--379}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15554-8\_30}, doi = {10.1007/978-3-319-15554-8\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/hucc/ZouWJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/ZouQJQHC14, author = {Deqing Zou and Hao Qin and Hai Jin and Weizhong Qiang and Zongfen Han and Xueguang Chen}, editor = {Ching{-}Hsien Hsu and Xuanhua Shi and Valentina Salapura}, title = {Improving Log-Based Fault Diagnosis by Log Classification}, booktitle = {Network and Parallel Computing - 11th {IFIP} {WG} 10.3 International Conference, {NPC} 2014, Ilan, Taiwan, September 18-20, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8707}, pages = {446--458}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44917-2\_37}, doi = {10.1007/978-3-662-44917-2\_37}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/npc/ZouQJQHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoJZD14, author = {Kao Zhao and Hai Jin and Deqing Zou and Weiqi Dai}, title = {ONHelp: Components in Building Secure Cloud Based on OpenNebula}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {320--327}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.43}, doi = {10.1109/TRUSTCOM.2014.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoJZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/AbbdalJZY14, author = {Salah H. Abbdal and Hai Jin and Deqing Zou and Ali A. Yassen}, title = {Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage}, booktitle = {2014 {IEEE} 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 {IEEE} 11th Intl Conf on Autonomic and Trusted Computing and 2014 {IEEE} 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014}, pages = {510--517}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/UIC-ATC-ScalCom.2014.17}, doi = {10.1109/UIC-ATC-SCALCOM.2014.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/AbbdalJZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/JinCZZ13, author = {Hai Jin and Ge Cheng and Deqing Zou and Xinwen Zhang}, title = {Cherub: Fine-grained application protection with on-demand virtualization}, journal = {Comput. Math. Appl.}, volume = {65}, number = {9}, pages = {1326--1338}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2012.02.001}, doi = {10.1016/J.CAMWA.2012.02.001}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/JinCZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZouZQXYJH13, author = {Deqing Zou and Wenrong Zhang and Weizhong Qiang and Guofu Xiang and Laurence Tianruo Yang and Hai Jin and Kan Hu}, title = {Design and implementation of a trusted monitoring framework for cloud platforms}, journal = {Future Gener. Comput. Syst.}, volume = {29}, number = {8}, pages = {2092--2102}, year = {2013}, url = {https://doi.org/10.1016/j.future.2012.12.020}, doi = {10.1016/J.FUTURE.2012.12.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ZouZQXYJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/QiangZWYJS13, author = {Weizhong Qiang and Deqing Zou and Shenglan Wang and Laurence Tianruo Yang and Hai Jin and Lei Shi}, title = {CloudAC: a cloud-oriented multilayer access control system for logic virtual domain}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {51--59}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0094}, doi = {10.1049/IET-IFS.2012.0094}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/QiangZWYJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/FuLZQHP13, author = {Cai Fu and Min Li and Deqing Zou and Shuyan Qu and Lansheng Han and James Hyuk Park}, title = {Community Vitality in Dynamic Temporal Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/281565}, doi = {10.1155/2013/281565}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/FuLZQHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenJZZLZS13, author = {Gang Chen and Hai Jin and Deqing Zou and Bing Bing Zhou and Zhenkai Liang and Weide Zheng and Xuanhua Shi}, title = {SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {6}, pages = {368--379}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.25}, doi = {10.1109/TDSC.2013.25}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenJZZLZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/JinXZWZLZ13, author = {Hai Jin and Guofu Xiang and Deqing Zou and Song Wu and Feng Zhao and Min Li and Weide Zheng}, title = {A VMM-based intrusion prevention system in cloud computing environment}, journal = {J. Supercomput.}, volume = {66}, number = {3}, pages = {1133--1151}, year = {2013}, url = {https://doi.org/10.1007/s11227-011-0608-2}, doi = {10.1007/S11227-011-0608-2}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/JinXZWZLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/QiangKZY12, author = {Weizhong Qiang and Aleksandr Konstantinov and Deqing Zou and Laurence Tianruo Yang}, title = {A standards-based interoperable single sign-on framework in {ARC} Grid middleware}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {3}, pages = {892--904}, year = {2012}, url = {https://doi.org/10.1016/j.jnca.2011.03.006}, doi = {10.1016/J.JNCA.2011.03.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/QiangKZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/HanFZLJ12, author = {Lansheng Han and Cai Fu and Deqing Zou and Changhoon Lee and Wenjing Jia}, title = {Task-based behavior detection of illegal codes}, journal = {Math. Comput. Model.}, volume = {55}, number = {1-2}, pages = {80--86}, year = {2012}, url = {https://doi.org/10.1016/j.mcm.2011.01.052}, doi = {10.1016/J.MCM.2011.01.052}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/HanFZLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoLQJZZ12, author = {Feng Zhao and Min Li and Weizhong Qiang and Hai Jin and Deqing Zou and Qin Zhang}, title = {Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas}, journal = {Secur. Commun. Networks}, volume = {5}, number = {10}, pages = {1169--1180}, year = {2012}, url = {https://doi.org/10.1002/sec.423}, doi = {10.1002/SEC.423}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoLQJZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/KongLZZ12, author = {Huafeng Kong and YunTing Lei and Zhang Zhang and Deqing Zou}, title = {A Cloud Computing Management System Platform Based on Power-Sensitive Resource}, booktitle = {2012 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2012, Guilin, China, December 6-8, 2012}, pages = {3--7}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/APSCC.2012.33}, doi = {10.1109/APSCC.2012.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/KongLZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/IbrahimJYZ12, author = {Ayad Ibrahim and Hai Jin and Ali A. Yassin and Deqing Zou}, title = {Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data}, booktitle = {2012 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2012, Guilin, China, December 6-8, 2012}, pages = {263--270}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/APSCC.2012.59}, doi = {10.1109/APSCC.2012.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/IbrahimJYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/IbrahimJYZ12, author = {Ayad Ibrahim and Hai Jin and Ali A. Yassin and Deqing Zou}, editor = {Jianxun Liu and Jinjun Chen and Guandong Xu}, title = {Towards Privacy Preserving Mining over Distributed Cloud Databases}, booktitle = {2012 Second International Conference on Cloud and Green Computing, {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012}, pages = {130--136}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CGC.2012.86}, doi = {10.1109/CGC.2012.86}, timestamp = {Wed, 07 Aug 2024 10:36:47 +0200}, biburl = {https://dblp.org/rec/conf/cgc/IbrahimJYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/YassinJIZ12, author = {Ali A. Yassin and Hai Jin and Ayad Ibrahim and Deqing Zou}, editor = {Jianxun Liu and Jinjun Chen and Guandong Xu}, title = {Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing}, booktitle = {2012 Second International Conference on Cloud and Green Computing, {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012}, pages = {282--289}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CGC.2012.91}, doi = {10.1109/CGC.2012.91}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cgc/YassinJIZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/IbrahimJYZ12, author = {Ayad Ibrahim and Hai Jin and Ali A. Yassin and Deqing Zou}, title = {Approximate Keyword-based Search over Encrypted Cloud Data}, booktitle = {Ninth {IEEE} International Conference on e-Business Engineering, {ICEBE} 2012, Hangzhou, China, September 9-11, 2012}, pages = {238--245}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICEBE.2012.46}, doi = {10.1109/ICEBE.2012.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/IbrahimJYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/XiangJZ12, author = {Guofu Xiang and Hai Jin and Deqing Zou}, editor = {Younghan Kim and Cheeha Kim and Panjai Tantatsanawong}, title = {A comprehensive monitoring framework for virtual computing environment}, booktitle = {2012 International Conference on Information Networking, {ICOIN} 2012, Bali, Indonesia, February 1-3, 2012}, pages = {551--556}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICOIN.2012.6164438}, doi = {10.1109/ICOIN.2012.6164438}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/XiangJZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/YassinJIQZ12, author = {Ali A. Yassin and Hai Jin and Ayad Ibrahim and Weizhong Qiang and Deqing Zou}, title = {A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing}, booktitle = {26th {IEEE} International Parallel and Distributed Processing Symposium Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25, 2012}, pages = {1210--1217}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IPDPSW.2012.148}, doi = {10.1109/IPDPSW.2012.148}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/YassinJIQZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wism/YassinJIZ12, author = {Ali A. Yassin and Hai Jin and Ayad Ibrahim and Deqing Zou}, editor = {Fu Lee Wang and Jingsheng Lei and Zhiguo Gong and Xiangfeng Luo}, title = {Encrypted Remote User Authentication Scheme by Using Smart Card}, booktitle = {Web Information Systems and Mining - International Conference, {WISM} 2012, Chengdu, China, October 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7529}, pages = {314--323}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33469-6\_42}, doi = {10.1007/978-3-642-33469-6\_42}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wism/YassinJIZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itcs2/2012, editor = {James Jong Hyuk Park and Jongsung Kim and Deqing Zou and Yang Sun Lee}, title = {Information Technology Convergence, Secure and Trust Computing, and Data Management - {ITCS} 2012 {\&} {STA} 2012, Gwangju, Korea, September 6-8, 2012}, series = {Lecture Notes in Electrical Engineering}, volume = {180}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-5083-8}, doi = {10.1007/978-94-007-5083-8}, isbn = {978-94-007-5082-1}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcs2/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ZouDZJ11, author = {Deqing Zou and Shangxin Du and Weide Zheng and Hai Jin}, title = {Building Automated Trust Negotiation architecture in virtual computing environment}, journal = {J. Supercomput.}, volume = {55}, number = {1}, pages = {69--85}, year = {2011}, url = {https://doi.org/10.1007/s11227-009-0358-6}, doi = {10.1007/S11227-009-0358-6}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ZouDZJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/HeDCZHFJ11, author = {Ligang He and Kewei Duan and Xueguang Chen and Deqing Zou and Zongfen Han and Ali Fadavinia and Stephen A. Jarvis}, editor = {Hans{-}Arno Jacobsen and Yan Wang and Patrick Hung}, title = {Modelling Workflow Executions under Role-Based Authorisation Control}, booktitle = {{IEEE} International Conference on Services Computing, {SCC} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {200--208}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SCC.2011.56}, doi = {10.1109/SCC.2011.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/HeDCZHFJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinagrid/TraoreJZQX11, author = {Moussa Djiriba Traore and Hai Jin and Deqing Zou and Weizhong Qiang and Guofu Xiang}, title = {RAPn: Network Attack Prediction Using Ranking Access Petri Net}, booktitle = {Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, China, Aug. 22-23, 2011}, pages = {108--115}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ChinaGrid.2011.22}, doi = {10.1109/CHINAGRID.2011.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chinagrid/TraoreJZQX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grid/HeZZYJJ11, author = {Ligang He and Deqing Zou and Zhang Zhang and Kai Yang and Hai Jin and Stephen A. Jarvis}, editor = {Shantenu Jha and Nils gentschen Felde and Rajkumar Buyya and Gilles Fedak}, title = {Optimizing Resource Consumptions in Clouds}, booktitle = {12th {IEEE/ACM} International Conference on Grid Computing, {GRID} 2011, Lyon, France, September 21-23, 2011}, pages = {42--49}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/Grid.2011.15}, doi = {10.1109/GRID.2011.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/grid/HeZZYJJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/JinXZZLY10, author = {Hai Jin and Guofu Xiang and Deqing Zou and Feng Zhao and Min Li and Chen Yu}, title = {A guest-transparent file integrity monitoring method in virtualization environment}, journal = {Comput. Math. Appl.}, volume = {60}, number = {2}, pages = {256--266}, year = {2010}, url = {https://doi.org/10.1016/j.camwa.2010.01.007}, doi = {10.1016/J.CAMWA.2010.01.007}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/JinXZZLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChengJZZ10, author = {Ge Cheng and Hai Jin and Deqing Zou and Xinwen Zhang}, title = {Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {22}, number = {13}, pages = {1893--1910}, year = {2010}, url = {https://doi.org/10.1002/cpe.1614}, doi = {10.1002/CPE.1614}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChengJZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZouZLJC10, author = {Deqing Zou and Weide Zheng and Jinjiu Long and Hai Jin and Xueguang Chen}, title = {Constructing trusted virtual execution environment in {P2P} grids}, journal = {Future Gener. Comput. Syst.}, volume = {26}, number = {5}, pages = {769--775}, year = {2010}, url = {https://doi.org/10.1016/j.future.2009.05.020}, doi = {10.1016/J.FUTURE.2009.05.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ZouZLJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jim/ParkZKLC10, author = {Jong Hyuk Park and Deqing Zou and Tai{-}Hoon Kim and Javier L{\'{o}}pez and Hangbae Chang}, title = {Editorial}, journal = {J. Intell. Manuf.}, volume = {21}, number = {5}, pages = {593--594}, year = {2010}, url = {https://doi.org/10.1007/s10845-009-0263-0}, doi = {10.1007/S10845-009-0263-0}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jim/ParkZKLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaiJZXZS10, author = {Weiqi Dai and Hai Jin and Deqing Zou and Shouhuai Xu and Weide Zheng and Lei Shi}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {{TEE:} a virtual {DRTM} based execution environment for secure cloud-end computing}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {663--665}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866390}, doi = {10.1145/1866307.1866390}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DaiJZXZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cluster/ChenJZZQH10, author = {Gang Chen and Hai Jin and Deqing Zou and Bing Bing Zhou and Weizhong Qiang and Gang Hu}, title = {SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment}, booktitle = {Proceedings of the 2010 {IEEE} International Conference on Cluster Computing, Heraklion, Crete, Greece, 20-24 September, 2010}, pages = {97--106}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CLUSTER.2010.18}, doi = {10.1109/CLUSTER.2010.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cluster/ChenJZZQH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/XiangJZZWZ10, author = {Guofu Xiang and Hai Jin and Deqing Zou and Xinwen Zhang and Sha Wen and Feng Zhao}, title = {VMDriver: {A} Driver-Based Monitoring Mechanism for Virtualization}, booktitle = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010), New Delhi, Punjab, India, October 31 - November 3, 2010}, pages = {72--81}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SRDS.2010.38}, doi = {10.1109/SRDS.2010.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/XiangJZZWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/OhoussouJZZXC10, author = {Alex K. Ohoussou and Hai Jin and Deqing Zou and Feng Zhao and Guofu Xiang and Ge Cheng}, title = {Autonomous agent based intrusion detection in virtual computing environment}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {682--686}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541866}, doi = {10.1109/WCINS.2010.5541866}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/OhoussouJZZXC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZouPKC09, author = {Deqing Zou and Jong Hyuk Park and Tai{-}Hoon Kim and Xueguang Chen}, title = {{SH-CRBAC:} Integrating Attribute and Status Constraints into the {RBAC} Model in Smart Home Systems}, journal = {Comput. J.}, volume = {52}, number = {8}, pages = {861--870}, year = {2009}, url = {https://doi.org/10.1093/comjnl/bxn046}, doi = {10.1093/COMJNL/BXN046}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZouPKC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZouHJC09, author = {Deqing Zou and Ligang He and Hai Jin and Xueguang Chen}, title = {{CRBAC:} Imposing multi-grained constraints on the {RBAC} model in the multi-application environment}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {402--411}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.015}, doi = {10.1016/J.JNCA.2008.02.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZouHJC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/ZouLJ09, author = {Deqing Zou and Jinjiu Long and Hai Jin}, editor = {Anupam Datta}, title = {Trusted Deployment of Virtual Execution Environment in Grid Systems}, booktitle = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, pages = {124--136}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4\_10}, doi = {10.1007/978-3-642-10622-4\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/ZouLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grid/ChengJZZLYX09, author = {Ge Cheng and Hai Jin and Deqing Zou and Xinwen Zhang and Min Li and Chen Yu and Guofu Xiang}, title = {Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure}, booktitle = {Proceedings of the 2009 10th {IEEE/ACM} International Conference on Grid Computing, October 13-15, 2009, Banff, Alberta, Canada}, pages = {113--119}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/GRID.2009.5353079}, doi = {10.1109/GRID.2009.5353079}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/grid/ChengJZZLYX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ZouSJ09, author = {Deqing Zou and Lei Shi and Hai Jin}, title = {{DVM-MAC:} {A} Mandatory Access Control System in Distributed Virtual Computing Environment}, booktitle = {15th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2009, Shenzhen, China, December 8-11, 2009}, pages = {556--563}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICPADS.2009.128}, doi = {10.1109/ICPADS.2009.128}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpads/ZouSJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/JinXZZLS09, author = {Hai Jin and Guofu Xiang and Feng Zhao and Deqing Zou and Min Li and Lei Shi}, editor = {Won Kim and Hyung{-}Jin Choi and Dongho Won}, title = {VMFence: a customized intrusion prevention system in distributed virtual computing environment}, booktitle = {Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2009, Suwon, Korea, January 15-16, 2009}, pages = {391--399}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1516241.1516310}, doi = {10.1145/1516241.1516310}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/JinXZZLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/svm2/Cheng0ZSO09, author = {Ge Cheng and Hai Jin and Deqing Zou and Lei Shi and Alex K. Ohoussou}, editor = {Latifa Boursas and Mark Carlson and Hai Jin and Michelle Sibilla and Kes Wold}, title = {{CFCC:} {A} Covert Flows Confinement Mechanism for Virtual Machine Coalitions}, booktitle = {Systems and Virtualization Management. Standards and the Cloud - Third International {DMTF} Academic Alliance Workshop, {SVM} 2009, Wuhan, China, September 22-23, 2009. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {71}, pages = {43--54}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14944-3\_6}, doi = {10.1007/978-3-642-14944-3\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/svm2/Cheng0ZSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/ZouJPCL08, author = {Deqing Zou and Hai Jin and Jong Hyuk Park and Han{-}Chieh Chao and Yunfa Li}, title = {Trusted virtual machine monitor-based group signature architecture}, journal = {{IET} Commun.}, volume = {2}, number = {10}, pages = {1311--1319}, year = {2008}, url = {https://doi.org/10.1049/iet-com:20080010}, doi = {10.1049/IET-COM:20080010}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-com/ZouJPCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/HongWWCZ08, author = {Liu Hong and Hu Wan and Yu Wang and Xueguang Chen and Deqing Zou}, title = {Extending {HLA/RTI} to {WAN} Based on Grid Service}, booktitle = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008}, pages = {57--62}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/APSCC.2008.91}, doi = {10.1109/APSCC.2008.91}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apscc/HongWWCZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/ZouLWQ08, author = {Deqing Zou and Yunfa Li and Song Wu and Weizhong Qiang}, editor = {Chunming Rong and Martin Gilje Jaatun and Frode Eika Sandnes and Laurence Tianruo Yang and Jianhua Ma}, title = {A Trusted Group Signature Architecture in Virtual Computing Environment}, booktitle = {Autonomic and Trusted Computing, 5th International Conference, {ATC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5060}, pages = {73--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69295-9\_8}, doi = {10.1007/978-3-540-69295-9\_8}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/ZouLWQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/WuWJZ08, author = {Song Wu and Kai Wang and Hai Jin and Deqing Zou}, title = {Heterogeneous Grid Workflow Management Based on Virtual Service}, booktitle = {Seventh International Conference on Grid and Cooperative Computing, {GCC} 2008, Shenzhen, China, October 24-26, 2008}, pages = {483--489}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/GCC.2008.60}, doi = {10.1109/GCC.2008.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcc/WuWJZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/ChengJZOZ08, author = {Ge Cheng and Hai Jin and Deqing Zou and Alex K. Ohoussou and Feng Zhao}, title = {A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {1481--1487}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.534}, doi = {10.1109/ICYCS.2008.534}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/ChengJZOZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ZouPYLK08, author = {Deqing Zou and Jong Hyuk Park and Laurence Tianruo Yang and Zhensong Liao and Tai{-}Hoon Kim}, editor = {Frode Eika Sandnes and Yan Zhang and Chunming Rong and Laurence Tianruo Yang and Jianhua Ma}, title = {A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment}, booktitle = {Ubiquitous Intelligence and Computing, 5th International Conference, {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5061}, pages = {35--45}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69293-5\_5}, doi = {10.1007/978-3-540-69293-5\_5}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/ZouPYLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiaoJZQ07, author = {Zhensong Liao and Hai Jin and Deqing Zou and Weizhong Qiang}, title = {A Novel Approach to Hide Credentials}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {306--311}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p306-311.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiaoJZQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ZouYQCH07, author = {Deqing Zou and Laurence Tianruo Yang and Weizhong Qiang and Xueguang Chen and Zongfen Han}, title = {An Authentication and Access Control Framework for Group Communication Systems in Grid Environment}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), May 21-23, 2007, Niagara Falls, Canada}, pages = {547--554}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINA.2007.33}, doi = {10.1109/AINA.2007.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ZouYQCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/LiJZCH07, author = {Yunfa Li and Hai Jin and Deqing Zou and Jieyun Chen and Zongfen Han}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {42--51}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_7}, doi = {10.1007/978-3-540-73547-2\_7}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/LiJZCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiaoJZL07, author = {Zhensong Liao and Hai Jin and Deqing Zou and Chisong Li}, title = {An {EMAIL} Based Automated Trust Negotiation Model}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {789--793}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.121}, doi = {10.1109/CIS.2007.121}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiaoJZL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/LiJZCH07, author = {Yunfa Li and Hai Jin and Deqing Zou and Jieyun Chen and Zongfen Han}, title = {A Scalable Service Scheme for Secure Group Communication in Grid}, booktitle = {31st Annual International Computer Software and Applications Conference, {COMPSAC} 2007, Beijing, China, July 24-27, 2007. Volume 1}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/COMPSAC.2007.38}, doi = {10.1109/COMPSAC.2007.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/LiJZCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/ZouPKC07, author = {Deqing Zou and Jong Hyuk Park and Tai{-}Hoon Kim and Xueguang Chen}, title = {Integrating Attribute and Status Constraint into the {RBAC} Model for Access Control in Ubiquitous Systems}, booktitle = {Future Generation Communication and Networking, {FGCN} 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings}, pages = {71--75}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FGCN.2007.152}, doi = {10.1109/FGCN.2007.152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/ZouPKC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/ZouJCH07, author = {Deqing Zou and Hai Jin and Xueguang Chen and Zongfen Han}, title = {Grid Security Interoperation between {CGSP} and {VEGA}}, booktitle = {Future Generation Communication and Networking, {FGCN} 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings}, pages = {510--515}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FGCN.2007.142}, doi = {10.1109/FGCN.2007.142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/ZouJCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/LiaoJZ07, author = {Zhensong Liao and Hai Jin and Deqing Zou}, editor = {Shing{-}Chi Cheung and Yinsheng Li and Kuo{-}Ming Chao and Muhammad Younas and Jen{-}Yao Chung}, title = {A Hidden Credential Based Oblivious Automated Trust Negotiation Model}, booktitle = {Proceedings of {ICEBE} 2007, {IEEE} International Conference on e-Business Engineering and the Workshops {SOAIC} 2007, {SOSE} 2007, {SOKM} 2007, 24-26 October, 2007, Hong Kong, China}, pages = {247--253}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICEBE.2007.59}, doi = {10.1109/ICEBE.2007.59}, timestamp = {Fri, 02 Aug 2024 10:57:36 +0200}, biburl = {https://dblp.org/rec/conf/icebe/LiaoJZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/ParkZ07, author = {Jong Hyuk Park and Deqing Zou}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {Service, Security and Its Data Management for Ubiquitous Computing - Overview}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {500--501}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_50}, doi = {10.1007/978-3-540-77018-3\_50}, timestamp = {Mon, 19 Aug 2024 08:30:10 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/ParkZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pakdd/2007w, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3}, doi = {10.1007/978-3-540-77018-3}, isbn = {978-3-540-77016-9}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/2007w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/JinSQZ06, author = {Hai Jin and Xuanhua Shi and Weizhong Qiang and Deqing Zou}, title = {{DRIC:} Dependable Grid Computing Framework}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {89-D}, number = {2}, pages = {612--623}, year = {2006}, url = {https://doi.org/10.1093/ietisy/e89-d.2.612}, doi = {10.1093/IETISY/E89-D.2.612}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/JinSQZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcrd/LiZHQ06, author = {Yunfa Li and Deqing Zou and Zongfen Han and Weizhong Qiang}, title = {Research on Group Signature Scheme with Forward Security}, journal = {J. Comput. Res. Dev.}, volume = {43}, number = {12}, pages = {2069--2075}, year = {2006}, url = {http://WWW.CQVIP.COM/QK/94913X/200612/23426043.html}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcrd/LiZHQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/YanQSCZZ06, author = {Fei Yan and Weizhong Qiang and Zhi{-}Dong Shen and Chunrun Chen and Huanguo Zhang and Deqing Zou}, editor = {Laurence Tianruo Yang and Hai Jin and Jianhua Ma and Theo Ungerer}, title = {Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology}, booktitle = {Autonomic and Trusted Computing, Third International Conference, {ATC} 2006, Wuhan, China, September 3-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4158}, pages = {227--235}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11839569\_22}, doi = {10.1007/11839569\_22}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/YanQSCZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/JinXWZ06, author = {Hai Jin and Muzhou Xiong and Song Wu and Deqing Zou}, editor = {Vassil N. Alexandrov and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Replica Based Distributed Metadata Management in Grid Environment}, booktitle = {Computational Science - {ICCS} 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3994}, pages = {1055--1062}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11758549\_140}, doi = {10.1007/11758549\_140}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/JinXWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JinLZQ06, author = {Hai Jin and Zhensong Liao and Deqing Zou and Weizhong Qiang}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {A New Approach to Hide Policy for Automated Trust Negotiation}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {168--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_12}, doi = {10.1007/11908739\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JinLZQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/JinSQZ05, author = {Hai Jin and Xuanhua Shi and Weizhong Qiang and Deqing Zou}, title = {An adaptive meta-scheduler for data-intensive applications}, journal = {Int. J. Grid Util. Comput.}, volume = {1}, number = {1}, pages = {32--37}, year = {2005}, url = {https://doi.org/10.1504/IJGUC.2005.007058}, doi = {10.1504/IJGUC.2005.007058}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/JinSQZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/JinQSZ05, author = {Hai Jin and Weizhong Qiang and Xuanhua Shi and Deqing Zou}, title = {{RB-GACA:} an {RBAC} based grid access control architecture}, journal = {Int. J. Grid Util. Comput.}, volume = {1}, number = {1}, pages = {61--70}, year = {2005}, url = {https://doi.org/10.1504/IJGUC.2005.007061}, doi = {10.1504/IJGUC.2005.007061}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/JinQSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwgs/ZouJMHT05, author = {Deqing Zou and Hai Jin and Feng Mao and Zongfen Han and Xuping Tu}, title = {Service organisation and information consistency for service grid}, journal = {Int. J. Web Grid Serv.}, volume = {1}, number = {1}, pages = {69--86}, year = {2005}, url = {https://doi.org/10.1504/IJWGS.2005.007550}, doi = {10.1504/IJWGS.2005.007550}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwgs/ZouJMHT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/QiangJSZ05, author = {Weizhong Qiang and Hai Jin and Xuanhua Shi and Deqing Zou}, title = {Joint Management of Authorization for Dynamic Virtual Organization}, booktitle = {Fifth International Conference on Computer and Information Technology {(CIT} 2005), 21-23 September 2005, Shanghai, China}, pages = {375--381}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CIT.2005.134}, doi = {10.1109/CIT.2005.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/QiangJSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/ShiJHQWZ05, author = {Xuanhua Shi and Hai Jin and Zongfen Han and Weizhong Qiang and Song Wu and Deqing Zou}, title = {{ALTER:} Adaptive Failure Detection Services for Grids}, booktitle = {2005 {IEEE} International Conference on Services Computing {(SCC} 2005), 11-15 July 2005, Orlando, FL, {USA}}, pages = {355--358}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SCC.2005.23}, doi = {10.1109/SCC.2005.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/ShiJHQWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JinQSZ05, author = {Hai Jin and Weizhong Qiang and Xuanhua Shi and Deqing Zou}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {VO-Sec: An Access Control Framework for Dynamic Virtual Organization}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {370--381}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_31}, doi = {10.1007/11506157\_31}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JinQSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/MaoJZCQ05, author = {Feng Mao and Hai Jin and Deqing Zou and Baoli Chen and Li Qi}, title = {QoS Oriented Dynamic Replica Cost Model for {P2P} Computing}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {822--828}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.117}, doi = {10.1109/ICDCSW.2005.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/MaoJZCQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/ZouQS05, author = {Deqing Zou and Weizhong Qiang and Xuanhua Shi}, title = {A Formal General Framework and Service Access Model for Service Grid}, booktitle = {10th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2005), 16-20 June 2005, Shanghai, China}, pages = {349--356}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICECCS.2005.9}, doi = {10.1109/ICECCS.2005.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/ZouQS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/LiJHXZW05, author = {Yunfa Li and Hai Jin and Zongfen Han and Chao Xie and Deqing Zou and Hao Wu}, title = {Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains}, booktitle = {19th International Parallel and Distributed Processing Symposium {(IPDPS} 2005), {CD-ROM} / Abstracts Proceedings, 4-8 April 2005, Denver, CO, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IPDPS.2005.84}, doi = {10.1109/IPDPS.2005.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/LiJHXZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/JinQSZ05, author = {Hai Jin and Weizhong Qiang and Xuanhua Shi and Deqing Zou}, editor = {Pinar Yolum and Tunga G{\"{u}}ng{\"{o}}r and Fikret S. G{\"{u}}rgen and Can C. {\"{O}}zturan}, title = {A Novel Authorization Mechanism for Service-Oriented Virtual Organization}, booktitle = {Computer and Information Sciences - {ISCIS} 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3733}, pages = {382--391}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11569596\_41}, doi = {10.1007/11569596\_41}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iscis/JinQSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/JinYWQZ05, author = {Hai Jin and Chuanjiang Yi and Song Wu and Li Qi and Deqing Zou}, editor = {Guihai Chen and Yi Pan and Minyi Guo and Jian Lu}, title = {Uniform Authorization Management in ChinaGrid Support Platform}, booktitle = {Parallel and Distributed Processing and Applications - {ISPA} 2005 Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3759}, pages = {223--231}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576259\_25}, doi = {10.1007/11576259\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispa/JinYWQZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/ChenJZTZY04, author = {Hanhua Chen and Hai Jin and Minghu Zhang and Pengliu Tan and Deqing Zou and Pingpeng Yuan}, editor = {Jeffrey Xu Yu and Xuemin Lin and Hongjun Lu and Yanchun Zhang}, title = {Early Experience in QoS-Based Service Grid Architecture}, booktitle = {Advanced Web Technologies and Applications, 6th Asia-Pacific Web Conference, APWeb 2004, Hangzhou, China, April 14-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3007}, pages = {924--927}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24655-8\_107}, doi = {10.1007/978-3-540-24655-8\_107}, timestamp = {Mon, 16 Mar 2020 17:44:09 +0100}, biburl = {https://dblp.org/rec/conf/apweb/ChenJZTZY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/JinCCKQZ04, author = {Hai Jin and Hanhua Chen and Jian Chen and Ping Kuang and Li Qi and Deqing Zou}, title = {Real-Time Strategy and Practice in Service Grid}, booktitle = {28th International Computer Software and Applications Conference {(COMPSAC} 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings}, pages = {161--166}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CMPSAC.2004.1342821}, doi = {10.1109/CMPSAC.2004.1342821}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/JinCCKQZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/QiangJSZ04, author = {Weizhong Qiang and Hai Jin and Xuanhua Shi and Deqing Zou}, editor = {Hai Jin and Yi Pan and Nong Xiao and Jianhua Sun}, title = {A Novel VO-Based Access Control Model for Grid}, booktitle = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3251}, pages = {293--300}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30208-7\_43}, doi = {10.1007/978-3-540-30208-7\_43}, timestamp = {Fri, 26 Feb 2021 08:55:11 +0100}, biburl = {https://dblp.org/rec/conf/gcc/QiangJSZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ShiJQZ04, author = {Xuanhua Shi and Hai Jin and Weizhong Qiang and Deqing Zou}, editor = {Hai Jin and Yi Pan and Nong Xiao and Jianhua Sun}, title = {Reliability Analysis for Grid Computing}, booktitle = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3251}, pages = {787--790}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30208-7\_105}, doi = {10.1007/978-3-540-30208-7\_105}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gcc/ShiJQZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/JinCZZ04, author = {Hai Jin and Hanhua Chen and Minghu Zhang and Deqing Zou}, editor = {Kim{-}Meow Liew and Hong Shen and Simon See and Wentong Cai and Pingzhi Fan and Susumu Horiguchi}, title = {RT-Grid: {A} QoS Oriented Service Grid Framework}, booktitle = {Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, {PDCAT} 2004, Singapore, December 8-10, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3320}, pages = {345--348}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30501-9\_73}, doi = {10.1007/978-3-540-30501-9\_73}, timestamp = {Fri, 12 Jun 2020 16:01:21 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/JinCZZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/HaiZCSW03, author = {Hai Jin and Deqing Zou and Hanhua Chen and Jianhua Sun and Song Wu}, title = {Fault-Tolerant Grid Architecture and Practice}, journal = {J. Comput. Sci. Technol.}, volume = {18}, number = {4}, pages = {423--433}, year = {2003}, url = {https://doi.org/10.1007/BF02948916}, doi = {10.1007/BF02948916}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/HaiZCSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/QiangJSZZ03, author = {Weizhong Qiang and Hai Jin and Xuanhua Shi and Deqing Zou and Hao Zhang}, editor = {Minglu Li and Xian{-}He Sun and Qianni Deng and Jun Ni}, title = {{RB-GACA:} {A} {RBAC} Based Grid Access Control Architecture}, booktitle = {Grid and Cooperative Computing, Second International Workshop, {GCC} 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3032}, pages = {487--494}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24679-4\_91}, doi = {10.1007/978-3-540-24679-4\_91}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcc/QiangJSZZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ZouJDQS03, author = {Deqing Zou and Hai Jin and Xingchang Dong and Weizhong Qiang and Xuanhua Shi}, editor = {Minglu Li and Xian{-}He Sun and Qianni Deng and Jun Ni}, title = {{HH-MDS:} {A} QoS-Aware Domain Divided Information Service}, booktitle = {Grid and Cooperative Computing, Second International Workshop, {GCC} 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3033}, pages = {573--580}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24680-0\_93}, doi = {10.1007/978-3-540-24680-0\_93}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/gcc/ZouJDQS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ShiJQZ03, author = {Xuanhua Shi and Hai Jin and Weizhong Qiang and Deqing Zou}, editor = {Minglu Li and Xian{-}He Sun and Qianni Deng and Jun Ni}, title = {An Adaptive Meta-scheduler for Data-Intensive Applications}, booktitle = {Grid and Cooperative Computing, Second International Workshop, {GCC} 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3033}, pages = {830--837}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24680-0\_132}, doi = {10.1007/978-3-540-24680-0\_132}, timestamp = {Thu, 24 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gcc/ShiJQZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideal/SunJCHZ03, author = {Jianhua Sun and Hai Jin and Hao Chen and Zongfen Han and Deqing Zou}, editor = {Jiming Liu and Yiu{-}ming Cheung and Hujun Yin}, title = {A Data Mining Based Intrusion Detection Model}, booktitle = {Intelligent Data Engineering and Automated Learning, 4th International Conference, {IDEAL} 2003, Hong Kong, China, March 21-23, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2690}, pages = {677--684}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45080-1\_91}, doi = {10.1007/978-3-540-45080-1\_91}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ideal/SunJCHZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.