


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 116 matches
- 2023
- Tongsheng Qiu
, Xianyi Wang, Yueqiang Sun, Fu Li, Zhuoyan Wang, Junming Xia, Qifei Du, Weihua Bai, Yuerong Cai, Dongwei Wang, Cheng Liu, Hao Qiao, Feixiong Huang
:
An Innovative Signal Processing Scheme for Spaceborne Integrated GNSS Remote Sensors. Remote. Sens. 15(3): 745 (2023) - Liang Liu
, Yanan Guo, Yueqiang Cheng
, Youtao Zhang
, Jun Yang:
Generating Robust DNN With Resistance to Bit-Flip Based Adversarial Weight Attack. IEEE Trans. Computers 72(2): 401-413 (2023) - Bowen Tang
, Chenggang Wu
, Zhe Wang
, Lichen Jia, Pen-Chung Yew
, Yueqiang Cheng
, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 827-840 (2023) - 2022
- Yueqiang Cheng, Zhi Zhang
, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei
, Surya Nepal
, Yang Xiang
:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022) - Shifeng Li
, Yan Cheng, Yunfeng Liu, Yuqiang Yang:
Fast Anomaly Detection Based on 3D Integral Images. Neural Process. Lett. 54(2): 1465-1479 (2022) - Haojie Shi
, Bo Zhou, Hongsheng Zeng, Fan Wang, Yueqiang Dong, Jiangyong Li, Kang Wang, Hao Tian, Max Q.-H. Meng
:
Reinforcement Learning With Evolutionary Trajectory Generator: A General Approach for Quadrupedal Locomotion. IEEE Robotics Autom. Lett. 7(2): 3085-3092 (2022) - Jialuo Li, Shichao Cheng, Yueqiang Tao, Huasheng Liu, Junzhe Zhou, Jianhai Zhang
:
Dual-Branch Discrimination Network Using Multiple Sparse Priors for Image Deblurring. Sensors 22(16): 6216 (2022) - Zhe Wang
, Chenggang Wu
, Yinqian Zhang
, Bowen Tang
, Pen-Chung Yew
, Mengyao Xie
, Yuanming Lai
, Yan Kang, Yueqiang Cheng
, Zhiping Shi
:
Making Information Hiding Effective Again. IEEE Trans. Dependable Secur. Comput. 19(4): 2576-2594 (2022) - Chunlin Xiong
, Tiantian Zhu
, Weihao Dong
, Linqi Ruan
, Runqing Yang
, Yueqiang Cheng
, Yan Chen, Shuai Cheng, Xutong Chen
:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. IEEE Trans. Dependable Secur. Comput. 19(1): 551-565 (2022) - Runqing Yang
, Xutong Chen
, Haitao Xu
, Yueqiang Cheng
, Chunlin Xiong
, Linqi Ruan
, Mohammad Kavousi, Zhenyuan Li
, Liheng Xu, Yan Chen
:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. IEEE Trans. Dependable Secur. Comput. 19(3): 1621-1638 (2022) - Yiru Zhao
, Xiaoke Wang
, Lei Zhao
, Yueqiang Cheng
, Heng Yin
:
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing. ACSAC 2022: 534-547 - Chengzhou Tang, Yuqiang Yang, Bing Zeng, Ping Tan, Shuaicheng Liu:
Learning to Zoom Inside Camera Imaging Pipeline. CVPR 2022: 17531-17540 - Yuqiang Wei, Chenggong Feng, Shunichi Ohmori, Arnat Watanasungsuit, Choosak Pornsing, Kawinthorn Saichareon:
An Application of Newsvendor Model on Pipe Stringing Operations of a Gas Pipeline Construction Project. ICCMB 2022: 180-184 - Tongsheng Qiu, Xianyi Wang, Zhuoyan Wang, Hao Qiao, Cheng Liu, Yuerong Cai, Qifei Du, Yueqiang Sun, Weihua Bai, Dongwei Wang, Chunjun Wu, Fu Li, Shuangshuang Cheng, Hao Zhang, Lulu Zhang:
The Recent Advance in GRSA. IGARSS 2022: 7651-7653 - Yuqiang Sun, Dunhan Li, Yixin Wu, Xuelin Wan, Cheng Huang:
WAIN: Automatic Web Application Identification and Naming Method. Internetware 2022: 37-44 - Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. USENIX Annual Technical Conference 2022: 399-414 - Zhi Zhang, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou:
A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM. CoRR abs/2201.02986 (2022) - 2021
- Weijun Yang
, Yu-Qiang Chen
, Yeh-Cheng Chen
, Ku-Ce Yeh:
Intelligent Agent-Based Predict System With Cloud Computing for Enterprise Service Platform in IoT Environment. IEEE Access 9: 11843-11871 (2021) - Cheng Chen, Jun Yang, Mian Lu, Taize Wang, Zhao Zheng, Yuqiang Chen, Wenyuan Dai, Bingsheng He, Weng-Fai Wong, Guoan Wu, Yuping Zhao, Andy Rudoff:
Optimizing An In-memory Database System For AI-powered On-line Decision Augmentation Using Persistent Memory. Proc. VLDB Endow. 14(5): 799-812 (2021) - Fangzheng Gao
, Chenglong Zhu
, Jiacai Huang, Yuqiang Wu:
Global Fixed-Time Output Feedback Stabilization of Perturbed Planar Nonlinear Systems. IEEE Trans. Circuits Syst. II Express Briefs 68(2): 707-711 (2021) - Yueqiang Cheng
, Zhi Zhang
, Surya Nepal
, Zhi Wang:
CATTmew: Defeating Software-Only Physical Kernel Isolation. IEEE Trans. Dependable Secur. Comput. 18(4): 1989-2004 (2021) - Zhi Zhang
, Yueqiang Cheng, Yansong Gao
, Surya Nepal
, Dongxi Liu, Yi Zou:
Detecting Hardware-Assisted Virtualization With Inconspicuous Features. IEEE Trans. Inf. Forensics Secur. 16: 16-27 (2021) - Zhi Zhang
, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao
, Minghua Wang
, Kang Li, Surya Nepal
, Yang Xiang
:
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. IEEE Trans. Inf. Forensics Secur. 16: 5167-5181 (2021) - Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization. ACSAC 2021: 609-619 - Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CCS 2021: 1237-1253 - Peiran Wang, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, Gang Long:
MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods. CSE 2021: 87-93 - Wei Huang, Shengjie Xu, Yueqiang Cheng, David Lie:
Aion Attacks: Manipulating Software Timers in Trusted Execution Environment. DIMVA 2021: 173-193 - Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. DIMVA 2021: 151-172 - Yanan Guo, Liang Liu, Yueqiang Cheng, Youtao Zhang, Jun Yang:
ModelShield: A Generic and Portable Framework Extension for Defending Bit-Flip based Adversarial Weight Attacks. ICCD 2021: 559-562 - Xinda Cheng, Yixing Chen, Jincai Zou, Yuqiang Zhang, Ning Hu:
An Anonymous Communication System Based on Software Defined Architecture. MobiSec 2021: 396-407
skipping 86 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-03-23 21:57 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint