Chenguang Shen

Orcid: 0000-0003-3364-6505

According to our database1, Chenguang Shen authored at least 13 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Consequences of asymmetric mutational pressure for the dynamic of linear B-cell epitopes repertoire of influenza a virus neuraminidase rearrangement.
Biosyst., September, 2023

2018
MiLift: Efficient Smartwatch-Based Workout Tracking Using Automatic Segmentation.
IEEE Trans. Mob. Comput., 2018

2017
Exploring Hardware Heterogeneity to Improve Pervasive Context Inferences.
Computer, 2017

2016
A Framework for Pervasive Context Awareness.
PhD thesis, 2016

Beam: Ending Monolithic Applications for Connected Devices.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

2015
It's Time to End Monolithic Apps for Connected Devices.
login Usenix Mag., 2015

A Case for Ending Monolithic Apps for Connected Devices.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Dynamic combination of authentication factors based on quantified risk and benefit.
Secur. Commun. Networks, 2014

ipShield: A Framework For Enforcing Context-Aware Privacy.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

Towards a rich sensing stack for IoT devices.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2014

2013
Exploiting processor heterogeneity for energy efficient context inference on mobile phones.
Proceedings of the Workshop on Power-Aware Computing and Systems, 2013

2012
MiDebug: microcontroller integrated development and debugging environment.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

2011
Poster: using quantified risk and benefit to strengthen the security of information sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...