Deqing Zou

According to our database1, Deqing Zou
  • authored at least 125 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Validating User Flows to Protect Software Defined Network Environments.
Security and Communication Networks, 2018

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
CoRR, 2018

SecSDN-Cloud: Defeating Vulnerable Attacks Through Secure Software-Defined Networks.
IEEE Access, 2018

2017
A dynamic predictive race detector for C/C++ programs.
The Journal of Supercomputing, 2017

A Secure, Usable, and Transparent Middleware for Permission Managers on Android.
IEEE Trans. Dependable Sec. Comput., 2017

Fully Reversible Privacy Region Protection for Cloud Video Surveillance.
IEEE Trans. Cloud Computing, 2017

Privacy preserving search over multiple servers.
IJAACS, 2017

Saudi cloud infrastructure: a security analysis.
SCIENCE CHINA Information Sciences, 2017

Virtualization of the Encryption Card for Trust Access in Cloud Computing.
IEEE Access, 2017

CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection.
IEEE Access, 2017

Patch-Related Vulnerability Detection Based on Symbolic Execution.
IEEE Access, 2017

Libsec: A Hardware Virtualization-Based Isolation for Shared Library.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Reducing LDPC Soft Sensing Latency by Lightweight Data Refresh for Flash Read Performance Improvement.
Proceedings of the 54th Annual Design Automation Conference, 2017

Fully Context-Sensitive CFI for COTS Binaries.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Framework for Practical Dynamic Software Updating.
IEEE Trans. Parallel Distrib. Syst., 2016

Lossless ROI Privacy Protection of H.264/AVC Compressed Surveillance Videos.
IEEE Trans. Emerging Topics Comput., 2016

CloudMon: Monitoring Virtual Machines in Clouds.
IEEE Trans. Computers, 2016

Privacy preserving in cloud computing environment.
Security and Communication Networks, 2016

Taming transitive permission attack via bytecode rewriting on Android application.
Security and Communication Networks, 2016

CDMCR: multi-level fault-tolerant system for distributed applications in cloud.
Security and Communication Networks, 2016

UiLog: Improving Log-Based Fault Diagnosis by Log Analysis.
J. Comput. Sci. Technol., 2016

Theory and methodology of research on cloud security.
SCIENCE CHINA Information Sciences, 2016

PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Image Retrieval in IoT-Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Robust scheme to protect authentication code of message/image documents in cloud computing.
Proceedings of the 2016 International Conference on Computing, 2016

Towards Secure Private Image Matching.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

VulPecker: an automated vulnerability detection system based on code similarity analysis.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A privacy-preserving location tracking system for smartphones based on cloud storage.
Security and Communication Networks, 2015

TEE: A virtual DRTM based execution environment for secure cloud-end computing.
Future Generation Comp. Syst., 2015

A lightweight software fault-tolerance system in the cloud environment.
Concurrency and Computation: Practice and Experience, 2015

CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Privacy Protection for Perceptual Applications on Smartphones.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Evaluating Latency-Sensitive Applications: Performance Degradation in Datacenters with Restricted Power Budget.
Proceedings of the 44th International Conference on Parallel Processing, 2015

CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems.
Proceedings of the 25. International Conference on Electronics, 2015

Multi-version Execution for the Dynamic Updating of Cloud Applications.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

UaaS: Software Update as a Service for the IaaS Cloud.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
CloudTaint: an elastic taint tracking framework for malware detection in the cloud.
The Journal of Supercomputing, 2014

Memshepherd: comprehensive memory bug fault-tolerance system.
Security and Communication Networks, 2014

Developing resource consolidation frameworks for moldable virtual machines in clouds.
Future Generation Comp. Syst., 2014

Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing.
Comput. J., 2014

Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

ONHelp: Components in Building Secure Cloud Based on OpenNebula.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Improving Log-Based Fault Diagnosis by Log Classification.
Proceedings of the Network and Parallel Computing, 2014

StrongUpdate: An Immediate Dynamic Software Update System for Multi-threaded Applications.
Proceedings of the Human Centered Computing - First International Conference, 2014

FDKeeper: A Quick and Open Failure Detector for Cloud Computing System.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014

2013
A VMM-based intrusion prevention system in cloud computing environment.
The Journal of Supercomputing, 2013

SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities.
IEEE Trans. Dependable Sec. Comput., 2013

Community Vitality in Dynamic Temporal Networks.
IJDSN, 2013

CloudAC: a cloud-oriented multilayer access control system for logic virtual domain.
IET Information Security, 2013

Design and implementation of a trusted monitoring framework for cloud platforms.
Future Generation Comp. Syst., 2013

Cherub: Fine-grained application protection with on-demand virtualization.
Computers & Mathematics with Applications, 2013

2012
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas.
Security and Communication Networks, 2012

Task-based behavior detection of illegal codes.
Mathematical and Computer Modelling, 2012

A standards-based interoperable single sign-on framework in ARC Grid middleware.
J. Network and Computer Applications, 2012

Encrypted Remote User Authentication Scheme by Using Smart Card.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A comprehensive monitoring framework for virtual computing environment.
Proceedings of the 2012 International Conference on Information Networking, 2012

Approximate Keyword-based Search over Encrypted Cloud Data.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Towards Privacy Preserving Mining over Distributed Cloud Databases.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

A Cloud Computing Management System Platform Based on Power-Sensitive Resource.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
Building Automated Trust Negotiation architecture in virtual computing environment.
The Journal of Supercomputing, 2011

Optimizing Resource Consumptions in Clouds.
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011

RAPn: Network Attack Prediction Using Ranking Access Petri Net.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011

Modelling Workflow Executions under Role-Based Authorisation Control.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Editorial.
J. Intelligent Manufacturing, 2010

Constructing trusted virtual execution environment in P2P grids.
Future Generation Comp. Syst., 2010

Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurrency and Computation: Practice and Experience, 2010

A guest-transparent file integrity monitoring method in virtualization environment.
Computers & Mathematics with Applications, 2010

Autonomous agent based intrusion detection in virtual computing environment.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

VMDriver: A Driver-Based Monitoring Mechanism for Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010

TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment.
J. Network and Computer Applications, 2009

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009

VMFence: a customized intrusion prevention system in distributed virtual computing environment.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

DVM-MAC: A Mandatory Access Control System in Distributed Virtual Computing Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

Trusted Deployment of Virtual Execution Environment in Grid Systems.
Proceedings of the Advances in Computer Science, 2009

2008
Trusted virtual machine monitor-based group signature architecture.
IET Communications, 2008

A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Heterogeneous Grid Workflow Management Based on Virtual Service.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

A Trusted Group Signature Architecture in Virtual Computing Environment.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Extending HLA/RTI to WAN Based on Grid Service.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A Novel Approach to Hide Credentials.
I. J. Network Security, 2007

Service, Security and Its Data Management for Ubiquitous Computing - Overview.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Hidden Credential Based Oblivious Automated Trust Negotiation Model.
Proceedings of ICEBE 2007, 2007

Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007

Grid Security Interoperation between CGSP and VEGA.
Proceedings of the Future Generation Communication and Networking, 2007

A Scalable Service Scheme for Secure Group Communication in Grid.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

An EMAIL Based Automated Trust Negotiation Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

An Authentication and Access Control Framework for Group Communication Systems in Grid Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Research on Group Signature Scheme with Forward Security.
Journal of Computer Research and Development, 2006

DRIC: Dependable Grid Computing Framework.
IEICE Transactions, 2006

A New Approach to Hide Policy for Automated Trust Negotiation.
Proceedings of the Advances in Information and Computer Security, 2006

Replica Based Distributed Metadata Management in Grid Environment.
Proceedings of the Computational Science, 2006

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Service organisation and information consistency for service grid.
IJWGS, 2005

An adaptive meta-scheduler for data-intensive applications.
IJGUC, 2005

RB-GACA: an RBAC based grid access control architecture.
IJGUC, 2005

Uniform Authorization Management in ChinaGrid Support Platform.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Novel Authorization Mechanism for Service-Oriented Virtual Organization.
Proceedings of the Computer and Information Sciences, 2005

Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Formal General Framework and Service Access Model for Service Grid.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

QoS Oriented Dynamic Replica Cost Model for P2P Computing.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

VO-Sec: An Access Control Framework for Dynamic Virtual Organization.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

ALTER: Adaptive Failure Detection Services for Grids.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

Joint Management of Authorization for Dynamic Virtual Organization.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
RT-Grid: A QoS Oriented Service Grid Framework.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Reliability Analysis for Grid Computing.
Proceedings of the Grid and Cooperative Computing, 2004

A Novel VO-Based Access Control Model for Grid.
Proceedings of the Grid and Cooperative Computing, 2004

Real-Time Strategy and Practice in Service Grid.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Early Experience in QoS-Based Service Grid Architecture.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Fault-Tolerant Grid Architecture and Practice.
J. Comput. Sci. Technol., 2003

A Data Mining Based Intrusion Detection Model.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

HH-MDS: A QoS-Aware Domain Divided Information Service.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

An Adaptive Meta-scheduler for Data-Intensive Applications.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

RB-GACA: A RBAC Based Grid Access Control Architecture.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...