Hongjun He

According to our database1, Hongjun He authored at least 15 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Finite Time Synchronization for Fractional Order Sprott C Systems with Hidden Attractors.
Complexity, 2019

2017
Winograd Algorithm for 3D Convolution Neural Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

2016
Defect Analysis and Risk Assessment of Mainstream File Access Control Policies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

2015
Ultra simple way to encrypt non-volatile main memory.
Security and Communication Networks, 2015

2013
Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems.
Future Generation Comp. Syst., 2013

Novel Physically-Embedded Data Encryption for Embedded Device.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2011
Inter-Chip Authentication through I/O Character.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Incremental hash tree for disk authentication.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Efficient Encryption-Authentication of Shared Bus-Memory in SMP System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery.
Proceedings of the Advances in Information Security and Assurance, 2009

Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Secure Disk with Authenticated Encryption and IV Verification.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Efficiently Protect Memory through an Independent Counter Channel.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2006
An Efficient Way to Build Secure Disk.
Proceedings of the Information Security Practice and Experience, 2006


  Loading...