Jianhua Sun

Orcid: 0000-0001-5123-2061

Affiliations:
  • Hunan University, Changsha, China


According to our database1, Jianhua Sun authored at least 65 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A quantitative evaluation of persistent memory hash indexes.
VLDB J., 2024

2023
On the Performance Intricacies of Persistent Memory Aware Storage Engines.
IEEE Trans. Knowl. Data Eng., October, 2023

DongTing: A large-scale dataset for anomaly detection of the Linux kernel.
J. Syst. Softw., September, 2023

TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation.
Future Gener. Comput. Syst., July, 2023

2022
TLB-pilot: Mitigating TLB Contention Attack on GPUs with Microarchitecture-Aware Scheduling.
ACM Trans. Archit. Code Optim., 2022

CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation.
Future Gener. Comput. Syst., 2022

Campo: Cost-Aware Performance Optimization for Mixed-Precision Neural Network Training.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Halo: A Hybrid PMem-DRAM Persistent Hash Index with Fast Recovery.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

2021
Efficient Buffer Overflow Detection on GPU.
IEEE Trans. Parallel Distributed Syst., 2021

Persistent Memory Hash Indexes: An Experimental Evaluation.
Proc. VLDB Endow., 2021

Efficient parallel A* search on multi-GPU system.
Future Gener. Comput. Syst., 2021

A Coverage-Guided Fuzzing Framework for Trusted Execution Environments.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2019
Detecting Undefined Behaviors in CUDA C.
IEEE Access, 2019

A Fast and Secure GPU Memory Allocator.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Address Randomization for Dynamic Memory Allocators on the GPU.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Have Your Cake and Eat it (Too): A Concurrent Hash Table with Hardware Transactions.
Int. J. Parallel Program., 2018

Concurrent hash tables on multicore machines: Comparison, evaluation and implications.
Future Gener. Comput. Syst., 2018

GMOD: a dynamic GPU memory overflow detector.
Proceedings of the 27th International Conference on Parallel Architectures and Compilation Techniques, 2018

2017
Optimizing Graph Processing on GPUs.
IEEE Trans. Parallel Distributed Syst., 2017

Developing an Efficient Pattern Discovery Method for CPU Utilizations of Computers.
Int. J. Parallel Program., 2017

Performance analysis and optimization for workflow authorization.
Future Gener. Comput. Syst., 2017

Exploring Synchronization in Cache Coherent Manycore Systems: A Case Study with Xeon Phi.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2016
Redundant Network Traffic Elimination with GPU Accelerated Rabin Fingerprinting.
IEEE Trans. Parallel Distributed Syst., 2016

Coral: A Cloud-Backed Frugal File System.
IEEE Trans. Parallel Distributed Syst., 2016

Optimizing Checkpoint Restart with Data Deduplication.
Sci. Program., 2016

Phoney: protecting password hashes with threshold cryptology and honeywords.
Int. J. Embed. Syst., 2016

Automatically identifying apps in mobile traffic.
Concurr. Comput. Pract. Exp., 2016

A Study of Overflow Vulnerabilities on GPUs.
Proceedings of the Network and Parallel Computing, 2016

Mining Frequent Attack Sequence in Web Logs.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Modelling and Developing Co-scheduling Strategies on Multicore Processors.
Proceedings of the 44th International Conference on Parallel Processing, 2015

GPSA: A Graph Processing System with Actors.
Proceedings of the 44th International Conference on Parallel Processing, 2015

An efficient method for motif discovery in CPU host load.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
BAG: Managing GPU as Buffer Cache in Operating Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Preventing Client Side XSS with Rewrite Based Dynamic Information Flow.
Proceedings of the Sixth International Symposium on Parallel Architectures, 2014

An improved method for tree-based clone detection in Web Applications.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014

Performance Analysis and Optimization for Stochastic Workflows Running under Authorization Constraints.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
A Fast RPC System for Virtual Machines.
IEEE Trans. Parallel Distributed Syst., 2013

Kernel Code Integrity Protection Based on a Virtualized Memory Architecture.
Comput. Informatics, 2013

Developing communication-aware service placement frameworks in the Cloud economy.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
vCUDA: GPU-Accelerated High-Performance Computing in Virtual Machines.
IEEE Trans. Computers, 2012

Modeling and analyzing the impact of authorization on workflow executions.
Future Gener. Comput. Syst., 2012

2011
Modelling and analyzing the authorization and execution of video workflows.
Proceedings of the 18th International Conference on High Performance Computing, 2011

2010
An Execution-flow Based Method for Detecting Cross-Site Scripting of Ajax Applications.
Int. J. Adv. Comp. Techn., 2010

Insecure JavaScript Detection and Analysis with Browser-Enforced Embedded Rules.
Proceedings of the 2010 International Conference on Parallel and Distributed Computing, 2010

A New Database Firewall Based on Anomaly Detection.
Proceedings of the 2010 International Conference on Parallel and Distributed Computing, 2010

SRCS: Multi-user Web Browser Sharing and Collaboration System.
Proceedings of the 2010 International Conference on Parallel and Distributed Computing, 2010

VMRPC: A high efficiency and light weight RPC system for virtual machines.
Proceedings of the 18th International Workshop on Quality of Service, 2010

2009
vCUDA: GPU accelerated high performance computing in virtual machines.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2008
A Dynamic Rebuild Strategy of Multi-host System Volume on Transparence Computing Mode.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

A Proximity-Aware Load Balancing Algorithm in P2P Systems.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Dumpling: An Efficient Method Based on Clustering for Network Positioning.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

An I/O Acceleration Technology for Network Computing: iTRM.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Virus Immunization Model Based on Communities in Large Scale Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2006
Measurements of topological characteristics for Peer-to-Peer systems.
Int. J. High Perform. Comput. Netw., 2006

2005
CIPS: Coordinated Intrusion Prevention System.
Proceedings of the Information Networking, 2005

Network-Based Anomaly Detection Using an Elman Network.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Efficient Immunization Algorithm for Peer-to-Peer Networks.
Proceedings of the High Performance Computing, 2004

A Fuzzy Data Mining Based Intrusion Detection Model.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

Analysis of large-scale topological properties for peer-to-peer networks.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
Fault-Tolerant Grid Architecture and Practice.
J. Comput. Sci. Technol., 2003

Optimal Resource Allocation with Mixed Use of M/M/1/K and /M/M/m/K Queueing Systems in Video-on-Demand Systems.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003

A Data Mining Based Intrusion Detection Model.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

A Compound Intrusion Detection Model.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Server Scheduling Scheme for Asynchronous Cluster Video Server.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
A Risk-Sensitive Intrusion Detection Model.
Proceedings of the Information Security and Cryptology, 2002


  Loading...