JingZheng Wu

According to our database1, JingZheng Wu authored at least 31 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching.
IEEE Trans. Inf. Forensics Secur., 2021

AI-CTO: Knowledge graph for automated and dependable software stack solution.
J. Intell. Fuzzy Syst., 2021

2020
Research on the Influencing Factors of User Trust Based on Artificial Intelligence Self Diagnosis System.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2019
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion.
J. Comput. Sci. Technol., 2019

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine).
计算机科学, 2018

Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method.
Proceedings of the Services - SERVICES 2018, 2018

MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

2017
Solving linear optimization over arithmetic constraint formula.
J. Glob. Optim., 2017

LaChouTi: kernel vulnerability responding framework for the fragmented Android devices.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Droidrevealer: Automatically detecting Mysterious Codes in Android applications.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

PACS: Pemission abuse checking system for android applictions based on review mining.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
An Efficient Approach for Solving Optimization over Linear Arithmetic Constraints.
J. Comput. Sci. Technol., 2016

Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
CIVSched: A Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VMs.
IEEE Trans. Cloud Comput., 2014

C<sup>2</sup>Detector: a covert channel detection framework in cloud computing.
Secur. Commun. Networks, 2014

2013
Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

hGuard: A Framework to Measure Hypervisor Critical Files.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Vulnerability Detection of Android System in Fuzzing Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Improving performance of network covert timing channel through Huffman coding.
Math. Comput. Model., 2012

Incremental Collaborative Filtering Considering Temporal Effects
CoRR, 2012

XenPump: A New Method to Mitigate Timing Channel in Cloud Computing.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010


  Loading...