Jinpeng Wei

According to our database1, Jinpeng Wei
  • authored at least 33 papers between 2005 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
City Disaster Susceptibility Comparisons using Weighted Bipartite Graphs.
IJNGC, 2018

2017
The Design of Cyber Threat Hunting Games: A Case Study.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
Toward integrity assurance of outsourced computing - a game theoretic perspective.
Future Generation Comp. Syst., 2016

2015
An adaptive middleware design to support the dynamic interpretation of domain-specific models.
Information & Software Technology, 2015

Toward protecting control flow confidentiality in cloud-based computation.
Computers & Security, 2015

MOSE: Live Migration Based On-the-Fly Software Emulation.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Static analysis based invariant detection for commodity operating systems.
Computers & Security, 2014

A bipartite-graph based approach for disaster susceptibility comparisons among cities.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Bring your own device security issues and challenges.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Value-Added Modelling and Analysis in Service Value Brokerage.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
Proceedings of the Computer Security - ESORICS 2013, 2013

IntegrityMR: Integrity assurance framework for big data analytics and management applications.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Constructing E-Tourism platform based on service value broker: A knowledge management perspective.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Result Integrity Check for MapReduce Computation on Hybrid Clouds.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Toward a general defense against kernel queue hooking attacks.
Computers & Security, 2012

Software Persistent Memory.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Towards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Static analysis based invariant detection for commodity operating systems.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

VIAF: Verification-Based Integrity Assurance Framework for MapReduce.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems.
Computers & Security, 2010

Fixed-Parameter Tractable Combinatorial Algorithms for Metabolic Networks Alignments.
Proceedings of the ICDMW 2010, 2010

Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective.
Proceedings of the Cloud Computing, Second International Conference, 2010

WS-GraphMatching: a web service tool for graph matching.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Improving operating systems security: two case studies.
PhD thesis, 2009

Managing security of virtual machine images in a cloud environment.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
A Secure Information Flow Architecture for Web Service Platforms.
IEEE Trans. Services Computing, 2008

Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

A Secure Information Flow Architecture for Web Services.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Guarding Sensitive Information Streams through the Jungle of Composite Web Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Towards Scalable and High Performance I/O Virtualization - A Case Study.
Proceedings of the High Performance Computing and Communications, 2007

Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2005
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005


  Loading...