Qianying Zhang

Orcid: 0000-0002-3246-9474

According to our database1, Qianying Zhang authored at least 34 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
rOOM: A Rust-Based Linux Out of Memory Kernel Component.
IEICE Trans. Inf. Syst., 2024

Refinement Verification of OS Services based on a Verified Preemptive Microkernel.
Proceedings of the Fundamental Approaches to Software Engineering, 2024

2023
A nonlocal diffusion competition model with seasonal succession and free boundaries.
Commun. Nonlinear Sci. Numer. Simul., July, 2023

Intrinsic Image Transfer for Illumination Manipulation.
IEEE Trans. Pattern Anal. Mach. Intell., June, 2023

A unified proof technique for verifying program correctness with big-step semantics.
J. Syst. Archit., March, 2023

Formal Verification of Interrupt Isolation for the TrustZone-based TEE.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Design and Implementation of OOM Module based on Rust.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2021
Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021

2020
Formalization of Camera Pose Estimation Algorithm based on Rodrigues Formula.
Formal Aspects Comput., 2020

A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0.
Comput. Networks, 2020

Formalizing the Transaction Flow Process of Hyperledger Fabric.
Proceedings of the Formal Methods and Software Engineering, 2020

Formal Verification of Memory Isolation for the TrustZone-based TEE.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.
Secur. Commun. Networks, 2019

Formalization of Geometric Algebra in HOL Light.
J. Autom. Reason., 2019

A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0.
CoRR, 2019

MicroTEE: Designing TEE OS Based on the Microkernel Architecture.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Towards Verifying Ethereum Smart Contracts at Intermediate Language Level.
Proceedings of the Formal Methods and Software Engineering, 2019

SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Formal Modelling and Verification of Spinlocks at Instruction Level.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Formalization of Symplectic Geometry in HOL-Light.
Proceedings of the Formal Methods and Software Engineering, 2018

2017
A New Way to Prevent UKS Attacks Using Hardware Security Chips.
Int. J. Netw. Secur., 2017

2016
函数矩阵及其微积分的高阶逻辑形式化 (Higher-order Logic Formalization of Function Matrix and its Calculus).
计算机科学, 2016

2015
Security analysis of SM2 key exchange protocol in TPM2.0.
Secur. Commun. Networks, 2015

sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices.
IACR Cryptol. ePrint Arch., 2015

A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Urban Disaster Comprehensive Risk Assessment Research Based on GIS: A Case Study of Changsha City, Hunan Province, China.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

2014
Universally Composable secure TNC protocol based on IF-T binding to TLS.
IACR Cryptol. ePrint Arch., 2014

Providing Root of Trust for ARM TrustZone using SRAM PUFs.
IACR Cryptol. ePrint Arch., 2014

Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

2013
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

2011
A Property-Based Attestation Scheme with the Variable Privacy.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...