Shengzhi Zhang

According to our database1, Shengzhi Zhang
  • authored at least 25 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
CoRR, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Towards comprehensive protection for OpenFlow controllers.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
A Dual-Linear Kalman Filter for Real-Time Orientation Determination System Using Low-Cost MEMS Sensors.
Sensors, 2016

Towards service continuity for transactional applications via diverse device drivers.
IJICS, 2016

Classifying Android Malware with Dynamic Behavior Dependency Graphs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors.
Proceedings of the Advances in Information and Computer Security, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Quaternion-Based Unscented Kalman Filter for Accurate Indoor Heading Estimation Using Wearable Multi-Sensor System.
Sensors, 2015

A Study of Network Domains Used in Android Applications.
Proceedings of the Network and System Security - 9th International Conference, 2015

Comprehensive Analysis of the Android Google Play's Auto-update Policy.
Proceedings of the Information Security Practice and Experience, 2015

2014
Machine Learning Based Cross-Site Scripting Detection in Online Social Network.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Defending return-oriented programming based on virtualization techniques.
Security and Communication Networks, 2013

Towards transparent and distributed workload management for large scale web servers.
Future Generation Comp. Syst., 2013

2012
Hidden node collision recovery protocol for low rate wireless personal area networks.
Wireless Communications and Mobile Computing, 2012

Assessing the Trustworthiness of Drivers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Letting applications operate through attacks launched from compromised drivers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
IEEE Trans. Information Forensics and Security, 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Distributed workload and response time management for web applications.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2008
Using virtual machines to do cross-layer damage assessment.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

2007
Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANs.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007


  Loading...