Shijie Jia

Orcid: 0000-0002-4262-9478

Affiliations:
  • Chinese Acadamy of Sciences, Institute of Information Engineering (IIE-CAS), State Key Laboratory of Information Security, Beijing, China
  • University of Chinese Acadamy of Sciences (UCAS), School of Cyber Security, Beijing, China (PhD 2017)


According to our database1, Shijie Jia authored at least 28 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Design of High-Efficiency Coherent Sampling Based TRNG With On-Chip Entropy Assurance.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
Proceedings of the Computer Security - ESORICS 2023, 2023

Protection of Access Pattern.
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023

XPORAM: A Practical Multi-client ORAM Against Malicious Adversaries.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer.
IEEE Trans. Dependable Secur. Comput., 2022

Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks.
Proceedings of the IEEE International Conference on Trust, 2022

An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator.
Proceedings of the IEEE International Conference on Communications, 2022

CryptoGo: Automatic Detection of Go Cryptographic API Misuses.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
P-Shake: Towards Secure Authentication and Communication between Mobile Devices.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Exploring Sequential and Collaborative Contexts for Next Point-of-Interest Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2021

2020
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

DPVGeo: Delay-based Public Verification of Cloud Data Geolocation.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

eHIFS: An Efficient History Independent File System.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey.
Cybersecur., 2018

2017
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting.
Proceedings of the Information Security Practice and Experience, 2016

NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Extracting Robust Keys from NAND Flash Physical Unclonable Functions.
Proceedings of the Information Security - 18th International Conference, 2015

Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication.
Proceedings of the Information and Communications Security - 17th International Conference, 2015


  Loading...