Weijie Liu

Orcid: 0000-0002-3054-766X

Affiliations:
  • Indiana University Bloomington, IN, USA
  • Tencent Technology Company Ltd, Shenzhen, China (former)
  • Wuhan University, Computer School, China (former)


According to our database1, Weijie Liu authored at least 21 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.
IEEE Trans. Dependable Secur. Comput., 2023

Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection.
IEEE Trans. Inf. Forensics Secur., 2022

The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition.
J. Am. Medical Informatics Assoc., 2022

Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Understanding TEE Containers, Easy to Use? Hard to Trust.
CoRR, 2021

Practical and Efficient in-Enclave Verification of Privacy Compliance.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Incremental CFG patching for binary rewriting.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR, 2020

Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2018
The lifting factorization of 2D 4-channel nonseparable wavelet transforms.
Inf. Sci., 2018

Factoring two-dimensional two-channel non-separable stripe filter banks into lifting steps.
IET Image Process., 2018

Controlled Channel Attack Detection Based on Hardware Virtualization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Construction of Sampling Two-Channel Nonseparable Wavelet Filter Bank and Its Fusion Application for Multispectral Image Pansharpening.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

On-Demand Time Blurring to Support Side-Channel Defense.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016

云环境下APT攻击的防御方法综述 (Review of Defense Methods Against Advanced Persistent Threat in Cloud Environment).
计算机科学, 2016

2014
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Construction method of three-channel non-separable symmetric wavelets with arbitrary dilation matrices and its applications in multispectral image fusion.
IET Image Process., 2013

2011
Fusion of Multi-spectral Image Using Non-separable Additive Wavelets for High Spatial Resolution Enhancement.
Proceedings of the Image Analysis and Recognition - 8th International Conference, 2011


  Loading...