Wenbo Shen

According to our database1, Wenbo Shen
  • authored at least 19 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Toward Proper Guard Zones for Link Signature.
IEEE Trans. Wireless Communications, 2016

Flint Water Crisis: Data-Driven Risk Assessment Via Residential Water Testing.
CoRR, 2016

Data Science in Service of Performing Arts: Applying Machine Learning to Predicting Audience Preferences.
CoRR, 2016

SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Parallel Stimulus Generation Based on Model Checking for Coherence Protocol Verification.
IEEE Trans. VLSI Syst., 2015

No time to demodulate - fast physical layer verification of friendly jamming.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Channel correlation modeling for link signature security assessment.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

MCR Decoding: A MIMO approach for defending against wireless jamming attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

The security of link signature: A view from channel models.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Is link signature dependable for wireless security?
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2010
An FPGA Based Hybrid Processor Emulation Platform.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

2009
High-performance, energy-efficient platforms using in-socket FPGA accelerators.
Proceedings of the ACM/SIGDA 17th International Symposium on Field Programmable Gate Arrays, 2009

2007
Design of IP Media Accelerator.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007


  Loading...