Wenbo Shen

According to our database1, Wenbo Shen authored at least 17 papers between 2007 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Toward Proper Guard Zones for Link Signature.
IEEE Trans. Wireless Communications, 2016

SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Parallel Stimulus Generation Based on Model Checking for Coherence Protocol Verification.
IEEE Trans. VLSI Syst., 2015

No time to demodulate - fast physical layer verification of friendly jamming.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Channel correlation modeling for link signature security assessment.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

MCR Decoding: A MIMO approach for defending against wireless jamming attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

The security of link signature: A view from channel models.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Is link signature dependable for wireless security?
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An FPGA Based Hybrid Processor Emulation Platform.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

High-performance, energy-efficient platforms using in-socket FPGA accelerators.
Proceedings of the ACM/SIGDA 17th International Symposium on Field Programmable Gate Arrays, 2009

Design of IP Media Accelerator.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007