Wenchang Shi

Orcid: 0000-0002-5160-1223

According to our database1, Wenchang Shi authored at least 78 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A collective attestation scheme towards cloud system.
Clust. Comput., October, 2023

A Scalable Cross-Chain Access Control and Identity Authentication Scheme.
Sensors, February, 2023

Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
CoRR, 2023

Interactions of Framing and Timing in Nudging Online Game Security.
Comput. Secur., 2023

Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

BDTS: Blockchain-Based Data Trading System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Who Are Querying For Me? Egress Measurement For Open DNS Resolvers.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
BDTS: A Blockchain-based Data Trading System with Fair Exchange.
CoRR, 2022

Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges.
Comput. Secur., 2022

Measurement for encrypted open resolvers: Applications and security.
Comput. Networks, 2022

Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Hunting bugs with accelerated optimal graph vertex matching.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

2021
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2021

Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness.
IEEE Trans. Computers, 2021

Detecting multiphase linear ranking functions for single-path linear-constraint loops.
Int. J. Softw. Tools Technol. Transf., 2021

SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Design and Evaluation of CFC-targeted Security Nudges.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Corrections to "Detecting Bugs by Discovering Expectations and Their Violations".
IEEE Trans. Software Eng., 2020

TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020

Do not jail my app: Detecting the Android plugin environments by time lag contradiction.
J. Comput. Secur., 2020

Identifying parasitic malware as outliers by code clustering.
J. Comput. Secur., 2020

A Survey on Digital Forensics in Internet of Things.
IEEE Internet Things J., 2020

Cecoin: A decentralized PKI mitigating MitM attacks.
Future Gener. Comput. Syst., 2020

On the fine-grained fingerprinting threat to software-defined networks.
Future Gener. Comput. Syst., 2020

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Proceedings of the 29th USENIX Security Symposium, 2020

SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Experimental Comparisons of Verifiable Delay Functions.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Paid Message Forwarding Scheme Based on Social Network.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Detecting Bugs by Discovering Expectations and Their Violations.
IEEE Trans. Software Eng., 2019

A survey on internet of things security from data perspectives.
Comput. Networks, 2019

Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage.
IEEE Access, 2019

An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
NAR-miner: discovering negative association rules from code for bug detection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Deep Text Classification Can be Fooled.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2017

一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation).
计算机科学, 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction.
CoRR, 2017

Fine-Grained Fingerprinting Threats to Software-Defined Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
基于证据链的电子证据可信性分析 (Trustworthiness Analysis of Digital Evidences Based on Chain of Evidences).
计算机科学, 2016

BeCFI: detecting hidden control flow with performance monitoring counters.
Int. J. High Perform. Comput. Netw., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016

Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016

AntMiner: mining more bugs by reducing noise interference.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015

Android Implicit Information Flow Demystified.
Proceedings of the 10th ACM Symposium on Information, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

HDROP: Detecting ROP Attacks Using Performance Monitoring Counters.
Proceedings of the Information Security Practice and Experience, 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

Scriptless Timing Attacks on Web Browser Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Understanding and analyzing network traffic.
IEEE Netw., 2012

2011
Network traffic monitoring, analysis and anomaly detection [Guest Editorial].
IEEE Netw., 2011

On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Detecting stealthy malware with inter-structure and imported signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

On Design of a Trusted Software Base with Support of TPCM.
Proceedings of the Trusted Systems, First International Conference, 2009

2008
An Approach for Compliance Validation of Trusted Computing Applications.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

2006
Portal monitoring based anti-malware framework: design and implementation.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
A Formal Description of SECIMOS Operating System.
Proceedings of the Computer Network Security, 2005

Security On-demand Architecture with Multiple Modules Support.
Proceedings of the Information Security Practice and Experience, 2005

Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005


  Loading...