Xinhui Shao

According to our database1, Xinhui Shao authored at least 8 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On Security of TrustZone-M-Based IoT Systems.
IEEE Internet Things J., 2022

fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems.
IEEE Internet Things J., 2022

fASLR: Function-Based ASLR for Resource-Constrained IoT Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes.
J. Syst. Archit., 2021

2020
On Runtime Software Security of TrustZone-M Based IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2020

2013
A conservative weighted finite difference scheme for regularized long wave equation.
Appl. Math. Comput., 2013

2007
Modified SOR-like method for the augmented system.
Int. J. Comput. Math., 2007

2004
Optimum parameter for the SOR-like method for augmented systems.
Int. J. Comput. Math., 2004


  Loading...