Yeping He

According to our database1, Yeping He authored at least 38 papers between 2001 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2017
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one.
Frontiers Comput. Sci., 2017

Extending Differential Privacy for Treating Dependent Records via Information Theory.
CoRR, 2017

Differential Privacy of Mathematical Functions.
CoRR, 2017

2016
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Privacy-Preserving Location Assurance Protocols for Mobile Applications.
J. Softw., 2014

Efficient Interval Check in the Presence of Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2014

2013
Systemic threats to hypervisor non-control data.
IET Inf. Secur., 2013

hGuard: A Framework to Measure Hypervisor Critical Files.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

2012
Improving Flask Implementation Using Hardware Assisted In-VM Isolation.
Proceedings of the Information Security and Privacy Research, 2012

Baggy Bounds with Accurate Checking.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization.
Proceedings of the Information Security Practice and Experience, 2012

Building Large Scale Text Corpus for Tibetan Natural Language Processing by Extracting Text from Web Pages.
Proceedings of the 10th Workshop on Asian Language Resources, 2012

Return-Oriented Programming Attack on the Xen Hypervisor.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Verifying the Safety of Xen Security Modules.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Tibetan Word Segmentation as Syllable Tagging Using Conditional Random Field.
Proceedings of the 25th Pacific Asia Conference on Language, Information and Computation, 2011

Compression Methods by Code Mapping and Code Dividing for Chinese Dictionary Stored in a Double-Array Trie.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011

2010
Trusted Subjects Configuration Based on TE Model in MLS Systems.
Proceedings of the Trusted Systems - Second International Conference, 2010

Tibetan Number Identification Based on Classification of Number Components in Tibetan Word Segmentation.
Proceedings of the COLING 2010, 2010

2009
Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration.
J. Comput., 2009

Combating Index Poisoning in P2P File Sharing.
Proceedings of the Advances in Information Security and Assurance, 2009

Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework.
Proceedings of the Information Security Practice and Experience, 2009

2008
Trusted Reputation Management Service for Peer-to-Peer Collaboration.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Service Authenticity in P2P File-Sharing.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Enforcing Separation of Duty in Ad Hoc Collaboration.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Integrity Assurance Mechanism for Run-Time Programs.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Separation of Duty in Trust-Based Collaboration.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
A formal model for access control with supporting spatial context.
Sci. China Ser. F Inf. Sci., 2007

A Multilevel Reputation System for Peer-to-Peer Networks.
Proceedings of the Grid and Cooperative Computing, 2007

Identity Anonymity for Grid Computing Coordination based on Trusted Computing.
Proceedings of the Grid and Cooperative Computing, 2007

2006
A formal model for integrity protection based on DTE technique.
Sci. China Ser. F Inf. Sci., 2006

Spatial Context in Role-Based Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
A new formal model for privilege control with supporting POSIX capability mechanism.
Sci. China Ser. F Inf. Sci., 2005

A Formal Description of SECIMOS Operating System.
Proceedings of the Computer Network Security, 2005

2001
Square Attack on Reduced Camellia Cipher.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...