Zhaofeng Chen

Orcid: 0000-0003-3492-6656

According to our database1, Zhaofeng Chen authored at least 20 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Verified Confidential Computing as a Service Framework for Privacy Preservation.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Bearing fault diagnosis based on particle swarm optimization fusion convolutional neural network.
Frontiers Neurorobotics, September, 2022

Design and Implementation of Local Threshold Segmentation Based on FPGA.
J. Electr. Comput. Eng., 2022

Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Comput. Secur., 2022

WMLink: Wearable Smart Devices and Mobile Phones Linking through Passive Sniffing BLE and WiFi Signals.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2020
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020

2019
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw. Pract. Exp., 2019

Inter-Subject Shape Correspondence Computation From Medical Images Without Organ Segmentation.
IEEE Access, 2019

2018
Deformable Head Atlas of Chinese Adults Incorporating Inter-Subject Anatomical Variations.
IEEE Access, 2018

Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
Multi-view metric learning based on KL-divergence for similarity measurement.
Neurocomputing, 2017

2015
VTint: Protecting Virtual Function Tables' Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

JITScope: Protecting web users from control-flow hijacking attacks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2013
Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Protecting function pointers in binary.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

CRYPTSERVER: strong data protection in commodity LAMP servers.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
New frequency spectrum estimation for the Spacial Transient Optical.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011


  Loading...