default search action
Weizhong Qiang
Person information
- unicode name: 羌卫中
- affiliation: Huazhong University of Science and Technology, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Weizhong Qiang, Kunlun Ren, Yueming Wu, Deqing Zou, Hai Jin:
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention. IEEE Trans. Reliab. 73(3): 1516-1528 (2024) - [c42]Yu Zhao, Wenjie Xue, Weijie Chen, Weizhong Qiang, Deqing Zou, Hai Jin:
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications. DSN 2024: 362-376 - [c41]Weijie Chen, Yu Zhao, Yinqian Zhang, Weizhong Qiang, Deqing Zou, Hai Jin:
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks. ESORICS (4) 2024: 24-44 - 2023
- [j41]Fangzhou Xu, Wang Zhang, Weizhong Qiang, Hai Jin:
Multi-path exploration guided by taint and probability against evasive malware. Secur. Saf. 2: 2023023 (2023) - [j40]Hai Jin, Zhuo He, Weizhong Qiang:
SpecTerminator: Blocking Speculative Side Channels Based on Instruction Classes on RISC-V. ACM Trans. Archit. Code Optim. 20(1): 15:1-15:26 (2023) - [c40]Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin:
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation. DSN 2023: 339-351 - [c39]Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin:
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors. ISSTA 2023: 1420-1432 - 2022
- [j39]Weizhong Qiang, Lin Yang, Hai Jin:
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks. Comput. Secur. 122: 102871 (2022) - [j38]Muqing He, Deqing Zou, Weizhong Qiang, Wenbo Wu, Shouhuai Xu, Xianjun Deng, Hai Jin:
Utility-Prioritized Differential Privacy for Quantitative Biomedical Data. J. Circuits Syst. Comput. 31(13): 2250236:1-2250236:23 (2022) - [j37]Jun Feng, Laurence T. Yang, Ronghao Zhang, Weizhong Qiang, Jinjun Chen:
Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications. IEEE Trans. Ind. Informatics 18(10): 7009-7018 (2022) - [c38]Weizhong Qiang, Hao Luo:
AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring. TrustCom 2022: 239-247 - 2021
- [j36]Weizhong Qiang, Renwan Liu, Hai Jin:
Defending CNN against privacy leakage in edge computing via binary neural networks. Future Gener. Comput. Syst. 125: 460-470 (2021) - [j35]Weizhong Qiang, Yingda Huang, Hai Jin, Laurence T. Yang, Deqing Zou:
CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment. IEEE Trans. Cloud Comput. 9(3): 938-957 (2021) - [i1]Yueming Wu, Shihan Dou, Deqing Zou, Wei Yang, Weizhong Qiang, Hai Jin:
Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning. CoRR abs/2107.03799 (2021) - 2020
- [j34]Jun Feng, Laurence T. Yang, Ronghao Zhang, Shunli Zhang, Guohui Dai, Weizhong Qiang:
A Tensor-Based Optimization Model for Secure Sustainable Cyber-Physical-Social Big Data Computations. IEEE Trans. Sustain. Comput. 5(2): 223-234 (2020)
2010 – 2019
- 2019
- [j33]Weizhong Qiang, Weifeng Li, Hai Jin, Jayachander Surbiryala:
Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers. IEEE Access 7: 45961-45977 (2019) - [j32]Deqing Zou, Jian Zhao, Weiming Li, Yueming Wu, Weizhong Qiang, Hai Jin, Ye Wu, Yifei Yang:
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment. IEEE Internet Things J. 6(2): 1484-1494 (2019) - [j31]Chin-Feng Lai, Wei-Che Chien, Laurence T. Yang, Weizhong Qiang:
LSTM and Edge Computing for Big Data Feature Recognition of Industrial Electrical Equipment. IEEE Trans. Ind. Informatics 15(4): 2469-2477 (2019) - [j30]Weizhong Qiang:
Performance and security in cloud computing. J. Supercomput. 75(1): 1-3 (2019) - [j29]Bin Yuan, Deqing Zou, Shui Yu, Hai Jin, Weizhong Qiang, Jinan Shen:
Defending Against Flow Table Overloading Attack in Software-Defined Networks. IEEE Trans. Serv. Comput. 12(2): 231-246 (2019) - [c37]Junfang Wu, Weizhong Qiang, Tianqing Zhu, Hai Jin, Peng Xu, Sheng Shen:
Differential Privacy Preservation for Smart Meter Systems. ICA3PP (1) 2019: 669-685 - 2018
- [j28]Weizhong Qiang, Jiawei Yang, Hai Jin, Xuanhua Shi:
PrivGuard: Protecting Sensitive Kernel Data From Privilege Escalation Attacks. IEEE Access 6: 46584-46594 (2018) - [j27]Weiqi Dai, Yukun Du, Hai Jin, Weizhong Qiang, Deqing Zou, Shouhuai Xu, Zhongze Liu:
RollSec: Automatically Secure Software States Against General Rollback. Int. J. Parallel Program. 46(4): 788-805 (2018) - [j26]Weiqi Dai, Pengfei Wan, Weizhong Qiang, Laurence T. Yang, Deqing Zou, Hai Jin, Shouhuai Xu, Zirong Huang:
TNGuard: Securing IoT Oriented Tenant Networks Based on SDN. IEEE Internet Things J. 5(3): 1411-1423 (2018) - [j25]Weizhong Qiang, Shizhen Wang, Hai Jin:
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS. Secur. Commun. Networks 2018: 3130652:1-3130652:11 (2018) - [j24]Weizhong Qiang, Shizhen Wang, Hai Jin, Jiangying Zhong:
Corrigendum to "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". Secur. Commun. Networks 2018: 5618453:1 (2018) - [c36]Weizhong Qiang, Zezhao Dong, Hai Jin:
Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX Enclave. SecureComm (1) 2018: 451-470 - 2017
- [j23]Weizhong Qiang, Yuehua Liao, Guozhong Sun, Laurence T. Yang, Deqing Zou, Hai Jin:
Patch-Related Vulnerability Detection Based on Symbolic Execution. IEEE Access 5: 20777-20784 (2017) - [j22]Weizhong Qiang, Gongping Xu, Weiqi Dai, Deqing Zou, Hai Jin:
CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection. IEEE Access 5: 21962-21976 (2017) - [j21]Weizhong Qiang, Shifan Xin, Hai Jin, Guozhong Sun:
DroidAuditor: A framework for auditing covert communication on Android. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j20]Weizhong Qiang, Feng Chen, Laurence T. Yang, Hai Jin:
MUC: Updating cloud applications dynamically via multi-version execution. Future Gener. Comput. Syst. 74: 254-264 (2017) - [j19]Sheng Wang, Weizhong Qiang, Hai Jin, Jinfeng Yuan:
CovertInspector: Identification of Shared Memory Covert Timing Channel in Multi-tenanted Cloud. Int. J. Parallel Program. 45(1): 142-156 (2017) - [c35]Weizhong Qiang, JiaZhen Guo, Hai Jin, Weifeng Li:
JSFfox: Run-Timely Confining JavaScript for Firefox. ACISP (2) 2017: 135-150 - [c34]Weizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang, Guozhong Sun:
Fully Context-Sensitive CFI for COTS Binaries. ACISP (2) 2017: 435-442 - [c33]Zhikun Chen, Weizhong Qiang:
ISLUS: An Immediate and Safe Live Update System for C Program. DSC 2017: 267-274 - [c32]Weizhong Qiang, Yong Cao, Weiqi Dai, Deqing Zou, Hai Jin, Benxi Liu:
Libsec: A Hardware Virtualization-Based Isolation for Shared Library. HPCC/SmartCity/DSS 2017: 34-41 - [c31]Weizhong Qiang, Gongping Xu, Guozhong Sun, Tianqing Zhu, Hai Jin:
CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management. TrustCom/BigDataSE/ICESS 2017: 177-184 - 2016
- [j18]Weizhong Qiang, Kang Zhang, Weiqi Dai, Hai Jin:
Secure cryptographic functions via virtualization-based outsourced computing. Concurr. Comput. Pract. Exp. 28(11): 3149-3163 (2016) - [j17]Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu:
Social network analysis and its application. Concurr. Comput. Pract. Exp. 28(14): 3798-3802 (2016) - [j16]Weizhong Qiang, Changqing Jiang, Longbo Ran, Deqing Zou, Hai Jin:
CDMCR: multi-level fault-tolerant system for distributed applications in cloud. Secur. Commun. Networks 9(15): 2766-2778 (2016) - [c30]Weizhong Qiang, Kang Zhang, Hai Jin:
Reducing TCB of Linux Kernel Using User-Space Device Driver. ICA3PP 2016: 572-585 - [c29]Weizhong Qiang, Shifan Xin, Hai Jin, Xinqiao Lv, Qin Zhang:
Auditing Covert Communication between Applications on Android. ISPDC 2016: 257-260 - 2015
- [j15]Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Weizhong Qiang:
A lightweight software fault-tolerance system in the cloud environment. Concurr. Comput. Pract. Exp. 27(12): 2982-2998 (2015) - [j14]Feng Zhao, Hang Zhu, Hai Jin, Weizhong Qiang:
A Skip-gram-based Framework to Extract Knowledge from Chinese Reviews in Cloud Environment. Mob. Networks Appl. 20(3): 363-369 (2015) - [c28]Feng Chen, Weizhong Qiang, Hai Jin, Deqing Zou, Duoqiang Wang:
Multi-version Execution for the Dynamic Updating of Cloud Applications. COMPSAC 2015: 185-190 - [c27]Yushuai Shi, Deqing Zou, Weizhong Qiang, Xiaofei Liao, Hai Jin:
CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems. CONIELECOMP 2015: 40-47 - [c26]Kao Zhao, Deqing Zou, Hai Jin, Zhangbiaoge Tian, Weizhong Qiang, Weiqi Dai:
Privacy Protection for Perceptual Applications on Smartphones. IEEE MS 2015: 174-181 - [e1]Weizhong Qiang, Xianghan Zheng, Ching-Hsien Hsu:
Cloud Computing and Big Data - Second International Conference, CloudCom-Asia 2015, Huangshan, China, June 17-19, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9106, Springer 2015, ISBN 978-3-319-28429-3 [contents] - 2014
- [j13]Jinfeng Yuan, Weizhong Qiang, Hai Jin, Deqing Zou:
CloudTaint: an elastic taint tracking framework for malware detection in the cloud. J. Supercomput. 70(3): 1433-1450 (2014) - [c25]Fengwei Wang, Hai Jin, Deqing Zou, Weizhong Qiang:
FDKeeper: A Quick and Open Failure Detector for Cloud Computing System. C3S2E 2014: 14:1-14:8 - [c24]Deqing Zou, Hao Qin, Hai Jin, Weizhong Qiang, Zongfen Han, Xueguang Chen:
Improving Log-Based Fault Diagnosis by Log Classification. NPC 2014: 446-458 - 2013
- [j12]Deqing Zou, Wenrong Zhang, Weizhong Qiang, Guofu Xiang, Laurence Tianruo Yang, Hai Jin, Kan Hu:
Design and implementation of a trusted monitoring framework for cloud platforms. Future Gener. Comput. Syst. 29(8): 2092-2102 (2013) - [j11]Weizhong Qiang, Deqing Zou, Shenglan Wang, Laurence Tianruo Yang, Hai Jin, Lei Shi:
CloudAC: a cloud-oriented multilayer access control system for logic virtual domain. IET Inf. Secur. 7(1): 51-59 (2013) - 2012
- [j10]Weizhong Qiang, Aleksandr Konstantinov, Deqing Zou, Laurence Tianruo Yang:
A standards-based interoperable single sign-on framework in ARC Grid middleware. J. Netw. Comput. Appl. 35(3): 892-904 (2012) - [j9]Feng Zhao, Min Li, Weizhong Qiang, Hai Jin, Deqing Zou, Qin Zhang:
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas. Secur. Commun. Networks 5(10): 1169-1180 (2012) - [c23]Wenbin Jiang, Lei Zhang, Weizhong Qiang, Hai Jin, Yaqiong Peng:
MyStore: A High Available Distributed Storage System for Unstructured Data. HPCC-ICESS 2012: 233-240 - [c22]Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, Deqing Zou:
A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing. IPDPS Workshops 2012: 1210-1217 - 2011
- [c21]Moussa Djiriba Traore, Hai Jin, Deqing Zou, Weizhong Qiang, Guofu Xiang:
RAPn: Network Attack Prediction Using Ranking Access Petri Net. ChinaGrid 2011: 108-115 - 2010
- [j8]Owen Appleton, David G. Cameron, Jozef Cernák, Péter Dóbé, Mattias Ellert, Thomas Frågåt, Michael Grønager, Daniel Johansson, Johan Jönemo, Josva Kleist, Marek Kocan, Aleksandr Konstantinov, Balázs Kónya, Iván Márton, Bjarte Mohn, Steffen Möller, Henning Müller, Zsombor Nagy, Jon K. Nilsen, Farid Ould-Saada, Katarina Pajchel, Weizhong Qiang, Alexander L. Read, Peter Rosendahl, Gábor Röczei, Martin Savko, Martin Skou Andersen, Oxana Smirnova, Péter Stefán, Ferenc Szalai, Adrian Taga, Salman Zubair Toor, Anders Wäänänen, Xin Zhou:
The next-generation ARC middleware. Ann. des Télécommunications 65(11-12): 771-776 (2010) - [c20]Gang Chen, Hai Jin, Deqing Zou, Bing Bing Zhou, Weizhong Qiang, Gang Hu:
SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment. CLUSTER 2010: 97-106 - [c19]Weizhong Qiang, Aleksandr Konstantinov, Hai Jin:
The Interoperable Attribute-based Authorization in ARC Grid Middleware. GCC 2010: 145-150 - [c18]Weizhong Qiang, Aleksandr Konstantinov, Mattias Ellert, Hai Jin:
Securing Interoperable Grid Services in ARC Grid Middleware. GPC 2010: 311-320 - [c17]Weizhong Qiang, Aleksandr Konstantinov:
The Design and Implementation of Standards-Based Grid Single Sign-On Using Federated Identity. HPCC 2010: 458-464
2000 – 2009
- 2009
- [j7]Weizhong Qiang, Aleksandr Konstantinov:
Towards cross-middleware authentication and single sign-on for ARC Grid middleware. Comput. Sci. Res. Dev. 23(3-4): 267-274 (2009) - 2008
- [c16]Deqing Zou, Yunfa Li, Song Wu, Weizhong Qiang:
A Trusted Group Signature Architecture in Virtual Computing Environment. ATC 2008: 73-85 - 2007
- [j6]Hai Jin, Yunfa Li, Zongfen Han, Hao Wu, Weizhong Qiang:
Aeneas: real-time performance evaluation approach for distributed programs with reliability-constrains. Clust. Comput. 10(2): 175-186 (2007) - [j5]Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang:
A Novel Approach to Hide Credentials. Int. J. Netw. Secur. 4(3): 306-311 (2007) - [c15]Deqing Zou, Laurence Tianruo Yang, Weizhong Qiang, Xueguang Chen, Zongfen Han:
An Authentication and Access Control Framework for Group Communication Systems in Grid Environment. AINA 2007: 547-554 - 2006
- [j4]Hai Jin, Xuanhua Shi, Weizhong Qiang, Deqing Zou:
DRIC: Dependable Grid Computing Framework. IEICE Trans. Inf. Syst. 89-D(2): 612-623 (2006) - [j3]Yunfa Li, Deqing Zou, Zongfen Han, Weizhong Qiang:
Research on Group Signature Scheme with Forward Security. J. Comput. Res. Dev. 43(12): 2069-2075 (2006) - [c14]Fei Yan, Weizhong Qiang, Zhi-Dong Shen, Chunrun Chen, Huanguo Zhang, Deqing Zou:
Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology. ATC 2006: 227-235 - [c13]Zhi-Dong Shen, Fei Yan, Weizhong Qiang, Xiaoping Wu, Huanguo Zhang:
Grid System Integrated with Trusted Computing Platform. IMSCCS (1) 2006: 619-625 - [c12]Hai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang:
A New Approach to Hide Policy for Automated Trust Negotiation. IWSEC 2006: 168-178 - [c11]Xuanhua Shi, Hai Jin, Weizhong Qiang:
ALTER: first step towards dependable grids. SAC 2006: 805-806 - 2005
- [j2]Hai Jin, Xuanhua Shi, Weizhong Qiang, Deqing Zou:
An adaptive meta-scheduler for data-intensive applications. Int. J. Grid Util. Comput. 1(1): 32-37 (2005) - [j1]Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:
RB-GACA: an RBAC based grid access control architecture. Int. J. Grid Util. Comput. 1(1): 61-70 (2005) - [c10]Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou:
Joint Management of Authorization for Dynamic Virtual Organization. CIT 2005: 375-381 - [c9]Xuanhua Shi, Hai Jin, Zongfen Han, Weizhong Qiang, Song Wu, Deqing Zou:
ALTER: Adaptive Failure Detection Services for Grids. IEEE SCC 2005: 355-358 - [c8]Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:
VO-Sec: An Access Control Framework for Dynamic Virtual Organization. ACISP 2005: 370-381 - [c7]Deqing Zou, Weizhong Qiang, Xuanhua Shi:
A Formal General Framework and Service Access Model for Service Grid. ICECCS 2005: 349-356 - [c6]Hai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou:
A Novel Authorization Mechanism for Service-Oriented Virtual Organization. ISCIS 2005: 382-391 - 2004
- [c5]Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou:
A Novel VO-Based Access Control Model for Grid. GCC 2004: 293-300 - [c4]Xuanhua Shi, Hai Jin, Weizhong Qiang, Deqing Zou:
Reliability Analysis for Grid Computing. GCC 2004: 787-790 - 2003
- [c3]Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou, Hao Zhang:
RB-GACA: A RBAC Based Grid Access Control Architecture. GCC (1) 2003: 487-494 - [c2]Deqing Zou, Hai Jin, Xingchang Dong, Weizhong Qiang, Xuanhua Shi:
HH-MDS: A QoS-Aware Domain Divided Information Service. GCC (2) 2003: 573-580 - [c1]Xuanhua Shi, Hai Jin, Weizhong Qiang, Deqing Zou:
An Adaptive Meta-scheduler for Data-Intensive Applications. GCC (2) 2003: 830-837
Coauthor Index
aka: Laurence Tianruo Yang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint