default search action
Jinpeng Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Xuhang Gu, Qingyang Wang, Jianshu Liu, Jinpeng Wei:
Grunt Attack: Exploiting Execution Dependencies in Microservices. DSN 2024: 115-128 - [c39]Mohiuddin Ahmed, Jinpeng Wei, Ehab Al-Shaer:
Prompting LLM to Enforce and Validate CIS Critical Security Control. SACMAT 2024 - [c38]Md Rabbi Alam, Jinpeng Wei, Md Sajidul Islam Sajid, Qingyang Wang, Chenglong Fu:
Moving from the Developer Machine to IoT Devices: An Empirical Study. SecDev 2024: 140-152 - 2023
- [j15]Shaojian Qu, Jinpeng Wei, Qiuhan Wang, Yuanming Li, Xiaowan Jin, Loubna Chaib:
Robust minimum cost consensus models with various individual preference scenarios under unit adjustment cost uncertainty. Inf. Fusion 89: 510-526 (2023) - [j14]Jinpeng Wei, Shaojian Qu, Qiuhan Wang, Dongqing Luan, Xiaohui Zhao:
The Novel Data-Driven Robust Maximum Expert Mixed Integer Consensus Models Under Multirole's Opinions Uncertainty by Considering Noncooperators. IEEE Trans. Comput. Soc. Syst. 10(6): 3454-3470 (2023) - [j13]Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer, Qi Duan, Basel Abdeen, Latifur Khan:
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. ACM Trans. Priv. Secur. 26(4): 51:1-51:36 (2023) - [c37]Jiuchuan Jiang, Jinpeng Wei:
A Crowdsourcing Task Allocation Mechanism for Hybrid Worker Context Based on Skill Level Updating. ChineseCSCW (2) 2023: 19-33 - 2022
- [j12]Jinpeng Wei, Shaojian Qu, Shan Jiang, Can Feng, Yuting Xu, Xiaohui Zhao:
Robust minimum cost consensus models with aggregation operators under individual opinion uncertainty. J. Intell. Fuzzy Syst. 42(3): 2435-2449 (2022) - [j11]Jianshu Liu, Shungeng Zhang, Qingyang Wang, Jinpeng Wei:
Coordinating Fast Concurrency Adapting With Autoscaling for SLO-Oriented Web Applications. IEEE Trans. Parallel Distributed Syst. 33(12): 3349-3362 (2022) - [c36]Md. Morshed Alam, Md Sajidul Islam Sajid, Weichao Wang, Jinpeng Wei:
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. WCNC 2022: 1695-1700 - [e3]Jinpeng Wei, Liang-Jie Zhang:
Big Data - BigData 2021 - 10th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10-14, 2021, Proceedings. Lecture Notes in Computer Science 12988, Springer 2022, ISBN 978-3-030-96281-4 [contents] - [i1]Md. Morshed Alam, Md Sajidul Islam Sajid, Weichao Wang, Jinpeng Wei:
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. CoRR abs/2202.04620 (2022) - 2021
- [c35]Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam, Walter Diong, Latifur Khan:
SODA: A System for Cyber Deception Orchestration and Automation. ACSAC 2021: 675-689 - [c34]Md. Mazharul Islam, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang:
CHIMERA: Autonomous Planning and Orchestration for Malware Deception. CNS 2021: 173-181 - 2020
- [c33]Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer:
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware. CNS 2020: 1-9 - [c32]Jianshu Liu, Shungeng Zhang, Qingyang Wang, Jinpeng Wei:
Mitigating Large Response Time Fluctuations through Fast Concurrency Adapting in Clouds. IPDPS 2020: 368-377 - [c31]Amirreza Niakanlahiji, Jinpeng Wei, Md Rabbi Alam, Qingyang Wang, Bei-Tseng Chu:
ShadowMove: A Stealthy Lateral Movement Strategy. USENIX Security Symposium 2020: 559-576 - [e2]Ajay Katangur, Shih-Chun Lin, Jinpeng Wei, Shuhui Yang, Liang-Jie Zhang:
Edge Computing - EDGE 2020 - 4th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12407, Springer 2020, ISBN 978-3-030-59823-5 [contents]
2010 – 2019
- 2019
- [b2]Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang:
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings. Springer 2019, ISBN 978-3-030-02109-2 - [j10]Jinpeng Wei, Feng Zhu:
Binary-centric defense of production operating systems against kernel queue injection attacks. J. Comput. Virol. Hacking Tech. 15(4): 259-275 (2019) - [c30]Shungeng Zhang, Huasong Shan, Qingyang Wang, Jianshu Liu, Qiben Yan, Jinpeng Wei:
Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks. ICDCS 2019: 1527-1538 - [e1]Tao Zhang, Jinpeng Wei, Liang-Jie Zhang:
Edge Computing - EDGE 2019 - Third International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings. Lecture Notes in Computer Science 11520, Springer 2019, ISBN 978-3-030-23373-0 [contents] - 2018
- [j9]Ning Xie, Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Jinpeng Wei:
City Disaster Susceptibility Comparisons using Weighted Bipartite Graphs. Int. J. Next Gener. Comput. 9(1) (2018) - [c29]Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, Mohiuddin Ahmed:
gExtractor: Towards Automated Extraction of Malware Deception Parameters. SSPREW@ACSAC 2018: 2:1-2:12 - [c28]Amirreza Niakanlahiji, Jinpeng Wei, Bei-Tseng Chu:
A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques. IEEE BigData 2018: 2995-3000 - [c27]Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang, Ehab Al-Shaer:
A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154 - [c26]Feng Zhu, Youngtae Yun, Jinpeng Wei, Brent ByungHoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, Ruchuan Wang:
A Reflective Covert Channel Attack Anchored on Trusted Web Services. ICWS 2018: 84-99 - 2017
- [c25]Md. Nazmus Sakib Miazi, Mir Mehedi A. Pritom, Mohamed Shehab, Bill Chu, Jinpeng Wei:
The Design of Cyber Threat Hunting Games: A Case Study. ICCCN 2017: 1-6 - 2016
- [j8]Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen:
Toward integrity assurance of outsourced computing - a game theoretic perspective. Future Gener. Comput. Syst. 55: 87-100 (2016) - [j7]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du:
IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications. Int. J. Networked Distributed Comput. 4(2): 116-126 (2016) - 2015
- [j6]Yongzhi Wang, Jinpeng Wei:
Toward protecting control flow confidentiality in cloud-based computation. Comput. Secur. 52: 106-127 (2015) - [j5]Karl A. Morris, Mark Allison, Fábio M. Costa, Jinpeng Wei, Peter J. Clarke:
An adaptive middleware design to support the dynamic interpretation of domain-specific models. Inf. Softw. Technol. 62: 21-41 (2015) - [c24]Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim:
MOSE: Live Migration Based On-the-Fly Software Emulation. ACSAC 2015: 221-230 - 2014
- [j4]Feng Zhu, Jinpeng Wei:
Static analysis based invariant detection for commodity operating systems. Comput. Secur. 43: 49-63 (2014) - [c23]Yong Wang, Jinpeng Wei, Karthik Vangury:
Bring your own device security issues and challenges. CCNC 2014: 80-85 - [c22]Wubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Ning Xie, Jinpeng Wei:
A bipartite-graph based approach for disaster susceptibility comparisons among cities. IRI 2014: 593-599 - 2013
- [c21]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa:
Result Integrity Check for MapReduce Computation on Hybrid Clouds. IEEE CLOUD 2013: 847-854 - [c20]Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur, Wencai Du:
Constructing E-Tourism platform based on service value broker: A knowledge management perspective. IEEE BigData 2013: 17-24 - [c19]Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du:
IntegrityMR: Integrity assurance framework for big data analytics and management applications. IEEE BigData 2013: 33-40 - [c18]Jinpeng Wei, Feng Zhu, Calton Pu:
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. ESORICS 2013: 755-774 - [c17]Yucong Duan, Yongzhi Wang, Jinpeng Wei, Ajay Kattepur, Wencai Du:
Value-Added Modelling and Analysis in Service Value Brokerage. ICSOC Workshops 2013: 209-222 - 2012
- [j3]Jinpeng Wei, Calton Pu:
Toward a general defense against kernel queue hooking attacks. Comput. Secur. 31(2): 176-191 (2012) - [c16]Karl A. Morris, Jinpeng Wei, Peter J. Clarke, Fábio M. Costa:
Towards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines. HASE 2012: 82-89 - [c15]Jorge Guerra, Leonardo Mármol, Daniel Campello, Carlos Crespo, Raju Rangaswami, Jinpeng Wei:
Software Persistent Memory. USENIX ATC 2012: 319-331 - 2011
- [c14]Yongzhi Wang, Jinpeng Wei:
VIAF: Verification-Based Integrity Assurance Framework for MapReduce. IEEE CLOUD 2011: 300-307 - [c13]Jinpeng Wei, Feng Zhu, Yasushi Shinjo:
Static analysis based invariant detection for commodity operating systems. CollaborateCom 2011: 287-296 - [c12]Jinpeng Wei, Calton Pu, Keke Chen:
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures. CSIIRW 2011: 69 - 2010
- [j2]Jinpeng Wei, Calton Pu:
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems. Comput. Secur. 29(8): 815-830 (2010) - [c11]Qiong Cheng, Mitsunori Ogihara, Jinpeng Wei, Alexander Zelikovsky:
WS-GraphMatching: a web service tool for graph matching. CIKM 2010: 1949-1950 - [c10]Jinpeng Wei, Calton Pu, Carlos V. Rozas, Anand Rajan, Feng Zhu:
Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective. CloudCom 2010: 651-658 - [c9]Qiong Cheng, Jinpeng Wei, Alexander Zelikovsky, Mitsunori Ogihara:
Fixed-Parameter Tractable Combinatorial Algorithms for Metabolic Networks Alignments. ICDM Workshops 2010: 679-686
2000 – 2009
- 2009
- [b1]Jinpeng Wei:
Improving operating systems security: two case studies. Georgia Institute of Technology, Atlanta, GA, USA, 2009 - [c8]Jinpeng Wei, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning:
Managing security of virtual machine images in a cloud environment. CCSW 2009: 91-96 - 2008
- [j1]Jinpeng Wei, Lenin Singaravelu, Calton Pu:
A Secure Information Flow Architecture for Web Service Platforms. IEEE Trans. Serv. Comput. 1(2): 75-87 (2008) - [c7]Lenin Singaravelu, Jinpeng Wei, Calton Pu:
A Secure Information Flow Architecture for Web Services. IEEE SCC (1) 2008: 182-189 - [c6]Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu:
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. ACSAC 2008: 97-107 - 2007
- [c5]Jinpeng Wei, Calton Pu:
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks. DSN 2007: 358-367 - [c4]Jinpeng Wei, Jeffrey R. Jackson, John A. Wiegert:
Towards Scalable and High Performance I/O Virtualization - A Case Study. HPCC 2007: 586-598 - [c3]Jinpeng Wei, Lenin Singaravelu, Calton Pu:
Guarding Sensitive Information Streams through the Jungle of Composite Web Services. ICWS 2007: 455-462 - 2006
- [c2]Calton Pu, Jinpeng Wei:
A Methodical Defense against TOCTTOU Attacks: The EDGI Approach. ISSSE 2006 - 2005
- [c1]Jinpeng Wei, Calton Pu:
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study. FAST 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint