Folgen
Weijie Liu
Weijie Liu
Ant Group
Bestätigte E-Mail-Adresse bei ieee.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Control flow obfuscation using neural network to fight concolic testing
H Ma, X Ma, W Liu, Z Huang, D Gao, C Jia
International Conference on Security and Privacy in Communication Systems …, 2014
202014
On-demand time blurring to support side-channel defense
W Liu, D Gao, MK Reiter
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
192017
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
172022
Multispectral image fusion method based on intensity-hue-saturation and nonsubsampled three-channels non-separable wavelets
B Liu, W Liu, J Peng
Chinese Optics Letters 8 (4), 384-387, 2010
142010
The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition
TT Kuo, X Jiang, H Tang, XF Wang, A Harmanci, M Kim, K Post, D Bu, ...
Journal of the American Medical Informatics Association 29 (12), 2182-2190, 2022
122022
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
L Xu, R Yu, L Wang, W Liu
Tsinghua Science and Technology 24 (5), 535-545, 2019
102019
Construction method of three‐channel non‐separable symmetric wavelets with arbitrary dilation matrices and its applications in multispectral image fusion
B Liu, K Li, W Liu, F Liu
IET Image Processing 7 (7), 679-685, 2013
92013
Practical and efficient in-enclave verification of privacy compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
82021
Incremental CFG patching for binary rewriting
X Meng, W Liu
Proceedings of the 26th ACM International Conference on Architectural …, 2021
72021
The lifting factorization of 2D 4-channel nonseparable wavelet transforms
B Liu, W Liu
Information Sciences 456, 113-130, 2018
72018
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm
L Wang, W Liu, N Kumar, D He, C Tan, D Gao
Security and Communication Networks 9 (16), 3543-3557, 2016
72016
Trust beyond border: lightweight, verifiable user isolation for protecting in-enclave services
W Wang, W Liu, H Chen, XF Wang, H Tian, D Lin
IEEE transactions on dependable and secure computing 20 (1), 522-538, 2021
62021
Understanding TEE containers, easy to use? Hard to trust
W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang
arXiv preprint arXiv:2109.01923, 2021
62021
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection
W Liu, X Liu, Z Li, B Liu, R Yu, L Wang
IEEE Transactions on Information Forensics and Security 17, 2311-2323, 2022
42022
Multi-focus image fusion based on three channel nonseparable symmetrical wavelets
B Liu, W Liu, J Ma
Chinese Journal of Scientific Instrument 33 (5), 1110-1116, 2012
42012
Fusion of multi-spectral image using non-separable additive wavelets for high spatial resolution enhancement
B Liu, W Liu
Image Analysis and Recognition: 8th International Conference, ICIAR 2011 …, 2011
42011
HySec-Flow: privacy-preserving genomic computing with SGX-based big-data analytics framework
C Widanage, W Liu, J Li, H Chen, XF Wang, H Tang, J Fox
2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 733-743, 2021
32021
CAPT: Context-aware provenance tracing for attack investigation
C Tan, L Zhao, W Liu, L Xu, L Wang
China Communications 15 (2), 153-169, 2018
32018
Preventing secret data leakage from foreign mappings in virtual machines
H Gao, L Wang, W Liu, Y Peng, H Zhang
Security and Privacy in Communication Networks: 7th International ICST …, 2012
22012
Fusion of multi-focus images based on three channel non-separable symmetrical wavelet filter banks
W Liu, B Liu
2011 International Conference on Electrical and Control Engineering, 5937-5940, 2011
22011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20