default search action
Jianhua Sun 0002
Person information
- affiliation: Hunan University, Changsha, China
Other persons with the same name
- Jianhua Sun — disambiguation page
- Jinghua Sun 0001 (aka: Jianhua Sun 0001) — Dongguan University of Technology, Dongguan, China
- Jianhua Sun 0003 — Shanghai Jiao Tong University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j30]Guoyun Duan, Hai Zhao, Minjie Cai, Jianhua Sun, Hao Chen:
DFL: A DOM sample generation oriented fuzzing framework for browser rendering engines. Inf. Softw. Technol. 177: 107591 (2025) - 2024
- [j29]Guoyun Duan, Haopeng Liu, Minjie Cai, Jianhua Sun, Hao Chen:
MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware. Comput. Secur. 144: 103969 (2024) - [j28]Zhiwen Chen, Daokun Hu, Wenkui Che, Jianhua Sun, Hao Chen:
A quantitative evaluation of persistent memory hash indexes. VLDB J. 33(2): 375-397 (2024) - 2023
- [j27]Guoyun Duan, Yuanzhi Fu, Boyang Zhang, Peiyao Deng, Jianhua Sun, Hao Chen, Zhiwen Chen:
TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation. Future Gener. Comput. Syst. 144: 192-204 (2023) - [j26]Guoyun Duan, Yuanzhi Fu, Minjie Cai, Hao Chen, Jianhua Sun:
DongTing: A large-scale dataset for anomaly detection of the Linux kernel. J. Syst. Softw. 203: 111745 (2023) - [j25]Zhiwen Chen, Wenkui Che, Daokun Hu, Xin He, Jianhua Sun, Hao Chen:
On the Performance Intricacies of Persistent Memory Aware Storage Engines. IEEE Trans. Knowl. Data Eng. 35(10): 10365-10382 (2023) - 2022
- [j24]Wentao Li, Zhiwen Chen, Xin He, Guoyun Duan, Jianhua Sun, Hao Chen:
CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation. Future Gener. Comput. Syst. 127: 384-395 (2022) - [j23]Bang Di, Daokun Hu, Zhen Xie, Jianhua Sun, Hao Chen, Jinkui Ren, Dong Li:
TLB-pilot: Mitigating TLB Contention Attack on GPUs with Microarchitecture-Aware Scheduling. ACM Trans. Archit. Code Optim. 19(1): 9:1-9:23 (2022) - [c38]Daokun Hu, Zhiwen Chen, Wenkui Che, Jianhua Sun, Hao Chen:
Halo: A Hybrid PMem-DRAM Persistent Hash Index with Fast Recovery. SIGMOD Conference 2022: 1049-1063 - [c37]Xin He, Jianhua Sun, Hao Chen, Dong Li:
Campo: Cost-Aware Performance Optimization for Mixed-Precision Neural Network Training. USENIX ATC 2022: 505-518 - 2021
- [j22]Xin He, Yapeng Yao, Zhiwen Chen, Jianhua Sun, Hao Chen:
Efficient parallel A* search on multi-GPU system. Future Gener. Comput. Syst. 123: 35-47 (2021) - [j21]Daokun Hu, Zhiwen Chen, Jianbing Wu, Jianhua Sun, Hao Chen:
Persistent Memory Hash Indexes: An Experimental Evaluation. Proc. VLDB Endow. 14(5): 785-798 (2021) - [j20]Bang Di, Jianhua Sun, Hao Chen, Dong Li:
Efficient Buffer Overflow Detection on GPU. IEEE Trans. Parallel Distributed Syst. 32(5): 1161-1177 (2021) - [c36]Chenlin Huang, Yusong Tan, Guoyun Duan, Zhiwen Chen, Boyang Zhang, Peiyao Deng, Qianxiang Zhang, Jianhua Sun, Hao Chen, Guoqing Xiao, Qing Liao:
A Coverage-Guided Fuzzing Framework for Trusted Execution Environments. HPCC/DSS/SmartCity/DependSys 2021: 775-782
2010 – 2019
- 2019
- [j19]Wentao Li, Jianhua Sun, Hao Chen:
Detecting Undefined Behaviors in CUDA C. IEEE Access 7: 182559-182572 (2019) - [c35]Jiang Wu, Bang Di, Jianhua Sun, Hao Chen, Xionghu Zhong, Daokun Hu, Chenlin Huang:
A Fast and Secure GPU Memory Allocator. HPCC/SmartCity/DSS 2019: 146-153 - [c34]Can Peng, Chenlin Huang, Daokun Hu, Bang Di, Jianhua Sun, Hao Chen, Xionghu Zhong:
Address Randomization for Dynamic Memory Allocators on the GPU. HPCC/SmartCity/DSS 2019: 570-577 - 2018
- [j18]Zhiwen Chen, Xin He, Jianhua Sun, Hao Chen, Ligang He:
Concurrent hash tables on multicore machines: Comparison, evaluation and implications. Future Gener. Comput. Syst. 82: 127-141 (2018) - [j17]Zhiwen Chen, Xin He, Jianhua Sun, Hao Chen:
Have Your Cake and Eat it (Too): A Concurrent Hash Table with Hardware Transactions. Int. J. Parallel Program. 46(4): 699-709 (2018) - [c33]Bang Di, Jianhua Sun, Dong Li, Hao Chen, Zhe Quan:
GMOD: a dynamic GPU memory overflow detector. PACT 2018: 20:1-20:13 - 2017
- [j16]Cheng Chang, Ligang He, Nadeem Chaudhary, Songling Fu, Hao Chen, Jianhua Sun, Kenli Li, Zhangjie Fu, Ming-Liang Xu:
Performance analysis and optimization for workflow authorization. Future Gener. Comput. Syst. 67: 194-205 (2017) - [j15]Zhuoer Gu, Ligang He, Cheng Chang, Jianhua Sun, Hao Chen, Chenlin Huang:
Developing an Efficient Pattern Discovery Method for CPU Utilizations of Computers. Int. J. Parallel Program. 45(4): 853-878 (2017) - [j14]Wenyong Zhong, Jianhua Sun, Hao Chen, Jun Xiao, Zhiwen Chen, Cheng Chang, Xuanhua Shi:
Optimizing Graph Processing on GPUs. IEEE Trans. Parallel Distributed Syst. 28(4): 1149-1162 (2017) - [c32]Xin He, Zhiwen Chen, Jianhua Sun, Hao Chen, Dong Li, Zhe Quan:
Exploring Synchronization in Cache Coherent Manycore Systems: A Case Study with Xeon Phi. ICPADS 2017: 232-239 - 2016
- [j13]Jianhua Sun, Lingjun She, Hao Chen, Wenyong Zhong, Cheng Chang, Zhiwen Chen, Wentao Li, Shuna Yao:
Automatically identifying apps in mobile traffic. Concurr. Comput. Pract. Exp. 28(14): 3927-3941 (2016) - [j12]Rong Wang, Hao Chen, Jianhua Sun:
Phoney: protecting password hashes with threshold cryptology and honeywords. Int. J. Embed. Syst. 8(2/3): 146-154 (2016) - [j11]Zhengyu Chen, Jianhua Sun, Hao Chen:
Optimizing Checkpoint Restart with Data Deduplication. Sci. Program. 2016: 9315493:1-9315493:11 (2016) - [j10]Cheng Chang, Jianhua Sun, Hao Chen:
Coral: A Cloud-Backed Frugal File System. IEEE Trans. Parallel Distributed Syst. 27(4): 978-991 (2016) - [j9]Jianhua Sun, Hao Chen, Ligang He, Huailiang Tan:
Redundant Network Traffic Elimination with GPU Accelerated Rabin Fingerprinting. IEEE Trans. Parallel Distributed Syst. 27(7): 2130-2142 (2016) - [c31]Hui Sun, Jianhua Sun, Hao Chen:
Mining Frequent Attack Sequence in Web Logs. GPC 2016: 243-260 - [c30]Bang Di, Jianhua Sun, Hao Chen:
A Study of Overflow Vulnerabilities on GPUs. NPC 2016: 103-115 - 2015
- [c29]Zhuoer Gu, Ligang He, Cheng Chang, Jianhua Sun, Hao Chen, Chenlin Huang:
An efficient method for motif discovery in CPU host load. FSKD 2015: 1027-1034 - [c28]Huanzhou Zhu, Ligang He, Bo Gao, Kenli Li, Jianhua Sun, Hao Chen, Keqin Li:
Modelling and Developing Co-scheduling Strategies on Multicore Processors. ICPP 2015: 220-229 - [c27]Jianhua Sun, Dongwei Zhou, Hao Chen, Cheng Chang, Zhiwen Chen, Wentao Li, Ligang He:
GPSA: A Graph Processing System with Actors. ICPP 2015: 709-718 - 2014
- [j8]Hao Chen, Jianhua Sun, Ligang He, Kenli Li, Huailiang Tan:
BAG: Managing GPU as Buffer Cache in Operating Systems. IEEE Trans. Parallel Distributed Syst. 25(6): 1393-1402 (2014) - [c26]Cheng Chang, Ligang He, Hao Chen, Jianhua Sun, Kenli Li:
Performance Analysis and Optimization for Stochastic Workflows Running under Authorization Constraints. CSE 2014: 627-633 - [c25]Chaoqun Li, Jianhua Sun, Hao Chen:
An improved method for tree-based clone detection in Web Applications. DICTAP 2014: 363-367 - [c24]Wenmin Xiao, Jianhua Sun, Hao Chen, Xianghua Xu:
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow. PAAP 2014: 238-243 - 2013
- [j7]Jianhua Sun, Hao Chen, Cheng Chang, Xingbang Li:
Kernel Code Integrity Protection Based on a Virtualized Memory Architecture. Comput. Informatics 32(2): 295-311 (2013) - [j6]Hao Chen, Lin Shi, Jianhua Sun, Kenli Li, Ligang He:
A Fast RPC System for Virtual Machines. IEEE Trans. Parallel Distributed Syst. 24(7): 1267-1276 (2013) - [c23]Chao Chen, Ligang He, Hao Chen, Jianhua Sun, Bo Gao, Stephen A. Jarvis:
Developing communication-aware service placement frameworks in the Cloud economy. CLUSTER 2013: 1-8 - 2012
- [j5]Ligang He, Chenlin Huang, Kewei Duan, Kenli Li, Hao Chen, Jianhua Sun, Stephen A. Jarvis:
Modeling and analyzing the impact of authorization on workflow executions. Future Gener. Comput. Syst. 28(8): 1177-1193 (2012) - [j4]Lin Shi, Hao Chen, Jianhua Sun, Kenli Li:
vCUDA: GPU-Accelerated High-Performance Computing in Virtual Machines. IEEE Trans. Computers 61(6): 804-816 (2012) - 2011
- [c22]Ligang He, Chenlin Huang, Kenli Li, Hao Chen, Jianhua Sun, Bo Gao, Kewei Duan, Stephen A. Jarvis:
Modelling and analyzing the authorization and execution of video workflows. HiPC 2011: 1-10 - 2010
- [j3]Hao Chen, Jianhua Sun, Qianjie Zhang, Ke Mao:
An Execution-flow Based Method for Detecting Cross-Site Scripting of Ajax Applications. Int. J. Adv. Comp. Techn. 2(4): 67-76 (2010) - [c21]Hao Chen, Lin Shi, Jianhua Sun:
VMRPC: A high efficiency and light weight RPC system for virtual machines. IWQoS 2010: 1-9 - [c20]Ping Zeng, Jianhua Sun, Hao Chen:
Insecure JavaScript Detection and Analysis with Browser-Enforced Embedded Rules. PDCAT 2010: 393-398 - [c19]Jianhua Sun, Hao Chen, Chunmei Niu:
A New Database Firewall Based on Anomaly Detection. PDCAT 2010: 399-404 - [c18]Gaoyi Peng, Jianhua Sun, Hao Chen:
SRCS: Multi-user Web Browser Sharing and Collaboration System. PDCAT 2010: 410-415
2000 – 2009
- 2009
- [c17]Lin Shi, Hao Chen, Jianhua Sun:
vCUDA: GPU accelerated high performance computing in virtual machines. IPDPS 2009: 1-11 - 2008
- [c16]Huailiang Tan, Weixin Tang, Jianhua Sun:
An I/O Acceleration Technology for Network Computing: iTRM. CSSE (3) 2008: 275-278 - [c15]Jianhua Sun, Lijuan Li, Hao Chen, Huailiang Tan:
A Proximity-Aware Load Balancing Algorithm in P2P Systems. GPC Workshops 2008: 364-369 - [c14]Dingding Li, Hao Chen, Jianhua Sun, Huailiang Tan, Qianjie Zhang:
Dumpling: An Efficient Method Based on Clustering for Network Positioning. GPC Workshops 2008: 370-375 - [c13]Huailiang Tan, Yan Wang, Jianhua Sun:
A Dynamic Rebuild Strategy of Multi-host System Volume on Transparence Computing Mode. HPCC 2008: 981-986 - 2007
- [c12]Jianhua Sun, Jizha Qin, Shu Chen, Hao Chen, Dingding Li:
A Virus Immunization Model Based on Communities in Large Scale Networks. SNPD (3) 2007: 917-922 - 2006
- [j2]Hao Chen, Hai Jin, Jianhua Sun:
Measurements of topological characteristics for Peer-to-Peer systems. Int. J. High Perform. Comput. Netw. 4(1/2): 91-101 (2006) - 2005
- [c11]En Cheng, Hai Jin, Zongfen Han, Jianhua Sun:
Network-Based Anomaly Detection Using an Elman Network. ICCNMC 2005: 471-480 - [c10]Hai Jin, Zhiling Yang, Jianhua Sun, Xuping Tu, Zongfen Han:
CIPS: Coordinated Intrusion Prevention System. ICOIN 2005: 89-98 - 2004
- [c9]Hao Chen, Hai Jin, Jianhua Sun, Dafu Deng, Xiaofei Liao:
Analysis of large-scale topological properties for peer-to-peer networks. CCGRID 2004: 27-34 - [c8]Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han:
A Fuzzy Data Mining Based Intrusion Detection Model. FTDCS 2004: 191-197 - [c7]Hao Chen, Hai Jin, Jianhua Sun, Zongfen Han:
Efficient Immunization Algorithm for Peer-to-Peer Networks. HiPC 2004: 232-241 - [c6]Hao Chen, Hai Jin, Jianhua Sun, Zongfen Han:
Efficient Immunization Algorithm for Peer-to-Peer Networks. International Conference on Computational Science 2004: 623-626 - [e1]Hai Jin, Yi Pan, Nong Xiao, Jianhua Sun:
Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings. Lecture Notes in Computer Science 3251, Springer 2004, ISBN 3-540-23564-7 [contents] - 2003
- [j1]Hai Jin, Deqing Zou, Hanhua Chen, Jianhua Sun, Song Wu:
Fault-Tolerant Grid Architecture and Practice. J. Comput. Sci. Technol. 18(4): 423-433 (2003) - [c5]Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han:
Server Scheduling Scheme for Asynchronous Cluster Video Server. AINA 2003: 509-513 - [c4]Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han:
A Compound Intrusion Detection Model. ICICS 2003: 370-381 - [c3]Jianhua Sun, Hai Jin, Hao Chen, Zongfen Han, Deqing Zou:
A Data Mining Based Intrusion Detection Model. IDEAL 2003: 677-684 - [c2]Hai Jin, Hao Chen, Jianhua Sun:
Optimal Resource Allocation with Mixed Use of M/M/1/K and /M/M/m/K Queueing Systems in Video-on-Demand Systems. MMM 2003: 493- - 2002
- [c1]Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han:
A Risk-Sensitive Intrusion Detection Model. ICISC 2002: 107-117
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint