default search action
Wenchang Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c49]Dongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang, Jianjun Huang, Wenchang Shi, Zhuo Zhang, Xiangyu Zhang:
Define-Use Guided Path Exploration for Better Forced Execution. ISSTA 2024: 287-299 - [c48]Yuanjun Gong, Jianglei Nie, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang, Jian Zhang:
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection. ICPC 2024: 304-315 - [i6]Meixue Si, Shidong Pan, Dianshu Liao, Xiaoyu Sun, Zhen Tao, Wenchang Shi, Zhenchang Xing:
A Solution toward Transparent and Practical AI Regulation: Privacy Nutrition Labels for Open-source Generative AI-based Applications. CoRR abs/2407.15407 (2024) - 2023
- [j28]Yuan Song, Wenchang Shi, Bo Qin, Bin Liang:
A collective attestation scheme towards cloud system. Clust. Comput. 26(5): 2467-2478 (2023) - [j27]Leilei Qu, Ruojin Xiao, Wenchang Shi:
Interactions of Framing and Timing in Nudging Online Game Security. Comput. Secur. 124: 102962 (2023) - [j26]Yuhang Ding, Yanran Zhang, Bo Qin, Qin Wang, Zihan Yang, Wenchang Shi:
A Scalable Cross-Chain Access Control and Identity Authentication Scheme. Sensors 23(4): 2000 (2023) - [c47]Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang:
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. CCS 2023: 2486-2500 - [c46]Meng Luo, Liling Xin, Yepeng Yao, Zhengwei Jiang, Qiuyun Wang, Wenchang Shi:
Who Are Querying For Me? Egress Measurement For Open DNS Resolvers. CSCWD 2023: 1544-1550 - [c45]Yifu Geng, Bo Qin, Qin Wang, Wenchang Shi, Qianhong Wu:
Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy. ICICS 2023: 571-589 - [c44]Erya Jiang, Bo Qin, Qin Wang, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang:
BDTS: Blockchain-Based Data Trading System. ICICS 2023: 645-664 - [c43]Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang, Jian Zhang:
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers. ICSE 2023: 95-107 - [i5]Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. CoRR abs/2311.06122 (2023) - 2022
- [j25]Meng Luo, Yepeng Yao, Liling Xin, Zhengwei Jiang, Qiuyun Wang, Wenchang Shi:
Measurement for encrypted open resolvers: Applications and security. Comput. Networks 213: 109081 (2022) - [j24]Leilei Qu, Ruojin Xiao, Wenchang Shi, Keman Huang, Bo Qin, Bin Liang:
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges. Comput. Secur. 122: 102891 (2022) - [c42]Yanran Zhang, Sheng Hu, Qin Wang, Bo Qin, Qianhong Wu, Wenchang Shi:
PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme. ICA3PP 2022: 170-191 - [c41]Xiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang, Wei You, Wenchang Shi, Jian Zhang:
Hunting bugs with accelerated optimal graph vertex matching. ISSTA 2022: 64-76 - [c40]Leilei Qu, Ruojin Xiao, Wenchang Shi:
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects. SciSec 2022: 505-521 - [i4]Bo Qin, Qin Wang, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang:
BDTS: A Blockchain-based Data Trading System with Fair Exchange. CoRR abs/2211.10001 (2022) - 2021
- [j23]Yue Yuan, Yi Li, Wenchang Shi:
Detecting multiphase linear ranking functions for single-path linear-constraint loops. Int. J. Softw. Tools Technol. Transf. 23(1): 55-67 (2021) - [j22]Shilei Bai, Bin Liang, Jianjun Huang, Wei You, Jiachun Li, Yaping Li, Wenchang Shi:
Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness. IEEE Trans. Computers 70(9): 1374-1387 (2021) - [j21]Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang:
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction. IEEE Trans. Dependable Secur. Comput. 18(1): 72-85 (2021) - [j20]Jianjun Huang, Songming Han, Wei You, Wenchang Shi, Bin Liang, Jingzheng Wu, Yanjun Wu:
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching. IEEE Trans. Inf. Forensics Secur. 16: 2144-2156 (2021) - [c39]Xiaoyu He, Xiaofei Xie, Yuekang Li, Jianwen Sun, Feng Li, Wei Zou, Yang Liu, Lei Yu, Jianhua Zhou, Wenchang Shi, Wei Huo:
SoFi: Reflection-Augmented Fuzzing for JavaScript Engines. CCS 2021: 2229-2242 - [c38]Leilei Qu, Ruojin Xiao, Cheng Wang, Wenchang Shi:
Design and Evaluation of CFC-targeted Security Nudges. CHI Extended Abstracts 2021: 415:1-415:6 - [c37]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. WWW 2021: 2733-2744 - [i3]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. CoRR abs/2102.09764 (2021) - 2020
- [j19]Jianwei Hou, Minjian Zhang, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
On the fine-grained fingerprinting threat to software-defined networks. Future Gener. Comput. Syst. 107: 485-497 (2020) - [j18]Bo Qin, Jikun Huang, Qin Wang, Xizhao Luo, Bin Liang, Wenchang Shi:
Cecoin: A decentralized PKI mitigating MitM attacks. Future Gener. Comput. Syst. 107: 805-815 (2020) - [j17]Jianwei Hou, Yuewei Li, Jingyang Yu, Wenchang Shi:
A Survey on Digital Forensics in Internet of Things. IEEE Internet Things J. 7(1): 1-15 (2020) - [j16]Hongcheng Li, Jianjun Huang, Bin Liang, Wenchang Shi, Yifang Wu, Shilei Bai:
Identifying parasitic malware as outliers by code clustering. J. Comput. Secur. 28(2): 157-189 (2020) - [j15]Yifang Wu, Jianjun Huang, Bin Liang, Wenchang Shi:
Do not jail my app: Detecting the Android plugin environments by time lag contradiction. J. Comput. Secur. 28(2): 269-293 (2020) - [j14]Wei You, Bin Liang, Wenchang Shi, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. IEEE Trans. Dependable Secur. Comput. 17(1): 209-222 (2020) - [j13]Pan Bian, Bin Liang, Yan Zhang, Chaoqun Yang, Wenchang Shi, Yan Cai:
Corrections to "Detecting Bugs by Discovering Expectations and Their Violations". IEEE Trans. Software Eng. 46(1): 113 (2020) - [c36]Yifu Geng, Bo Qin, Wenchang Shi, Qianhong Wu:
A Paid Message Forwarding Scheme Based on Social Network. Inscrypt 2020: 177-192 - [c35]Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang:
Experimental Comparisons of Verifiable Delay Functions. ICICS 2020: 510-527 - [c34]Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang:
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. ESEC/SIGSOFT FSE 2020: 1101-1113 - [c33]Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi:
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. USENIX Security Symposium 2020: 1165-1182
2010 – 2019
- 2019
- [j12]Yang Ming, Wenchang Shi:
Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage. IEEE Access 7: 122091-122105 (2019) - [j11]Jianwei Hou, Leilei Qu, Wenchang Shi:
A survey on internet of things security from data perspectives. Comput. Networks 148: 295-306 (2019) - [j10]Pan Bian, Bin Liang, Yan Zhang, Chaoqun Yang, Wenchang Shi, Yan Cai:
Detecting Bugs by Discovering Expectations and Their Violations. IEEE Trans. Software Eng. 45(10): 984-1001 (2019) - [c32]Yue Yuan, Wenchang Shi, Bin Liang, Bo Qin:
An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack. CLOUD 2019: 124-131 - [c31]Leilei Qu, Cheng Wang, Ruojin Xiao, Jianwei Hou, Wenchang Shi, Bin Liang:
Towards Better Security Decisions: Applying Prospect Theory to Cybersecurity. CHI Extended Abstracts 2019 - [c30]Yue Yuan, Han Anu, Wenchang Shi, Bin Liang, Bo Qin:
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components. COMPSAC (1) 2019: 66-71 - [c29]Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN. ICICS 2019: 503-520 - [c28]Han Anu, Jie Chen, Wenchang Shi, Jianwei Hou, Bin Liang, Bo Qin:
An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention. ICSME 2019: 125-134 - 2018
- [c27]Bin Liang, Hongcheng Li, Miaoqiang Su, Pan Bian, Xirong Li, Wenchang Shi:
Deep Text Classification Can be Fooled. IJCAI 2018: 4208-4215 - [c26]Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai:
NAR-miner: discovering negative association rules from code for bug detection. ESEC/SIGSOFT FSE 2018: 411-422 - 2017
- [j9]Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi:
Certificateless and identity-based authenticated asymmetric group key agreement. Int. J. Inf. Sec. 16(5): 559-576 (2017) - [j8]Weigang Gong, Wei You, Zan Li, Wenchang Shi, Bin Liang:
一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation). 计算机科学 44(11): 22-26 (2017) - [j7]Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, Jiankun Hu:
Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds. IEEE Trans. Inf. Forensics Secur. 12(4): 940-952 (2017) - [c25]Minjian Zhang, Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
Fine-Grained Fingerprinting Threats to Software-Defined Networks. TrustCom/BigDataSE/ICESS 2017: 128-135 - [i2]Bin Liang, Hongcheng Li, Miaoqiang Su, Pan Bian, Xirong Li, Wenchang Shi:
Deep Text Classification Can be Fooled. CoRR abs/1704.08006 (2017) - [i1]Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang:
Detecting Adversarial Examples in Deep Networks with Adaptive Noise Reduction. CoRR abs/1705.08378 (2017) - 2016
- [j6]Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks. Concurr. Comput. Pract. Exp. 28(10): 2920-2939 (2016) - [j5]Hongwei Zhou, Wenchang Shi, Jinhui Yuan, Fulin Li:
BeCFI: detecting hidden control flow with performance monitoring counters. Int. J. High Perform. Comput. Netw. 9(5/6): 470-479 (2016) - [j4]Zhiyan Zhao, Wenchang Shi:
基于证据链的电子证据可信性分析 (Trustworthiness Analysis of Digital Evidences Based on Chain of Evidences). 计算机科学 43(7): 131-135 (2016) - [c24]Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai:
AntMiner: mining more bugs by reducing noise interference. ICSE 2016: 333-344 - [c23]Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang:
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices. ICSE 2016: 959-970 - [c22]Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang:
Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection. SpaCCS 2016: 478-490 - [c21]Fei Zhao, Wenchang Shi, Bo Qin, Bin Liang:
A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation. TSA 2016: 8-16 - [c20]Bin Liang, Miaoqiang Su, Wei You, Wenchang Shi, Gang Yang:
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter. WWW 2016: 345-356 - 2015
- [c19]Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi:
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. AsiaCCS 2015: 393-404 - [c18]Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang:
Android Implicit Information Flow Demystified. AsiaCCS 2015: 585-590 - [c17]Chenglong Wei, Wenchang Shi, Bo Qin, Bin Liang:
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement. ISPEC 2015: 18-32 - 2014
- [j3]Hua Deng, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Lei Zhang, Jianwei Liu, Wenchang Shi:
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf. Sci. 275: 370-384 (2014) - [c16]Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. AsiaCCS 2014: 425-434 - [c15]Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich:
Scriptless Timing Attacks on Web Browser Privacy. DSN 2014: 112-123 - [c14]Hua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang, Wenchang Shi:
Who Is Touching My Cloud. ESORICS (1) 2014: 362-379 - [c13]Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang:
HDROP: Detecting ROP Attacks Using Performance Monitoring Counters. ISPEC 2014: 172-186 - [c12]Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu, Wenchang Shi:
Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. ISPEC 2014: 496-510 - [c11]Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang:
Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. NSS 2014: 448-461 - 2013
- [c10]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S. M. Chow, Wenchang Shi:
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. Inscrypt 2013: 239-254 - 2012
- [j2]Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng:
Understanding and analyzing network traffic. IEEE Netw. 26(1): 4-5 (2012) - 2011
- [j1]Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng:
Network traffic monitoring, analysis and anomaly detection [Guest Editorial]. IEEE Netw. 25(3): 6-7 (2011) - [c9]Bin Liang, Wei You, Wenchang Shi, Zhaohui Liang:
Detecting stealthy malware with inter-structure and imported signatures. AsiaCCS 2011: 217-227 - [c8]Hui Feng, Wenchang Shi, Zhaohui Liang, Bin Liang:
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study. CMC 2011: 65-70
2000 – 2009
- 2009
- [c7]Wenchang Shi:
On Design of a Trusted Software Base with Support of TPCM. INTRUST 2009: 1-15 - [c6]Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan:
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. MASS 2009: 783-789 - 2008
- [c5]Qi Cui, Wenchang Shi:
An Approach for Compliance Validation of Trusted Computing Applications. WKDD 2008: 574-579 - 2006
- [c4]Yanjun Wu, Wenchang Shi:
Portal monitoring based anti-malware framework: design and implementation. IPCCC 2006 - 2005
- [c3]Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu:
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. ISPEC 2005: 109-120 - [c2]Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Bin Liang:
Security On-demand Architecture with Multiple Modules Support. ISPEC 2005: 121-131 - [c1]Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He:
A Formal Description of SECIMOS Operating System. MMM-ACNS 2005: 286-297
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint