default search action
Bibo Tu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Yu Tian, Haojun Xia, Chen Li, Bibo Tu:
An Efficient Caching Mechanism for End-host Network Functions. CSCWD 2024: 699-704 - [c41]Yang Xu, Chen Li, Kun Zhang, Haojun Xia, Bibo Tu:
EI-XIDS: An explainable intrusion detection system based on integration framework. CSCWD 2024: 2680-2685 - [c40]Haojun Xia, Hongwei Liu, Da Zhang, Haohao Liu, Xiaotong Wang, Bibo Tu:
Continuous Authentication Technology Based on Device Driver Behavior. CSCWD 2024: 2806-2811 - [c39]Shuang Liang, Haojun Xia, Chen Li, Bibo Tu:
Desktop Virtualization Optimization Methods Based on IDV Architecture. CSCWD 2024: 2894-2899 - 2023
- [j9]Mingming Hu, Kun Zhang, Ruibang You, Bibo Tu:
AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer. Comput. Secur. 127: 103122 (2023) - [j8]Mingming Hu, Kun Zhang, Ruibang You, Bibo Tu:
Multisensor-Based Continuous Authentication of Smartphone Users With Two-Stage Feature Extraction. IEEE Internet Things J. 10(6, March 15): 4708-4724 (2023) - [j7]Kunli Lin, Wenqing Liu, Kun Zhang, Bibo Tu:
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation. IEEE Trans. Dependable Secur. Comput. 20(4): 2925-2938 (2023) - 2022
- [c38]Qi Wang, Haojun Xia, Kun Zhang, Bibo Tu:
Evaluation and Optimization on Virtualization Performance Cost under Semantic Gap. CSCWD 2022: 329-334 - [c37]Hongwei Liu, Haojun Xia, Bibo Tu:
Secure and Efficient BMC-Based Centralized Management Method for Large-Scale Data Centers. HPCC/DSS/SmartCity/DependSys 2022: 1328-1335 - [c36]Yanchang Feng, Chen Li, Bibo Tu:
A Novel Discrete Bi-objective Optimization Method for Virtual Machine Placement. ICPADS 2022: 617-624 - [c35]Hongwei Liu, Haojun Xia, Bibo Tu, Da Zhang, Xiaotong Wang:
A Secure and Efficient USB-based In-band Communication Interface between Host and BMC. ISPA/BDCloud/SocialCom/SustainCom 2022: 228-237 - [c34]Xiaohan Ma, Chen Li, Bibo Tu:
An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge Graph. ISPA/BDCloud/SocialCom/SustainCom 2022: 700-707 - [c33]Chen Li, Bibo Tu, Yanchang Feng:
The Shared Memory Based Cryptographic Card Virtualization. SciSec 2022: 137-151 - [i4]Mingming Hu, Kun Zhang, Ruibang You, Bibo Tu:
Relative Attention-based One-Class Adversarial Autoencoder for Continuous Authentication of Smartphone Users. CoRR abs/2210.16819 (2022) - 2021
- [j6]Lulu Yang, Chen Li, Ruibang You, Bibo Tu, Linghui Li:
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings. Cybersecur. 4(1) (2021) - [c32]Lulu Yang, Chen Li, Ruibang You, Bibo Tu:
A Keystroke-based Continuous User Authentication in Virtual Desktop Infrastructure. ICCCS 2021: 753-758 - [c31]Kunli Lin, Wenqing Liu, Kun Zhang, Haojun Xia, Bibo Tu:
HyperKRP: A Kernel Runtime Security Architecture with A Tiny Hypervisor on Commodity Hardware. GLOBECOM 2021: 1-6 - [c30]Lin Wang, Chen Li, Bibo Tu:
Evalt: Authenticate Implicitly Before Attacks. ICT 2021: 1-7 - [c29]Kunli Lin, Haojun Xia, Kun Zhang, Bibo Tu:
AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level. ISPA/BDCloud/SocialCom/SustainCom 2021: 117-124 - [c28]Jie Cheng, Kun Zhang, Bibo Tu:
Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center. TrustCom 2021: 180-187 - [c27]Lin Wang, Kun Zhang, Chen Li, Bibo Tu:
Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust. TrustCom 2021: 643-650 - 2020
- [j5]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [c26]Min Zhu, Bibo Tu, Jia Liu, Letian Yi:
HypFDI: Fault Domain Isolation for Hosted Hypervisor in ARM. CSE 2020: 36-43
2010 – 2019
- 2019
- [j4]Song Wei, Kun Zhang, Bibo Tu:
HyperBench: A Benchmark Suite for Virtualization Capabilities. Proc. ACM Meas. Anal. Comput. Syst. 3(2): 24:1-24:22 (2019) - [c25]Ruibang You, Zimu Yuan, Bibo Tu, Jie Cheng:
HP-SDDAN: High-Performance Software-Defined Data Access Network. HPCC/SmartCity/DSS 2019: 849-856 - [c24]Wenqing Liu, Kun Zhang, Bibo Tu, Kunli Lin:
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation. HPCC/SmartCity/DSS 2019: 981-988 - [c23]Ruibang You, Bibo Tu, Zimu Yuan, Jie Cheng:
SecFT-SDN: Securing the Flow-Table for Software-Defined Network. ISPA/BDCloud/SocialCom/SustainCom 2019: 1139-1146 - [c22]Song Wei, Kun Zhang, Bibo Tu:
HyperBench: A Benchmark Suite for Virtualization Capabilities. SIGMETRICS (Abstracts) 2019: 73-74 - [c21]Kunli Lin, Wenqing Liu, Kun Zhang, Bibo Tu:
HyperMI: A Privilege-level VM Protection Approach against Compromised Hypervisor. TrustCom/BigDataSE 2019: 58-65 - 2018
- [j3]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [c20]Min Zhu, Kun Zhang, Bibo Tu:
PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. ICICS 2018: 566-583 - [c19]Lin Wang, Min Zhu, Qing Li, Bibo Tu:
Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. ICICS 2018: 721-731 - 2017
- [c18]Lina Jia, Min Zhu, Bibo Tu:
T-VMI: Trusted Virtual Machine Introspection in Cloud Environments. CCGrid 2017: 478-487 - [c17]Min Zhu, Bibo Tu, Wei Wei, Dan Meng:
HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM. VEE 2017: 242-256 - 2014
- [c16]Min Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng:
DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes. INTRUST 2014: 328-345 - 2013
- [c15]Qing Li, Yong Li, Bibo Tu, Dan Meng:
An Adaptive Resource Sharing Platform for Internet Data Center. HPCC/EUC 2013: 1179-1186 - [c14]Jue Hong, Pavan Balaji, Gaojin Wen, Bibo Tu, Junming Yan, Cheng-Zhong Xu, Shengzhong Feng:
Container-Based Job Management for Fair Resource Sharing. ISC 2013: 290-301 - 2012
- [j2]Bibo Tu, Jianping Fan, Jianfeng Zhan, Xiaofang Zhao:
Performance analysis and optimization of MPI collective operations on multi-core clusters. J. Supercomput. 60(1): 141-162 (2012) - 2011
- [c13]Xiaohong Zhang, Zhiyong Zhong, Shengzhong Feng, Bibo Tu, Jianping Fan:
Improving Data Locality of MapReduce by Scheduling in Homogeneous Computing Environments. ISPA 2011: 120-126 - 2010
- [j1]Peng Wang, Dan Meng, Jizhong Han, Jianfeng Zhan, Bibo Tu, Xiaofeng Shi, Le Wan:
Transformer: A New Paradigm for Building Data-Parallel Programming Models. IEEE Micro 30(4): 55-64 (2010) - [c12]Kai Wang, Jizhong Han, Bibo Tu, Jiao Dai, Wei Zhou, Xuan Song:
Accelerating Spatial Data Processing with MapReduce. ICPADS 2010: 229-236 - [i3]Xu Liu, Lin Yuan, Jianfeng Zhan, Bibo Tu, Dan Meng:
Automatic Performance Debugging of SPMD Parallel Programs. CoRR abs/1002.4264 (2010)
2000 – 2009
- 2009
- [c11]Bibo Tu, Jianping Fan, Jianfeng Zhan, Xiaofang Zhao:
Accurate Analytical Models for Message Passing on Multi-core Clusters. PDP 2009: 133-139 - [i2]Xu Liu, Jianfeng Zhan, Bibo Tu, Ming Zou, Dan Meng:
Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs. CoRR abs/0906.1326 (2009) - [i1]Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan Meng:
Phoenix Cloud : Consolidating Heterogeneous Workloads of Large Organizations on Cloud Computing Platforms. CoRR abs/0906.1346 (2009) - 2008
- [c10]Bibo Tu, Ming Zou, Jianfeng Zhan, Xiaofang Zhao, Jianping Fan:
Multi-core aware optimization for MPI collectives. CLUSTER 2008: 322-325 - [c9]Bibo Tu, Ming Zou, Jianfeng Zhan, Jianping Fan:
Design Techniques for the Scalability of Cluster Management Software on Dawning Supercomputers. ISPA 2008: 559-565 - [c8]Xu Liu, Bibo Tu, Jianfeng Zhan, Dan Meng:
A Fast-Start, Fault-Tolerant MPI Launcher on Dawning Supercomputers. PDCAT 2008: 263-266 - 2007
- [c7]Jianfeng Zhan, Lei Wang, Bibo Tu, Zhihong Zhang, Yu Wen, Yuansheng Chen, Wei Zhou, Dan Meng, Ninghui Sun:
A layered design methodology of cluster system stack. CLUSTER 2007: 404-409 - [c6]Jianfeng Zhan, Lei Wang, Bibo Tu, Hui Wang, Zhihong Zhang, Yi Jin, Yu Wen, Yuansheng Chen, Peng Wang, Bizhu Qiu, Dan Meng, Ninghui Sun:
The design methodology of Phoenix cluster system software stack. China HPC 2007: 174-182 - 2006
- [c5]Jianfeng Zhan, Gengpu Liu, Lei Wang, Bibo Tu, Yi Jin, Yang Li, Yan Hao, Xuehai Hong, Dan Meng, Ninghui Sun:
PhoenixG: A Unified Management Framework for Industrial Information Grid. CCGRID 2006: 489-496 - [c4]Linping Wu, Dan Meng, Jianfeng Zhan, Lei Wang, Bibo Tu:
A Failure-Aware Scheduling Strategy in Large-Scale Cluster System. CCGRID 2006: 645-648 - [c3]Linping Wu, Chao Ren, Dan Meng, Jianfeng Zhan, Bibo Tu:
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems. PDCAT 2006: 364-367 - [c2]Bibo Tu, Ming Zou, Jianfeng Zhan, Lei Wang, Jianping Fan:
Design Patterns of Scalable Cluster System Software. PDCAT 2006: 415-420 - 2003
- [c1]Hai Jin, Jie Xu, Bibo Tu, Shengli Li:
Disk I/O mixed scheduling strategy for VoD servers. ISCAS (2) 2003: 504-507
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint