QIANG WEI ZHONG
·Paper Publications
- [1] Sheng Wang, Weizhong Qiang, Hai Jin, Jinfeng Yuan: CovertInspector: Identification of Shared Memory Covert Timing Channel in Multi-tenanted Cloud. International Journal of Parallel Programming 45(1): 142-156 (2017).2020,
- [2] Weizhong Qiang, Feng Chen, Laurence T. Yang, Hai Jin: MUC: Updating cloud applications dynamically via multi-version execution. Future Gener. Comput. Syst. 74: 254-264 (2017).2020,
- [3] Weizhong Qiang, Shifan Xin, Hai Jin, Guozhong Sun: DroidAuditor: A framework for auditing covert communication on Android. Concurr. Comput. Pract. Exp. 29(19) (2017).2020,
- [4] Weizhong Qiang, Gongping Xu, Weiqi Dai, Deqing Zou, Hai Jin: CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection. IEEE Access 5: 21962-21976 (2017).2020,
- [5] Weizhong Qiang, Yuehua Liao, Guozhong Sun, Laurence T. Yang, Deqing Zou, Hai Jin: Patch-Related Vulnerability Detection Based on Symbolic Execution. IEEE Access 5: 20777-20784 (2017).2020,
- [6] Weizhong Qiang, Shizhen Wang, Hai Jin: Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS. Security and Communication Networks 2018: 3130652:1-3130652:11 (2018).2020,
- [7] Weizhong Qiang, Jiawei Yang, Hai Jin, Xuanhua Shi: PrivGuard: Protecting Sensitive Kernel Data From Privilege Escalation Attacks. IEEE Access 6: 46584-46594 (2018).2020,
- [8] Chin-Feng Lai, Wei-Che Chien, Laurence T. Yang, Weizhong Qiang: LSTM and Edge Computing for Big Data Feature Recognition of Industrial Electrical Equipment. IEEE Trans. Industrial Informatics 15(4): 2469-2477 (2019).2020,
- [9] Weizhong Qiang, Weifeng Li, Hai Jin, Jayachander Surbiryala: Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers. IEEE Access 7: 45961-45977 (2019).2020,
- [10] Weizhong Qiang,Weizhong Qiang.CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment.IEEE Transactions on Cloud Computing,2020,
|