Author of the publication

Research on theory and key technology of trusted computing platform security testing and evaluation.

, , , , , , and . SCIENCE CHINA Information Sciences, 53 (3): 434-453 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzing Framework Based on Symbolic Execution and Combinatorial Testing., , and . GreenCom/iThings/CPScom, page 2076-2080. IEEE, (2013)A Worm Containment Model Based on Neighbor-Alarm., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 449-457. Springer, (2007)An Adaptive Service Strategy Based on User Rating in P2P., , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 860-870. Springer, (2005)PerformTrust: Trust model integrated past and current performance in P2P file sharing systems., , , and . AICCSA, page 718-725. IEEE Computer Society, (2008)Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing., , and . TrustCom, page 328-335. IEEE Computer Society, (2011)Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity., , , and . ICYCS, page 2283-2288. IEEE Computer Society, (2008)Control Flow Integrity Enforcement with Dynamic Code Optimization., , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 366-385. Springer, (2016)A Novel Multistandard Compliant Hand Function Assessment Method Using an Infrared Imaging Device., , , and . IEEE J. Biomedical and Health Informatics, 23 (2): 758-765 (2019)Assigning Block Size Based on Speculation for Parallel Downloading., and . CIT, page 119. IEEE Computer Society, (2006)Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection., , , and . ACSAC, page 392-401. IEEE Computer Society, (2008)