Author of the publication

Security RBSG: Protecting Phase Change Memory with Security-Level Adjustable Dynamic Mapping.

, , , , , , , and . IPDPS, page 1081-1090. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication., , , , , , and . INFOCOM, page 1337-1345. IEEE, (2015)An Efficient Parallel Scheduling Scheme on Multi-partition PCM Architecture., , , , , and . ISLPED, page 344-349. ACM, (2016)Prober: exploiting sequential characteristics in buffer for improving SSDs write performance., , , , , , and . Frontiers of Computer Science, 10 (5): 951-964 (2016)Security RBSG: Protecting Phase Change Memory with Security-Level Adjustable Dynamic Mapping., , , , , , , and . IPDPS, page 1081-1090. IEEE Computer Society, (2016)A Fast Asymmetric Extremum Content Defined Chunking Algorithm for Data Deduplication in Backup Storage Systems., , , , , , and . IEEE Trans. Computers, 66 (2): 199-211 (2017)Increasing Lifetime and Security of Phase-Change Memory with Endurance Variation., , , , , and . ICPADS, page 861-868. IEEE, (2016)Accelerating Restore and Garbage Collection in Deduplication-based Backup Systems via Exploiting Historical Information., , , , , , , and . USENIX Annual Technical Conference, page 181-192. USENIX Association, (2014)Reducing Fragmentation for In-line Deduplication Backup Storage via Exploiting Backup History and Cache Knowledge., , , , , , , , and . IEEE Trans. Parallel Distrib. Syst., 27 (3): 855-868 (2016)SAWL: A Self-adaptive Wear-leveling NVM Scheme for High Performance Storage Systems., , , , and . CoRR, (2019)SecDep: A user-aware efficient fine-grained secure deduplication scheme with multi-level key management., , , , , , and . MSST, page 1-14. IEEE Computer Society, (2015)