The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition TT Kuo, X Jiang, H Tang, XF Wang, A Harmanci, M Kim, K Post, D Bu, ... Journal of the American Medical Informatics Association 29 (12), 2182-2190, 2022 | 26 | 2022 |
Control flow obfuscation using neural network to fight concolic testing H Ma, X Ma, W Liu, Z Huang, D Gao, C Jia International Conference on Security and Privacy in Communication Systems
, 2014 | 25 | 2014 |
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou 2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022 | 21 | 2022 |
On-demand time blurring to support side-channel defense W Liu, D Gao, MK Reiter Computer SecurityESORICS 2017: 22nd European Symposium on Research in
, 2017 | 21 | 2017 |
Understanding TEE containers, easy to use? Hard to trust W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang arXiv preprint arXiv:2109.01923, 2021 | 14 | 2021 |
Multispectral image fusion method based on intensity-hue-saturation and nonsubsampled three-channels non-separable wavelets B Liu, W Liu, J Peng Chinese Optics Letters 8 (4), 384-387, 2010 | 14 | 2010 |
Practical and efficient in-enclave verification of privacy compliance W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ... 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems
, 2021 | 12 | 2021 |
HySec-Flow: privacy-preserving genomic computing with SGX-based big-data analytics framework C Widanage, W Liu, J Li, H Chen, XF Wang, H Tang, J Fox 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 733-743, 2021 | 11 | 2021 |
Incremental CFG patching for binary rewriting X Meng, W Liu Proceedings of the 26th ACM International Conference on Architectural
, 2021 | 11 | 2021 |
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries L Xu, R Yu, L Wang, W Liu Tsinghua Science and Technology 24 (5), 535-545, 2019 | 11 | 2019 |
Construction method of three‐channel non‐separable symmetric wavelets with arbitrary dilation matrices and its applications in multispectral image fusion B Liu, K Li, W Liu, F Liu IET Image Processing 7 (7), 679-685, 2013 | 8 | 2013 |
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection W Liu, X Liu, Z Li, B Liu, R Yu, L Wang IEEE Transactions on Information Forensics and Security 17, 2311-2323, 2022 | 7 | 2022 |
Trust beyond border: lightweight, verifiable user isolation for protecting in-enclave services W Wang, W Liu, H Chen, XF Wang, H Tian, D Lin IEEE transactions on dependable and secure computing 20 (1), 522-538, 2021 | 7 | 2021 |
The lifting factorization of 2D 4-channel nonseparable wavelet transforms B Liu, W Liu Information Sciences 456, 113-130, 2018 | 7 | 2018 |
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm L Wang, W Liu, N Kumar, D He, C Tan, D Gao Security and Communication Networks 9 (16), 3543-3557, 2016 | 7 | 2016 |
Fusion of multi-spectral image using non-separable additive wavelets for high spatial resolution enhancement B Liu, W Liu Image Analysis and Recognition: 8th International Conference, ICIAR 2011
, 2011 | 4 | 2011 |
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation Z Li, W Liu, XF Wang, B Yuan, H Tian, H Jin, S Yan Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications
, 2023 | 3 | 2023 |
CAPT: Context-aware provenance tracing for attack investigation C Tan, L Zhao, W Liu, L Xu, L Wang China Communications 15 (2), 153-169, 2018 | 3 | 2018 |
Multi-focus image fusion based on three channel nonseparable symmetrical wavelets B Liu, W Liu, J Ma Chinese Journal of Scientific Instrument 33 (5), 1110-1116, 2012 | 3 | 2012 |
Preventing secret data leakage from foreign mappings in virtual machines H Gao, L Wang, W Liu, Y Peng, H Zhang Security and Privacy in Communication Networks: 7th International ICST
, 2012 | 2 | 2012 |