Name
Affiliation
Papers
WANYU ZANG
Department of Computer Science, Western Illinois University, 1 University Drive, Macomb, IL 61455, USA
30
Collaborators
Citations 
PageRank 
35
193
21.20
Referers 
Referees 
References 
457
867
485
Search Limit
100867
Title
Citations
PageRank
Year
Quantify Co-Residency Risks in the Cloud Through Deep Learning00.342021
On the Cost-Effectiveness of TrustZone Defense on ARM Platform.00.342020
Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling.00.342018
Energy efficient approximate self-adaptive data collection in wireless sensor networks.10.362016
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.00.342015
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system20.402015
Risk balance defense approach against intrusions for network server20.402014
Obtaining K-obfuscation for profile privacy in social networks00.342014
Approximate Self-Adaptive Data Collection in Wireless Sensor Networks.00.342014
MyCloud: supporting user-configured privacy protection in cloud computing170.672013
Quantitative survivability evaluation of three virtual machine-based server architectures50.542013
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.00.342012
Incentive Compatible Moving Target Defense Against Vm-Colocation Attacks In Clouds260.962012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks40.402012
Improving Cloud Survivability through Dependency based Virtual Machine Placement.60.462012
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks60.462011
Recovery of data integrity under multi-tier architectures00.342010
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures20.392010
The implementation and evaluation of a recovery system for workflows50.532009
An Attack-Resilient Channel Assignment MAC Protocol10.352009
Decentralized Trust Management based on the Reputation of Information Sources.10.372007
Database Isolation and Filtering against Data Corruption Attacks30.422007
A dead-lock free self-healing algorithm for distributed transactional processes00.342006
Specifying and using intrusion masking models to process distributed operations00.342005
Defensive Execution of Transactional Processes against Attacks10.382005
Incentive-based modeling and inference of attacker intent, objectives, and strategies738.472005
Self-Healing Workflow Systems under Attacks200.832004
Intrusion Masking for Distributed Atomic Operations30.402003
Multi-version attack recovery for workflow systems120.672003
JAPS-II: A Source to Source Parallelizing Compiler for Java30.392002