Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
e w page
Hansel, S.J.
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Haydee Jimenez
Chen Ma
Home
/
Author
/
WANYU ZANG
Author Info
Open Visualization
Name
Affiliation
Papers
WANYU ZANG
Department of Computer Science, Western Illinois University, 1 University Drive, Macomb, IL 61455, USA
30
Collaborators
Citations
PageRank
35
193
21.20
Referers
Referees
References
457
867
485
Search Limit
100
867
Publications (30 rows)
Collaborators (35 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Quantify Co-Residency Risks in the Cloud Through Deep Learning
0
0.34
2021
On the Cost-Effectiveness of TrustZone Defense on ARM Platform.
0
0.34
2020
Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling.
0
0.34
2018
Energy efficient approximate self-adaptive data collection in wireless sensor networks.
1
0.36
2016
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.
0
0.34
2015
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system
2
0.40
2015
Risk balance defense approach against intrusions for network server
2
0.40
2014
Obtaining K-obfuscation for profile privacy in social networks
0
0.34
2014
Approximate Self-Adaptive Data Collection in Wireless Sensor Networks.
0
0.34
2014
MyCloud: supporting user-configured privacy protection in cloud computing
17
0.67
2013
Quantitative survivability evaluation of three virtual machine-based server architectures
5
0.54
2013
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
0
0.34
2012
Incentive Compatible Moving Target Defense Against Vm-Colocation Attacks In Clouds
26
0.96
2012
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks
4
0.40
2012
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
6
0.46
2012
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks
6
0.46
2011
Recovery of data integrity under multi-tier architectures
0
0.34
2010
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures
2
0.39
2010
The implementation and evaluation of a recovery system for workflows
5
0.53
2009
An Attack-Resilient Channel Assignment MAC Protocol
1
0.35
2009
Decentralized Trust Management based on the Reputation of Information Sources.
1
0.37
2007
Database Isolation and Filtering against Data Corruption Attacks
3
0.42
2007
A dead-lock free self-healing algorithm for distributed transactional processes
0
0.34
2006
Specifying and using intrusion masking models to process distributed operations
0
0.34
2005
Defensive Execution of Transactional Processes against Attacks
1
0.38
2005
Incentive-based modeling and inference of attacker intent, objectives, and strategies
73
8.47
2005
Self-Healing Workflow Systems under Attacks
20
0.83
2004
Intrusion Masking for Distributed Atomic Operations
3
0.40
2003
Multi-version attack recovery for workflow systems
12
0.67
2003
JAPS-II: A Source to Source Parallelizing Compiler for Java
3
0.39
2002
1