Name
Affiliation
Papers
JINPENG WEI
Florida International University
38
Collaborators
Citations 
PageRank 
76
221
20.22
Referers 
Referees 
References 
596
1064
512
Search Limit
1001000
Title
Citations
PageRank
Year
Coordinating Fast Concurrency Adapting With Autoscaling for SLO-Oriented Web Applications00.342022
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms00.342022
SODA - A System for Cyber Deception Orchestration and Automation.00.342021
CHIMERA: Autonomous Planning and Orchestration for Malware Deception00.342021
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware00.342020
Mitigating Large Response Time Fluctuations through Fast Concurrency Adapting in Clouds00.342020
Binary-centric defense of production operating systems against kernel queue injection attacks00.342019
A Reflective Covert Channel Attack Anchored On Trusted Web Services00.342018
City Disaster Susceptibility Comparisons using Weighted Bipartite Graphs.00.342018
Integritymr: Exploring Result Integrity Assurance Solutions For Big Data Computing Applications00.342016
Toward integrity assurance of outsourced computing — a game theoretic perspective20.372016
Toward protecting control flow confidentiality in cloud-based computation50.532015
MOSE: Live Migration Based On-the-Fly Software Emulation.20.372015
An adaptive middleware design to support the dynamic interpretation of domain-specific models20.362015
Static analysis based invariant detection for commodity operating systems.30.372014
A bipartite-graph based approach for disaster susceptibility comparisons among cities00.342014
Result Integrity Check for MapReduce Computation on Hybrid Clouds80.482013
Constructing E-Tourism platform based on service value broker: A knowledge management perspective00.342013
IntegrityMR: Integrity assurance framework for big data analytics and management applications40.402013
Value-Added Modelling and Analysis in Service Value Brokerage.10.392013
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.00.342013
Toward a general defense against kernel queue hooking attacks10.362012
Towards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines40.402012
Software persistent memory130.642012
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures00.342011
Static analysis based invariant detection for commodity operating systems.00.342011
VIAF: Verification-Based Integrity Assurance Framework for MapReduce230.902011
Fixed-Parameter Tractable Combinatorial Algorithms for Metabolic Networks Alignments00.342010
WS-GraphMatching: a web service tool for graph matching00.342010
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems10.352010
Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective50.452010
Managing security of virtual machine images in a cloud environment874.532009
A Secure Information Flow Architecture for Web Service Platforms90.652008
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense170.812008
A Secure Information Flow Architecture for Web Services30.422008
Towards scalable and high performance I/O virtualization: a case study30.422007
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks50.462007
TOCTTOU vulnerabilities in UNIX-style file systems: an anatomical study230.812005