Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
István Fekete
Claudia Calabrese
Maria Concetta Palumbo
Josef Maier
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Sho Iwazaki
Home
/
Author
/
WENHAO WANG
Author Info
Open Visualization
Name
Affiliation
Papers
WENHAO WANG
The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
29
Collaborators
Citations
PageRank
99
60
10.80
Referers
Referees
References
258
547
229
Search Limit
100
547
Publications (29 rows)
Collaborators (99 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability
0
0.34
2021
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
2
0.36
2021
Practical and Efficient in-Enclave Verification of Privacy Compliance
0
0.34
2021
TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks
0
0.34
2020
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment
2
0.36
2020
Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks
0
0.34
2020
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
0
0.34
2019
Confirm: Evaluating Compatibility And Relevance Of Control-Flow Integrity Protections For Modern Software
1
0.34
2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
0
0.34
2019
A Tracking Window Adaptive Compressive Tracking Algorithm
0
0.34
2019
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK.
0
0.34
2018
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
0
0.34
2018
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
3
0.39
2018
Improved CT algorithm based on target block division and feature points matching
0
0.34
2018
Feedback based Sampling for Intrusion Detection in Software Defined Network
0
0.34
2018
Strip wrinkling detection based on feature extraction and sparse representation.
0
0.34
2017
User Capacity of Wireless Physical-Layer Identification.
0
0.34
2017
Binary Code Retrofitting and Hardening Using SGX.
0
0.34
2017
Traffic lights detection and recognition based on multi-feature fusion.
1
0.35
2017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
44
1.08
2017
A Replay-Attack Resistant Authentication Scheme for the Internet of Things
0
0.34
2017
An algorithm for evaluating the influence of micro-blog users.
0
0.34
2016
User Capacity Of Wireless Physical-Layer Identification: An Information-Theoretic Perspective
2
0.36
2015
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation".
0
0.34
2013
An Anomaly Detection Model Based on Cloud Model and Danger Theory.
0
0.34
2013
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited
1
0.36
2013
A new variant of time memory trade-off on the improvement of thing and ying's attack
1
0.38
2012
Improvement and analysis of VDP method in time/memory tradeoff applications
3
0.40
2011
Analysis and Improvement of Thing's Time-Memory Trade-Off Attack.
0
0.34
2011
1