Name
Affiliation
Papers
WENHAO WANG
The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
29
Collaborators
Citations 
PageRank 
99
60
10.80
Referers 
Referees 
References 
258
547
229
Search Limit
100547
Title
Citations
PageRank
Year
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability00.342021
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It20.362021
Practical and Efficient in-Enclave Verification of Privacy Compliance00.342021
TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks00.342020
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment20.362020
Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks00.342020
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.00.342019
Confirm: Evaluating Compatibility And Relevance Of Control-Flow Integrity Protections For Modern Software10.342019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.00.342019
A Tracking Window Adaptive Compressive Tracking Algorithm00.342019
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK.00.342018
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races00.342018
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.30.392018
Improved CT algorithm based on target block division and feature points matching00.342018
Feedback based Sampling for Intrusion Detection in Software Defined Network00.342018
Strip wrinkling detection based on feature extraction and sparse representation.00.342017
User Capacity of Wireless Physical-Layer Identification.00.342017
Binary Code Retrofitting and Hardening Using SGX.00.342017
Traffic lights detection and recognition based on multi-feature fusion.10.352017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.441.082017
A Replay-Attack Resistant Authentication Scheme for the Internet of Things00.342017
An algorithm for evaluating the influence of micro-blog users.00.342016
User Capacity Of Wireless Physical-Layer Identification: An Information-Theoretic Perspective20.362015
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation".00.342013
An Anomaly Detection Model Based on Cloud Model and Danger Theory.00.342013
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited10.362013
A new variant of time memory trade-off on the improvement of thing and ying's attack10.382012
Improvement and analysis of VDP method in time/memory tradeoff applications30.402011
Analysis and Improvement of Thing's Time-Memory Trade-Off Attack.00.342011