Name
Affiliation
Papers
YEPING HE
Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China 100190
34
Collaborators
Citations 
PageRank 
53
77
14.64
Referers 
Referees 
References 
171
755
411
Search Limit
100755
Title
Citations
PageRank
Year
Evaluation of Compilers' Capability of Automatic Vectorization Based on Source Code Analysis00.342021
Partial-SMT: Core-Scheduling Protection Against SMT Contention-Based Attacks00.342020
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one.00.342017
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation00.342016
Systemic threats to hypervisor non-control data40.412013
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data50.432013
hGuard: A Framework to Measure Hypervisor Critical Files00.342013
Baggy Bounds with Accurate Checking20.442012
Building Large Scale Text Corpus for Tibetan Natural Language Processing by Extracting Text from Web Pages10.392012
Improving Flask Implementation Using Hardware Assisted In-Vm Isolation20.362012
Prevent kernel return-oriented programming attacks using hardware virtualization10.432012
Return-Oriented Programming Attack on the Xen Hypervisor40.422012
Compression Methods by Code Mapping and Code Dividing for Chinese Dictionary Stored in a Double-Array Trie.20.362011
Verifying the Safety of Xen Security Modules00.342011
Tibetan Word Segmentation as Syllable Tagging Using Conditional Random Field.61.042011
Tibetan number identification based on classification of number components in Tibetan word segmentation20.402010
Trusted subjects configuration based on TE model in MLS systems00.342010
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework10.352009
Trust-Based Constraint-Secure Interoperation For Dynamic Mediator-Free Collaboration00.342009
Combating Index Poisoning in P2P File Sharing00.342009
Separation of Duty in Trust-Based Collaboration00.342008
Enforcing Separation of Duty in Ad Hoc Collaboration10.362008
An integrity assurance mechanism for run-time programs00.342008
Service Authenticity in P2P File-Sharing10.362008
Trusted Reputation Management Service for Peer-to-Peer Collaboration00.342008
Identity Anonymity for Grid Computing Coordination based on Trusted Computing40.422007
A Multilevel Reputation System for Peer-to-Peer Networks20.392007
An enhanced n-way exchange-based incentive scheme for p2p file sharing (short paper)00.342006
A verifiable formal specification for RBAC model with constraints of separation of duty150.642006
A formal model for integrity protection based on DTE technique00.342006
Spatial context in role-based access control50.422006
A formal description of SECIMOS operating system10.392005
A new formal model for privilege control with supporting POSIX capability mechanism10.362005
Square Attack on Reduced Camellia Cipher171.542001