Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Maria Concetta Palumbo
Osvaldo Mendez
Maxime Klein
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Mathias Uhlen
Radu Timofte
Kuanrui Yin
Home
/
Author
/
YEPING HE
Author Info
Open Visualization
Name
Affiliation
Papers
YEPING HE
Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China 100190
34
Collaborators
Citations
PageRank
53
77
14.64
Referers
Referees
References
171
755
411
Search Limit
100
755
Publications (34 rows)
Collaborators (53 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Evaluation of Compilers' Capability of Automatic Vectorization Based on Source Code Analysis
0
0.34
2021
Partial-SMT: Core-Scheduling Protection Against SMT Contention-Based Attacks
0
0.34
2020
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one.
0
0.34
2017
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation
0
0.34
2016
Systemic threats to hypervisor non-control data
4
0.41
2013
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data
5
0.43
2013
hGuard: A Framework to Measure Hypervisor Critical Files
0
0.34
2013
Baggy Bounds with Accurate Checking
2
0.44
2012
Building Large Scale Text Corpus for Tibetan Natural Language Processing by Extracting Text from Web Pages
1
0.39
2012
Improving Flask Implementation Using Hardware Assisted In-Vm Isolation
2
0.36
2012
Prevent kernel return-oriented programming attacks using hardware virtualization
1
0.43
2012
Return-Oriented Programming Attack on the Xen Hypervisor
4
0.42
2012
Compression Methods by Code Mapping and Code Dividing for Chinese Dictionary Stored in a Double-Array Trie.
2
0.36
2011
Verifying the Safety of Xen Security Modules
0
0.34
2011
Tibetan Word Segmentation as Syllable Tagging Using Conditional Random Field.
6
1.04
2011
Tibetan number identification based on classification of number components in Tibetan word segmentation
2
0.40
2010
Trusted subjects configuration based on TE model in MLS systems
0
0.34
2010
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework
1
0.35
2009
Trust-Based Constraint-Secure Interoperation For Dynamic Mediator-Free Collaboration
0
0.34
2009
Combating Index Poisoning in P2P File Sharing
0
0.34
2009
Separation of Duty in Trust-Based Collaboration
0
0.34
2008
Enforcing Separation of Duty in Ad Hoc Collaboration
1
0.36
2008
An integrity assurance mechanism for run-time programs
0
0.34
2008
Service Authenticity in P2P File-Sharing
1
0.36
2008
Trusted Reputation Management Service for Peer-to-Peer Collaboration
0
0.34
2008
Identity Anonymity for Grid Computing Coordination based on Trusted Computing
4
0.42
2007
A Multilevel Reputation System for Peer-to-Peer Networks
2
0.39
2007
An enhanced n-way exchange-based incentive scheme for p2p file sharing (short paper)
0
0.34
2006
A verifiable formal specification for RBAC model with constraints of separation of duty
15
0.64
2006
A formal model for integrity protection based on DTE technique
0
0.34
2006
Spatial context in role-based access control
5
0.42
2006
A formal description of SECIMOS operating system
1
0.39
2005
A new formal model for privilege control with supporting POSIX capability mechanism
1
0.36
2005
Square Attack on Reduced Camellia Cipher
17
1.54
2001
1