default search action
Yeping He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He:
Contextual Insight: Detecting Abnormal Device Behaviors in IoT Systems. CSCWD 2024: 1268-1273 - [c30]Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He:
HySense: Hybrid Event Occurrence Detection Method for IoT Devices. ICASSP 2024: 4905-4909 - [c29]Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He:
Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction Graph. ICIC (9) 2024: 363-374 - 2020
- [c28]Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen:
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. TrustCom 2020: 378-385
2010 – 2019
- 2017
- [j7]Tao Wu, Qiusong Yang, Yeping He:
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one. Frontiers Comput. Sci. 11(5): 821-835 (2017) - [i4]Genqiang Wu, Xianyao Xia, Yeping He:
Differential Privacy of Mathematical Functions. CoRR abs/1702.02721 (2017) - [i3]Genqiang Wu, Xianyao Xia, Yeping He:
Extending Differential Privacy for Treating Dependent Records via Information Theory. CoRR abs/1703.07474 (2017) - 2016
- [c27]Genqiang Wu, Yeping He, JingZheng Wu, Xianyao Xia:
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation. Trustcom/BigDataSE/ISPA 2016: 921-928 - [i2]Genqiang Wu, Yeping He, JingZheng Wu, Xianyao Xia:
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation. CoRR abs/1604.03001 (2016) - 2014
- [j6]Genqiang Wu, Yeping He, Yi Lu, Liping Ding:
Privacy-Preserving Location Assurance Protocols for Mobile Applications. J. Softw. 9(8): 1991-2001 (2014) - [i1]Genqiang Wu, Yeping He, Yi Lu, Liping Ding:
Efficient Interval Check in the Presence of Malicious Adversaries. IACR Cryptol. ePrint Arch. 2014: 690 (2014) - 2013
- [j5]Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu:
Systemic threats to hypervisor non-control data. IET Inf. Secur. 7(4): 349-354 (2013) - [c26]Baozeng Ding, Yeping He, Yanjun Wu, Yuqi Lin:
HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data. SERE (Companion) 2013: 26-34 - [c25]Baozeng Ding, Yeping He, Qiming Zhou, Yanjun Wu, JingZheng Wu:
hGuard: A Framework to Measure Hypervisor Critical Files. SERE (Companion) 2013: 176-181 - 2012
- [c24]Baozeng Ding, Yanjun Wu, Yeping He, Shuo Tian, Bei Guan, Guowei Wu:
Return-Oriented Programming Attack on the Xen Hypervisor. ARES 2012: 479-484 - [c23]Huidan Liu, Minghua Nuo, Jian Wu, Yeping He:
Building Large Scale Text Corpus for Tibetan Natural Language Processing by Extracting Text from Web Pages. ALR@COLING 2012: 11-20 - [c22]Shuo Tian, Yeping He, Baozeng Ding:
Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization. ISPEC 2012: 289-300 - [c21]Baozeng Ding, Yeping He, Yanjun Wu, Alex Miller, John Criswell:
Baggy Bounds with Accurate Checking. ISSRE Workshops 2012: 195-200 - [c20]Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He:
Improving Flask Implementation Using Hardware Assisted In-VM Isolation. SEC 2012: 115-125 - 2011
- [c19]Huidan Liu, Minghua Nuo, Long-Long Ma, Jian Wu, Yeping He:
Compression Methods by Code Mapping and Code Dividing for Chinese Dictionary Stored in a Double-Array Trie. IJCNLP 2011: 1189-1197 - [c18]Huidan Liu, Minghua Nuo, Long-Long Ma, Jian Wu, Yeping He:
Tibetan Word Segmentation as Syllable Tagging Using Conditional Random Field. PACLIC 2011: 168-177 - [c17]Wei Han, Yeping He, Liping Ding:
Verifying the Safety of Xen Security Modules. SSIRI (Companion) 2011: 30-34 - 2010
- [c16]Huidan Liu, Weina Zhao, Minghua Nuo, Li Jiang, Jian Wu, Yeping He:
Tibetan Number Identification Based on Classification of Number Components in Tibetan Word Segmentation. COLING (Posters) 2010: 719-724 - [c15]Shangjie Li, Yeping He:
Trusted Subjects Configuration Based on TE Model in MLS Systems. INTRUST 2010: 98-107
2000 – 2009
- 2009
- [j4]Lingli Deng, Ziyao Xu, Yeping He:
Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration. J. Comput. 4(9): 862-872 (2009) - [c14]Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang:
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. ISPEC 2009: 83-92 - [c13]Lingli Deng, Yeping He, Ziyao Xu:
Combating Index Poisoning in P2P File Sharing. ISA 2009: 358-367 - 2008
- [c12]Lingli Deng, Yeping He, Ziyao Xu:
Separation of Duty in Trust-Based Collaboration. Inscrypt 2008: 370-388 - [c11]Ziyao Xu, Yeping He, Lingli Deng:
An Integrity Assurance Mechanism for Run-Time Programs. Inscrypt 2008: 389-405 - [c10]Lingli Deng, Yeping He, Ziyao Xu:
Enforcing Separation of Duty in Ad Hoc Collaboration. ICYCS 2008: 1545-1552 - [c9]Lingli Deng, Yeping He, Ziyao Xu:
Service Authenticity in P2P File-Sharing. ICYCS 2008: 2246-2253 - [c8]Lingli Deng, Yeping He, Ziyao Xu:
Trusted Reputation Management Service for Peer-to-Peer Collaboration. OTM Conferences (2) 2008: 1069-1086 - 2007
- [j3]Hong Zhang, Yeping He, Zhiguo Shi:
A formal model for access control with supporting spatial context. Sci. China Ser. F Inf. Sci. 50(3): 419-439 (2007) - [c7]Ziyao Xu, Yeping He, Lingli Deng:
A Multilevel Reputation System for Peer-to-Peer Networks. GCC 2007: 67-74 - [c6]Zhiguo Shi, Yeping He, Xiaoyong Huai, Hong Zhang:
Identity Anonymity for Grid Computing Coordination based on Trusted Computing. GCC 2007: 403-410 - 2006
- [j2]Qingguang Ji, Sihan Qing, Yeping He:
A formal model for integrity protection based on DTE technique. Sci. China Ser. F Inf. Sci. 49(5): 545-565 (2006) - [c5]Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou:
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. Inscrypt 2006: 196-210 - [c4]Lingli Deng, Yeping He, Ziyao Xu, Chunyang Yuan:
An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper). ICICS 2006: 322-331 - [c3]Hong Zhang, Yeping He, Zhiguo Shi:
Spatial Context in Role-Based Access Control. ICISC 2006: 166-178 - 2005
- [j1]Qingguang Ji, Sihan Qing, Yeping He:
A new formal model for privilege control with supporting POSIX capability mechanism. Sci. China Ser. F Inf. Sci. 48(1): 46-66 (2005) - [c2]Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He:
A Formal Description of SECIMOS Operating System. MMM-ACNS 2005: 286-297 - 2001
- [c1]Yeping He, Sihan Qing:
Square Attack on Reduced Camellia Cipher. ICICS 2001: 238-245
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint