팔로우
Tengfei Tu
제목
인용
인용
연도
Understanding real-world concurrency bugs in go
T Tu, X Liu, L Song, Y Zhang
Proceedings of the twenty-fourth international conference on architectural …, 2019
1042019
Understanding the performance of webassembly applications
Y Yan, T Tu, L Zhao, Y Zhou, W Wang
Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021
782021
Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree
L Rao, H Zhang, T Tu
IEEE Transactions on Services Computing 13 (3), 451-463, 2017
722017
DoSGuard: Mitigating denial-of-service attacks in software-defined networks
J Li, T Tu, Y Li, S Qin, Y Shi, Q Wen
Sensors 22 (3), 1061, 2022
262022
LncCeRBase: a database of experimentally validated human competing endogenous long non-coding RNAs
C Pian, G Zhang, T Tu, X Ma, F Li
Database 2018, bay061, 2018
252018
An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications
H Zhang, B Qin, T Tu, Z Guo, F Gao, Q Wen
IEEE Transactions on Industrial Informatics 16 (1), 658-668, 2019
242019
A comprehensive study of Mozi botnet
TF Tu, JW Qin, H Zhang, M Chen, T Xu, Y Huang
International Journal of Intelligent Systems 37 (10), 6877-6908, 2022
232022
Krprotector: Detection and files protection for iot devices on android without root against ransomware based on decoys
S Wang, H Zhang, S Qin, W Li, T Tu, A Shen, W Liu
IEEE Internet of Things Journal 9 (19), 18251-18266, 2022
192022
Privacy‐Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
T Tu, L Rao, H Zhang, Q Wen, J Xiao
Security and Communication Networks 2017 (1), 4603237, 2017
182017
A vulnerability mining system based on fuzzing for IEC 61850 protocol
T Tu, H Zhang, B Qin, Z Chen
2017 5th International Conference on Frontiers of Manufacturing Science and …, 2017
112017
Packet injection exploiting attack and mitigation in software-defined networks
J Li, S Qin, T Tu, H Zhang, Y Li
Applied Sciences 12 (3), 1103, 2022
62022
Algorithmic profiling for real-world complexity problems
B Qin, T Tu, Z Liu, T Yu, L Song
IEEE Transactions on Software Engineering 48 (7), 2680-2694, 2021
62021
KRRecover: An auto-recovery tool for hijacked devices and encrypted files by ransomwares on android
S Wang, S Qin, N He, T Tu, J Hou, H Zhang, Y Shi
Symmetry 13 (5), 861, 2021
52021
Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security
L Rao, T Tu, H Zhang, Q Wen, J Xiao
Wireless Communications and Mobile Computing 2018 (1), 4186243, 2018
52018
Jasmine: A Static Analysis Framework for Spring Core Technologies
M Chen, T Tu, H Zhang, Q Wen, W Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
42022
Deep-learning based injection attacks detection method for HTTP
C Zhao, S Si, T Tu, Y Shi, S Qin
Mathematics 10 (16), 2914, 2022
42022
KRDroid: Ransomware-oriented detector for mobile devices based on behaviors
S Wang, S Qin, J Qin, H Zhang, T Tu, Z Jin, J Guo
Applied Sciences 11 (14), 6557, 2021
42021
VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG
C Zhao, T Tu, C Wang, S Qin
Applied Sciences 13 (16), 9240, 2023
22023
Icmptend: internet control message protocol covert tunnel attack intent detector
T Tu, W Yin, H Zhang, X Zeng, X Deng, Y Zhou, X Liu
Computers, Materials & Continua 71 (2), 2315-2331, 2022
22022
Intelligent analysis of android application privacy policy and permission consistency
T Tu, H Zhang, B Gong, D Du, Q Wen
Artificial Intelligence Review 57 (7), 172, 2024
12024
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20