Understanding real-world concurrency bugs in go T Tu, X Liu, L Song, Y Zhang Proceedings of the twenty-fourth international conference on architectural …, 2019 | 104 | 2019 |
Understanding the performance of webassembly applications Y Yan, T Tu, L Zhao, Y Zhou, W Wang Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021 | 78 | 2021 |
Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree L Rao, H Zhang, T Tu IEEE Transactions on Services Computing 13 (3), 451-463, 2017 | 72 | 2017 |
DoSGuard: Mitigating denial-of-service attacks in software-defined networks J Li, T Tu, Y Li, S Qin, Y Shi, Q Wen Sensors 22 (3), 1061, 2022 | 26 | 2022 |
LncCeRBase: a database of experimentally validated human competing endogenous long non-coding RNAs C Pian, G Zhang, T Tu, X Ma, F Li Database 2018, bay061, 2018 | 25 | 2018 |
An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications H Zhang, B Qin, T Tu, Z Guo, F Gao, Q Wen IEEE Transactions on Industrial Informatics 16 (1), 658-668, 2019 | 24 | 2019 |
A comprehensive study of Mozi botnet TF Tu, JW Qin, H Zhang, M Chen, T Xu, Y Huang International Journal of Intelligent Systems 37 (10), 6877-6908, 2022 | 23 | 2022 |
Krprotector: Detection and files protection for iot devices on android without root against ransomware based on decoys S Wang, H Zhang, S Qin, W Li, T Tu, A Shen, W Liu IEEE Internet of Things Journal 9 (19), 18251-18266, 2022 | 19 | 2022 |
Privacy‐Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud T Tu, L Rao, H Zhang, Q Wen, J Xiao Security and Communication Networks 2017 (1), 4603237, 2017 | 18 | 2017 |
A vulnerability mining system based on fuzzing for IEC 61850 protocol T Tu, H Zhang, B Qin, Z Chen 2017 5th International Conference on Frontiers of Manufacturing Science and …, 2017 | 11 | 2017 |
Packet injection exploiting attack and mitigation in software-defined networks J Li, S Qin, T Tu, H Zhang, Y Li Applied Sciences 12 (3), 1103, 2022 | 6 | 2022 |
Algorithmic profiling for real-world complexity problems B Qin, T Tu, Z Liu, T Yu, L Song IEEE Transactions on Software Engineering 48 (7), 2680-2694, 2021 | 6 | 2021 |
KRRecover: An auto-recovery tool for hijacked devices and encrypted files by ransomwares on android S Wang, S Qin, N He, T Tu, J Hou, H Zhang, Y Shi Symmetry 13 (5), 861, 2021 | 5 | 2021 |
Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security L Rao, T Tu, H Zhang, Q Wen, J Xiao Wireless Communications and Mobile Computing 2018 (1), 4186243, 2018 | 5 | 2018 |
Jasmine: A Static Analysis Framework for Spring Core Technologies M Chen, T Tu, H Zhang, Q Wen, W Wang Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 4 | 2022 |
Deep-learning based injection attacks detection method for HTTP C Zhao, S Si, T Tu, Y Shi, S Qin Mathematics 10 (16), 2914, 2022 | 4 | 2022 |
KRDroid: Ransomware-oriented detector for mobile devices based on behaviors S Wang, S Qin, J Qin, H Zhang, T Tu, Z Jin, J Guo Applied Sciences 11 (14), 6557, 2021 | 4 | 2021 |
VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG C Zhao, T Tu, C Wang, S Qin Applied Sciences 13 (16), 9240, 2023 | 2 | 2023 |
Icmptend: internet control message protocol covert tunnel attack intent detector T Tu, W Yin, H Zhang, X Zeng, X Deng, Y Zhou, X Liu Computers, Materials & Continua 71 (2), 2315-2331, 2022 | 2 | 2022 |
Intelligent analysis of android application privacy policy and permission consistency T Tu, H Zhang, B Gong, D Du, Q Wen Artificial Intelligence Review 57 (7), 172, 2024 | 1 | 2024 |