ติดตาม
Shijie Jia
Shijie Jia
Associate Professor,State Key Laboratory of Information Security, Institute of Information
ยืนยันอีเมลแล้วที่ iie.ac.cn - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Deftl: Implementing plausibly deniable encryption in flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
582017
Nfps: Adding undetectable secure deletion to flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
472016
Extracting robust keys from NAND flash physical unclonable functions
S Jia, L Xia, Z Wang, J Lin, G Zhang, Y Ji
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
352015
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd annual computer security applications conference …, 2017
302017
Sanitizing data is not enough! Towards sanitizing structural artifacts in flash media
B Chen, S Jia, L Xia, P Liu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
292016
Mimosaftl: adding secure and practical ransomware defense strategy to flash translation layer
P Wang, S Jia, B Chen, L Xia, P Liu
Proceedings of the Ninth ACM conference on data and application security and …, 2019
212019
Ensuring data confidentiality via plausibly deniable encryption and secure deletion–a survey
Q Zhang, S Jia, B Chang, B Chen
Cybersecurity 1, 1-20, 2018
212018
Identification of cloned HF RFID proximity cards based on RF fingerprinting
G Zhang, L Xia, S Jia, Y Ji
2016 IEEE Trustcom/BigDataSE/ISPA, 292-300, 2016
132016
Cryptogo: Automatic detection of go cryptographic api misuses
W Li, S Jia, L Liu, F Zheng, Y Ma, J Lin
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
112022
Physical-layer identification of HF RFID cards based on RF fingerprinting
G Zhang, L Xia, S Jia, Y Ji
International Conference on Information Security Practice and Experience …, 2016
72016
EnclavePoSt: A Practical Proof of Storage‐Time in Cloud via Intel SGX
Y Zhang, W You, S Jia, L Liu, Z Li, W Qian
Security and Communication Networks 2022 (1), 7868502, 2022
62022
Dpvgeo: Delay-based public verification of cloud data geolocation
D Jia, Y Zhang, S Jia, L Liu, J Lin
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
62020
Splitter: an efficient scheme to determine the geolocation of cloud data publicly
Y Zhang, D Jia, S Jia, L Liu, J Lin
2020 29th International Conference on Computer Communications and Networks …, 2020
52020
MDEFTL: Incorporating multi-snapshot plausible deniability into flash translation layer
S Jia, Q Zhang, L Xia, J Jing, P Liu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3494-3507, 2021
42021
Enhancing the security of mobile device management with seccomp
Y Niu, Y Wang, S Jia, Q Zhou, L Lei, Q Zhang, X Zhao
Journal of Physics: Conference Series 1646 (1), 012138, 2020
42020
VoteGeo: An IoT-based voting approach to verify the geographic location of cloud hosts
D Jia, L Liu, S Jia, J Lin
2019 IEEE 38th International Performance Computing and Communications …, 2019
42019
EHIFS: an efficient history independent file system
B Gao, B Chen, S Jia, L Xia
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
42019
Ensuring data confidentiality with a secure XTS-AES design in flash translation layer
Q Zhang, S Jia, J He, X Zhao, L Xia, Y Niu, J Jing
2020 IEEE 5th International Conference on Cloud Computing and Big Data …, 2020
32020
Enhancing location privacy for electric vehicles by obfuscating the linkages of charging events
X Sun, L Xia, S Jia
2015 IEEE 5th International Conference on Electronics Information and …, 2015
32015
A Design of High-Efficiency Coherent Sampling Based TRNG With On-Chip Entropy Assurance
T Chen, S Jia, Y Ma, Y Cao, N Lv, W Wang, J Yang, J Lin
IEEE Transactions on Circuits and Systems I: Regular Papers 70 (12), 5060-5073, 2023
22023
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20