​
Login / Signup
Wanyu Zang
Publication Activity (10 Years)
Years Active: 2002-2021
Publications (10 Years): 8
Top Topics
Empirical Evaluation
Moving Target Defense
Multi Tasking
Virtual Machine
Top Venues
WASA
ICC
Secur. Commun. Networks
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
</>
Publications
</>
Jin Han
,
Wanyu Zang
,
Meng Yu
,
Ravi S. Sandhu
Quantify Co-Residency Risks in the Cloud Through Deep Learning.
IEEE Trans. Dependable Secur. Comput.
18 (4) (2021)
Naiwei Liu
,
Meng Yu
,
Wanyu Zang
,
Ravi S. Sandhu
On the Cost-Effectiveness of TrustZone Defense on ARM Platform.
WISA
(2020)
Naiwei Liu
,
Meng Yu
,
Wanyu Zang
,
Ravi S. Sandhu
Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
11 (4) (2020)
Naiwei Liu
,
Wanyu Zang
,
Songqing Chen
,
Meng Yu
,
Ravi S. Sandhu
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform.
EAI Endorsed Trans. Security Safety
6 (19) (2019)
Li Liu
,
An Wang
,
Wanyu Zang
,
Meng Yu
,
Songqing Chen
Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks.
ICC
(2018)
Li Liu
,
An Wang
,
Wanyu Zang
,
Meng Yu
,
Menbai Xiao
,
Songqing Chen
Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling.
SecureComm (1)
(2018)
Jin Han
,
Wanyu Zang
,
Songqing Chen
,
Meng Yu
Reducing Security Risks of Clouds Through Virtual Machine Placement.
DBSec
(2017)
Bin Wang
,
Xiaochun Yang
,
Guoren Wang
,
Ge Yu
,
Wanyu Zang
,
Meng Yu
Energy efficient approximate self-adaptive data collection in wireless sensor networks.
Frontiers Comput. Sci.
10 (5) (2016)
Zili Zha
,
Min Li
,
Wanyu Zang
,
Meng Yu
,
Songqing Chen
AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.
ICNC
(2015)
David S. Jackson
,
Wanyu Zang
,
Qijun Gu
,
Wei Cheng
,
Meng Yu
Exploiting and defending trust models in cooperative spectrum sensing.
EURASIP J. Wirel. Commun. Netw.
2015 (2015)
David S. Jackson
,
Wanyu Zang
,
Qijun Gu
,
Meng Yu
Robust Detection of Rogue Signals in Cooperative Spectrum Sensing.
J. Internet Serv. Inf. Secur.
5 (2) (2015)
Bin Wang
,
Xiaochun Yang
,
Wanyu Zang
,
Meng Yu
Approximate Self-Adaptive Data Collection in Wireless Sensor Networks.
WASA
(2014)
Min Li
,
Zili Zha
,
Wanyu Zang
,
Meng Yu
,
Peng Liu
,
Kun Bai
Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization.
ESORICS (1)
(2014)
Chengpo Mu
,
Meng Yu
,
Yingjiu Li
,
Wanyu Zang
Risk balance defense approach against intrusions for network server.
Int. J. Inf. Sec.
13 (3) (2014)
David S. Jackson
,
Wanyu Zang
,
Qijun Gu
,
Wei Cheng
Exploiting and Defending Trust Models in Cooperative Spectrum Sensing.
WASA
(2014)
Xiangyu Liu
,
Bin Wang
,
Xiaochun Yang
,
Meng Yu
,
Wanyu Zang
-obfuscation for profile privacy in social networks.
Secur. Commun. Networks
7 (9) (2014)
Yan Yang
,
Yulong Zhang
,
Alex Hai Wang
,
Meng Yu
,
Wanyu Zang
,
Peng Liu
,
Sushil Jajodia
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl.
36 (2) (2013)
Min Li
,
Wanyu Zang
,
Kun Bai
,
Meng Yu
,
Peng Liu
MyCloud: supporting user-configured privacy protection in cloud computing.
ACSAC
(2013)
Qijun Gu
,
Wanyu Zang
,
Meng Yu
,
Peng Liu
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks.
TrustCom
(2012)
Min Li
,
Yulong Zhang
,
Kun Bai
,
Wanyu Zang
,
Meng Yu
,
Xubin He
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
SECRYPT
(2012)
Yulong Zhang
,
Min Li
,
Kun Bai
,
Meng Yu
,
Wanyu Zang
Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds.
SEC
(2012)
Qijun Gu
,
Kyle Jones
,
Wanyu Zang
,
Meng Yu
,
Peng Liu
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
ESORICS
(2012)
Qijun Gu
,
Meng Yu
,
Wanyu Zang
,
Peng Liu
Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
ICC
(2011)
Meng Yu
,
Wanyu Zang
,
Peng Liu
Recovery of data integrity under multi-tier architectures.
IET Inf. Secur.
4 (4) (2010)
Heywoong Kim
,
Qijun Gu
,
Meng Yu
,
Wanyu Zang
,
Peng Liu
A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++.
SpringSim
(2010)
Meng Yu
,
Alex Hai Wang
,
Wanyu Zang
,
Peng Liu
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
SECRYPT
(2010)
Meng Yu
,
Peng Liu
,
Wanyu Zang
The implementation and evaluation of a recovery system for workflows.
J. Netw. Comput. Appl.
32 (1) (2009)
Wanyu Zang
,
Qijun Gu
,
Meng Yu
,
Peng Liu
An Attack-Resilient Channel Assignment MAC Protocol.
NBiS
(2009)
Meng Yu
,
Wanyu Zang
,
Barbara Reagor
Decentralized Trust Management based on the Reputation of Information Sources.
ICNSC
(2007)
Meng Yu
,
Wanyu Zang
,
Peng Liu
Database Isolation and Filtering against Data Corruption Attacks.
ACSAC
(2007)
Wanyu Zang
,
Meng Yu
A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes.
ICISS
(2006)
Meng Yu
,
Peng Liu
,
Wanyu Zang
Specifying and using intrusion masking models to process distributed operations.
J. Comput. Secur.
13 (4) (2005)
Peng Liu
,
Wanyu Zang
,
Meng Yu
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
ACM Trans. Inf. Syst. Secur.
8 (1) (2005)
Meng Yu
,
Wanyu Zang
,
Peng Liu
Defensive Execution of Transactional Processes against Attacks.
ACSAC
(2005)
Meng Yu
,
Peng Liu
,
Wanyu Zang
Self-Healing Workflow Systems under Attacks.
ICDCS
(2004)
Meng Yu
,
Peng Liu
,
Wanyu Zang
Multi-Version Attack Recovery for Workflow System.
ACSAC
(2003)
Meng Yu
,
Peng Liu
,
Wanyu Zang
Intrusion Masking for Distributed Atomic Operations.
SEC
(2003)
Peng Liu
,
Wanyu Zang
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
CCS
(2003)
Meng Yu
,
Minyi Guo
,
Yi Pan
,
Wanyu Zang
,
Li Xie
JAPS-II: A Source to Source Parallelizing Compiler for Java.
PDPTA
(2002)