Follow
Jinpeng Wei
Jinpeng Wei
Verified email at uncc.edu - Homepage
Title
Cited by
Cited by
Year
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
3892009
Bring your own device security issues and challenges
Y Wang, J Wei, K Vangury
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 80-85, 2014
1402014
Software persistent memory
J Guerra, L Marmol, D Campello, C Crespo, R Rangaswami, J Wei
2012 USENIX Annual Technical Conference (USENIX ATC 12), 319-331, 2012
1062012
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study.
J Wei, C Pu
FAST 5, 12-12, 2005
952005
Viaf: Verification-based integrity assurance framework for mapreduce
Y Wang, J Wei
2011 IEEE 4th International Conference on Cloud Computing, 300-307, 2011
762011
Autonomous cyber deception
E Al-Shaer, J Wei, W Kevin, C Wang
Springer, 2019
512019
A natural language processing based trend analysis of advanced persistent threat techniques
A Niakanlahiji, J Wei, BT Chu
2018 IEEE International Conference on Big Data (Big Data), 2995-3000, 2018
492018
Soft-timer driven transient kernel control flow attacks and defense
J Wei, BD Payne, J Giffin, C Pu
2008 Annual Computer Security Applications Conference (ACSAC), 97-107, 2008
422008
A Methodical Defense against TOCTTOU Attacks: The EDGI Approach.
C Pu, J Wei
ISSSE, 2006
312006
Result integrity check for MapReduce computation on hybrid clouds
Y Wang, J Wei, M Srivatsa
2013 IEEE Sixth International Conference on Cloud Computing, 847-854, 2013
302013
Soda: A system for cyber deception orchestration and automation
MSI Sajid, J Wei, B Abdeen, E Al-Shaer, MM Islam, W Diong, L Khan
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
292021
IntegrityMR: Integrity assurance framework for big data analytics and management applications
Y Wang, J Wei, M Srivatsa, Y Duan, W Du
2013 IEEE International Conference on Big Data, 33-40, 2013
292013
A secure information flow architecture for web service platforms
J Wei, L Singaravelu, C Pu
IEEE Transactions on Services Computing 1 (2), 75-87, 2008
292008
{ShadowMove}: A Stealthy Lateral Movement Strategy
A Niakanlahiji, J Wei, MR Alam, Q Wang, BT Chu
29th USENIX Security Symposium (USENIX Security 20), 559-576, 2020
282020
Chimera: Autonomous planning and orchestration for malware deception
MM Islam, A Dutta, MSI Sajid, E Al-Shaer, J Wei, S Farhang
2021 IEEE Conference on Communications and Network Security (CNS), 173-181, 2021
212021
Dodgetron: Towards autonomous cyber deception using dynamic hybrid analysis of malware
MSI Sajid, J Wei, MR Alam, E Aghaei, E Al-Shaer
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
212020
The design of cyber threat hunting games: A case study
MNS Miazi, MMA Pritom, M Shehab, B Chu, J Wei
2017 26th International Conference on Computer Communication and Networks …, 2017
202017
Toward protecting control flow confidentiality in cloud-based computation
Y Wang, J Wei
Computers & Security 52, 106-127, 2015
162015
Modeling the runtime integrity of cloud servers: a scoped invariant perspective
J Wei, C Pu, CV Rozas, A Rajan, F Zhu
Privacy and Security for Cloud Computing, 211-232, 2013
162013
Coordinating fast concurrency adapting with autoscaling for slo-oriented web applications
J Liu, S Zhang, Q Wang, J Wei
IEEE Transactions on Parallel and Distributed Systems 33 (12), 3349-3362, 2022
152022
The system can't perform the operation now. Try again later.
Articles 1–20