default search action
Zhiyong Shan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Zhiyong Shan, Harsha Vardhan Reddy Channu:
An Approach to Reveal Unknown Malware Hiding Techniques. BCD 2023: 245-249 - 2022
- [c16]Longting Xu, Mianxin Tian, Xing Guo, Zhiyong Shan, Jie Jia, Yiyuan Peng, Jichen Yang, Rohan Kumar Das:
A Novel Feature Based on Graph Signal Processing for Detection of Physical Access Attacks. Odyssey 2022: 107-111 - [c15]Anusha Konduru, Zhiyong Shan:
Automated Testing to Detect Status Data Loss in Android Applications. SERA 2022: 155-160 - [c14]Preethi Santhanam, Hoang Dang, Zhiyong Shan, Iulian Neamtiu:
Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion. SP 2022: 2145-2160
2010 – 2019
- 2019
- [c13]Luke Baird, Zhiyong Shan, Vinod Namboodiri:
Automated Dynamic Detection of Self-Hiding Behavior. MASS Workshops 2019: 87-91 - [c12]Zhiyong Shan, Raina Samuel, Iulian Neamtiu:
Device Administrator Use and Abuse in Android: Detection and Characterization. MobiCom 2019: 51:1-51:16 - 2018
- [c11]Zhiyong Shan, Iulian Neamtiu, Raina Samuel:
Self-hiding behavior in Android apps: detection and characterization. ICSE 2018: 728-739 - 2017
- [j6]Iulian Neamtiu, Xuetao Wei, Michalis Faloutsos, Lorenzo Gomez, Tanzirul Azim, Yongjian Hu, Zhiyong Shan:
Improving Smartphone Security and Reliability. J. Interconnect. Networks 17(1): 1740002:1-1740002:67 (2017) - 2016
- [j5]Hongpu Tian, Zhiyong Shan, Yabing Zhang:
一种RFID标签天线的设计 (Design of RFID Tag Antenna). 计算机科学 43(Z11): 308-310 (2016) - [c10]Zhiyong Shan, Tanzirul Azim, Iulian Neamtiu:
Finding resume and restart errors in Android applications. OOPSLA 2016: 864-880 - [i8]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Duplication of Windows Services. CoRR abs/1608.08051 (2016) - [i7]Zhiyong Shan, Bin Liao:
Design and Implementation of A Network Security Management System. CoRR abs/1609.00099 (2016) - [i6]Zhiyong Shan:
Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks. CoRR abs/1609.00100 (2016) - [i5]Zhiyong Shan:
Compatible and Usable Mandatory Access Control for Good-enough OS Security. CoRR abs/1609.00875 (2016) - [i4]Zhiyong Shan, Yang Yu, Tzi-cker Chiueh:
Confining Windows Inter-Process Communications for OS-Level Virtual Machine. CoRR abs/1609.04781 (2016) - [i3]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Virtualizing System and Ordinary Services in Windows-based OS-Level Virtual Machines. CoRR abs/1609.04785 (2016) - [i2]Zhiyong Shan, Yu-fang Sun:
Implementing RBAC model in An Operating System Kernel. CoRR abs/1609.08154 (2016) - [i1]Zhiyong Shan:
A Study on Altering PostgreSQL from Multi-Processes Structure to Multi-Threads Structure. CoRR abs/1609.09062 (2016) - 2015
- [c9]Xinxin Jin, Soyeon Park, Tianwei Sheng, Rishan Chen, Zhiyong Shan, Yuanyuan Zhou:
FTXen: Making hypervisor resilient to hardware faults on relaxed cores. HPCA 2015: 451-462 - [c8]Zhiyong Shan, Iulian Neamtiu, Zhiyun Qian, Don J. Torrieri:
Proactive restart as cyber maneuver for Android. MILCOM 2015: 19-24 - 2014
- [j4]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization. IEEE Trans. Computers 63(5): 1220-1233 (2014) - [j3]Zhiyong Shan, Xin Wang:
Growing Grapes in Your Computer to Defend Against Malware. IEEE Trans. Inf. Forensics Secur. 9(2): 196-207 (2014) - 2013
- [j2]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Malware Clearance for Secure Commitment of OS-Level Virtual Machines. IEEE Trans. Dependable Secur. Comput. 10(2): 70-83 (2013) - 2012
- [j1]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Enforcing Mandatory Access Control in Commodity OS to Disable Malware. IEEE Trans. Dependable Secur. Comput. 9(4): 541-555 (2012) - [c7]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng:
Facilitating inter-application interactions for OS-level virtualization. VEE 2012: 75-86 - 2011
- [c6]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh:
Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing. AsiaCCS 2011: 135-144 - [c5]Zhiyong Shan, Xin Wang, Tzi-cker Chiueh, Xiaofeng Meng:
Safe side effects commitment for OS-level virtualization. ICAC 2011: 111-120 - [c4]Zhiyong Shan, Tzi-cker Chiueh, Xin Wang:
Virtualizing system and ordinary services in Windows-based OS-level virtual machines. SAC 2011: 579-583
2000 – 2009
- 2009
- [c3]Zhiyong Shan, Yang Yu, Tzi-cker Chiueh:
Confining windows inter-process communications for OS-level virtual machine. VDTS@EuroSys 2009: 30-35 - [c2]Xiao Li, Wenchang Shi, Zhaohui Liang, Bin Liang, Zhiyong Shan:
Operating System Mechanisms for TPM-Based Lifetime Measurement of Process Integrity. MASS 2009: 783-789 - 2007
- [c1]Zhiyong Shan, Qiuyue Wang, Xiaofeng Meng:
An OS Security Protection Model for Defeating Attacks from Network. ICISS 2007: 25-36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint