default search action
Chunlu Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Yu Jin, Chunlu Wang, Pengfei Qiu, Chang Liu, Yihao Yang, Hongpei Zheng, Yongqiang Lyu, Xiaoyong Li, Gang Qu, Dongsheng Wang:
Whisper: Timing the Transient Execution to Leak Secrets and Break KASLR. DAC 2024: 188:1-188:6 - 2023
- [j11]Pengfei Qiu, Qiang Gao, Chang Liu, Dong-Sheng Wang, Yongqiang Lyu, Xiaoyong Li, Chunlu Wang, Gang Qu:
PMU-Spill: A New Side Channel for Transient Execution Attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5048-5059 (2023) - [c21]Yu Jin, Pengfei Qiu, Chunlu Wang, Yihao Yang, Dongsheng Wang, Xiaoyong Li, Qian Wang, Gang Qu:
Overtake: Achieving Meltdown-type Attacks with One Instruction. AsianHOST 2023: 1-6 - [c20]Pengfei Qiu, Qiang Gao, Dongsheng Wang, Yongqiang Lyu, Chunlu Wang, Chang Liu, Rihui Sun, Gang Qu:
PMU-Leaker: Performance Monitor Unit-Based Realization of Cache Side-Channel Attacks. ASP-DAC 2023: 664-669 - [c19]Yizu Yang, Yuzhang Lee, Zeyu He, Chunlu Wang:
Hierarchical Abstract Syntax Tree Representation Learning Based on Graph Coarsening for Program Classification. DSC 2023: 181-188 - [c18]Yihao Yang, Pengfei Qiu, Chunlu Wang, Yu Jin, Qiang Gao, Xiaoyong Li, Dongsheng Wang, Gang Qu:
Exploration and Exploitation of Hidden PMU Events. ICCAD 2023: 1-9 - [i4]Yu Jin, Pengfei Qiu, Chunlu Wang, Yihao Yang, Dongsheng Wang, Gang Qu:
Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs. CoRR abs/2304.10877 (2023) - [i3]Yihao Yang, Pengfei Qiu, Chunlu Wang, Yu Jin, Dongsheng Wang, Gang Qu:
Exploration and Exploitation of Hidden PMU Events. CoRR abs/2304.12072 (2023) - 2022
- [c17]Pengfei Qiu, Qiang Gao, Dongsheng Wang, Yongqiang Lyu, Chang Liu, Xiaoyong Li, Chunlu Wang, Gang Qu:
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions. AsianHOST 2022: 1-6 - [c16]Qian Ke, Chunlu Wang, Haixia Wang, Yongqiang Lyu, Zihan Xu, Dongsheng Wang:
Model Checking for Microarchitectural Data Sampling Security. DSC 2022: 56-63 - [i2]Pengfei Qiu, Yongqiang Lyu, Haixia Wang, Dongsheng Wang, Chang Liu, Qiang Gao, Chunlu Wang, Rihui Sun, Gang Qu:
PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets. CoRR abs/2207.11689 (2022) - 2021
- [j10]Chunlu Wang, Congcong Guo, Xingquan Zuo:
Solving multi-depot electric vehicle scheduling problem by column generation and genetic algorithm. Appl. Soft Comput. 112: 107774 (2021) - [j9]Siqi Li, Chunlu Wang:
Sea force control Design based on a passive Index. Int. J. Robotics Autom. 36(2) (2021) - [j8]Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, Ruidong Tian, Chunlu Wang, Gang Qu:
VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1130-1143 (2021) - 2020
- [j7]Chunlu Wang, Hongyi Shi, Xingquan Zuo:
A multi-objective genetic algorithm based approach for dynamical bus vehicles scheduling under traffic congestion. Swarm Evol. Comput. 54: 100667 (2020)
2010 – 2019
- 2019
- [j6]Lu Zhao, Yanrong Kang, Lili Guo, Yuan Long, Guidong Xing, Menghu Bao, Yaoguo Zhang, Siqi Liu, Chunlu Wang:
The Research of Alcohol Drinking State Analyzing Based on Smart Watch Data. Digit. Investig. 28 Supplement: S143 (2019) - [c15]Wei Hu, Chunlu Wang, Xingquan Zuo:
An Ant Colony Optimization based Approach to Adjust Public Transportation Network. CEC 2019: 2575-2580 - [c14]Congcong Guo, Chunlu Wang, Xingquan Zuo:
A genetic algorithm based column generation method for multi-depot electric bus vehicle scheduling. GECCO (Companion) 2019: 367-368 - 2018
- [c13]Hongyi Shi, Chunlu Wang, Xingquan Zuo, Xinchao Zhao:
A Multiobjective Genetic Algorithm Based Dynamic Bus Vehicle Scheduling Approach. BIC-TA (2) 2018: 152-161 - [c12]Meng Yu, Xingquan Zuo, Xinchao Zhao, Chunlu Wang:
Hybridizing tabu search with mathematical programming for solving a single row layout problem. CASE 2018: 974-980 - 2017
- [j5]Ya Liu, Hongbing Wang, Chunlu Wang:
Efficient and Secure Certificateless Proxy Re-Encryption. KSII Trans. Internet Inf. Syst. 11(4): 2254-2275 (2017) - [i1]Zhourui Song, Zhenyu Liu, Chunlu Wang, Dongsheng Wang:
Computation Error Analysis of Block Floating Point Arithmetic Oriented Convolution Neural Network Accelerator Design. CoRR abs/1709.07776 (2017) - 2016
- [c11]Yanmei Ma, Xingquan Zuo, Xuewen Huang, Fulai Gu, Chunlu Wang, Xinchao Zhao:
A MOEA/D based approach for hospital department layout design. CEC 2016: 793-798 - 2015
- [c10]Lingling Tang, Xingquan Zuo, Chunlu Wang, Xinchao Zhao:
A MOEA/D based approach for solving robust double row layout problem. CEC 2015: 1966-1973 - 2014
- [j4]Chenye Qiu, Chunlu Wang, Binxing Fang, Xingquan Zuo:
A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis. Appl. Artif. Intell. 28(6): 555-576 (2014) - [j3]Chunlu Wang, Chenye Qiu, Xingquan Zuo, Chuanyi Liu:
An Accident Severity Classification Model Based on Multi-Objective Particle Swarm Optimization. IEICE Trans. Inf. Syst. 97-D(11): 2863-2871 (2014) - 2013
- [j2]Chenye Qiu, Chunlu Wang, Xingquan Zuo:
A novel multi-objective particle swarm optimization with K-means based global best selection strategy. Int. J. Comput. Intell. Syst. 6(5): 822-835 (2013) - [c9]Chunlu Wang, Jun Ni, Tao Xu, Dapeng Ju:
TH_Cloudkey: Fast, Secure and Lowcost Backup System for Using Public Cloud Storage. CSC 2013: 36-41 - [c8]Chunlu Wang, Chuanyi Liu, Xiaoliang Wang, Yingfei Dong:
Effectively auditing IaaS cloud servers. GLOBECOM 2013: 682-688 - 2012
- [c7]Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang:
Vulnerability Evaluating Based on Attack Graph. ISCTCS 2012: 555-563 - 2011
- [j1]Tianle Zhang, Chunlu Wang, Zongwei Luo, Shuihua Han, Mengyuan Dong:
RFID Enabled Vehicular Network for Ubiquitous Travel Query. Int. J. Syst. Serv. Oriented Eng. 2(3): 47-62 (2011) - [c6]Chunlu Wang, Yancheng Wang, Yingfei Dong, Tianle Zhang:
A Novel Comprehensive Network Security Assessment Approach. ICC 2011: 1-6 - [c5]Zongwei Luo, Tianle Zhang, Chunlu Wang:
RFID enabled vehicular wireless query for Travel Information in Intelligent Transportation System. RFID-TA 2011: 415-420 - [c4]Chenye Qiu, Chunlu Wang, Xingquan Zuo, Binxing Fang:
A Bayesian regularized neural network approach to short-term traffic speed prediction. SMC 2011: 2215-2220 - 2010
- [c3]Tianle Zhang, Zongwei Luo, Chunlu Wang, Edward C. Wong:
A Model for Evaluating Connectivity Availability in Random Sleep Scheduled Delay-Tolerant Wireless Networks. GLOBECOM 2010: 1-5 - [c2]Chenye Qiu, Xingquan Zuo, Chunlu Wang, Jianping Wu, Tianle Zhang:
An urban traffic speed fusion method based on principle component analysis and neural network. IJCNN 2010: 1-7
2000 – 2009
- 2007
- [c1]Le Du, Yongwei Wu, Chunlu Wang:
Component Based Legacy Program Executing over Grid. GCC 2007: 558-565
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint