Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment., , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 500-517. Springer, (2017)Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters., , , , and . ICPP, page 87-92. IEEE Computer Society, (2016)A Hybrid Monitoring Mechanism in Virtualized Environments., , , , and . Trustcom/BigDataSE/ISPA, page 1038-1045. IEEE, (2016)Ada-LEval: Evaluating long-context LLMs with length-adaptable benchmarks., , , , and . CoRR, (2024)SA-PFRS: Semantics-Aware Page Frame Reclamation System in Virtualized Environments., , , and . ICPADS, page 684-693. IEEE Computer Society, (2017)When Side Channel Becomes Good: Kernel Malware Attack Investigation., , , , , and . ICAIS (2), volume 11633 of Lecture Notes in Computer Science, page 571-583. Springer, (2019)Network Security Situation Awareness Technology Based on Multi-source Heterogeneous Data., , , , , and . CIAT, page 420-424. ACM, (2020)Identification of important nodes on large-scale Internet based on unsupervised learning., , , , , , , and . CIAT, page 121-129. ACM, (2020)WREP: A lightweight event real-time processing engine for IoT., , , and . DSC, page 79-85. IEEE, (2022)MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System., , , , , and . TrustCom, page 897-904. IEEE, (2022)