default search action
Xinwen Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Chao Yang, Ce Zhang, Longyu Jiang, Xinwen Zhang:
Underwater image object detection based on multi-scale feature fusion. Mach. Vis. Appl. 35(6): 124 (2024) - [j31]Baocheng Zhou, Xinwen Zhang, Xiaozheng Wan, Tongmu Liu, Yuqiang Liu, Hua Huang, Jing Chen:
Development and Application of a Novel Tsunami Monitoring System Based on Submerged Mooring. Sensors 24(18): 6048 (2024) - [c107]Xinwen Zhang, Ali Payani, Myungjin Lee, Richard Souvenir, Hongchang Gao:
A Federated Stochastic Multi-level Compositional Minimax Algorithm for Deep AUC Maximization. ICML 2024 - [c106]Qi Zhang, Jiaqi Dong, Xinwen Zhang, Yekan Chen, Zipeng Cheng, Bo Zhao, Yuxuan Luo:
A 430-μA 68.2-dB-SNR 133-dBSPL-AOP CMOS-MEMS Digital Microphone Based on Electrostatic Force Feedback Control. VLSI Technology and Circuits 2024: 1-2 - 2023
- [j30]Yuwei Jiang, Yueheng Li, Xinwen Zhang, Meiyan Ju, Ping Huang:
Outage performance analysis for relay-assisted UWOC systems over GGD weak turbulence with nonzero boresight pointing errors. Phys. Commun. 58: 102017 (2023) - [c105]Xinwen Zhang, Chaoyi Zhang, Dongnan Liu, Qianbi Yu, Weidong Cai:
SynthMix: Mixing Up Aligned Synthesis for Medical Cross-Modality Domain Adaptation. ISBI 2023: 1-5 - [c104]Xinru Li, Yi Gong, JingNing Bai, Xinwen Zhang, Fanke Meng, Zhan Xu:
A Compressive Sensing and Denoising RCAN-Based Channel Estimation Scheme for OTFS System. ISCIT 2023: 13-18 - [c103]Hongchang Gao, Xinwen Zhang:
Distributed Optimization for Big Data Analytics: Beyond Minimization. KDD 2023: 5800-5801 - [c102]Xinwen Zhang, Yihan Zhang, Tianbao Yang, Richard Souvenir, Hongchang Gao:
Federated Compositional Deep AUC Maximization. NeurIPS 2023 - [i7]Xinwen Zhang, Yihan Zhang, Tianbao Yang, Richard Souvenir, Hongchang Gao:
Federated Compositional Deep AUC Maximization. CoRR abs/2304.10101 (2023) - [i6]Xinwen Zhang, Chaoyi Zhang, Dongnan Liu, Qianbi Yu, Tom Weidong Cai:
SynthMix: Mixing up Aligned Synthesis for Medical Cross-Modality Domain Adaptation. CoRR abs/2305.04156 (2023) - 2022
- [c101]Qianbi Yu, Dongnan Liu, Chaoyi Zhang, Xinwen Zhang, Weidong Cai:
Unsupervised Domain Adaptive Fundus Image Segmentation with Few Labeled Source Data. BMVC 2022: 237 - [c100]Zichen Zhang, Yong Luo, Yonggang Wen, Xinwen Zhang:
CycleResume: A Cycle Learning Framework with Hybrid Attention for Fine-Grained Talent-Job Fit. CICAI (3) 2022: 260-271 - [i5]Jin Fang, Jiacheng Weng, Yi Xiang, Xinwen Zhang:
Imitate then Transcend: Multi-Agent Optimal Execution with Dual-Window Denoise PPO. CoRR abs/2206.10736 (2022) - [i4]Qianbi Yu, Dongnan Liu, Chaoyi Zhang, Xinwen Zhang, Weidong Cai:
Unsupervised Domain Adaptive Fundus Image Segmentation with Few Labeled Source Data. CoRR abs/2210.04379 (2022) - 2021
- [c99]Wenxuan Xing, Xinwen Zhang:
Research on the Impact of Work Flexibility on Employee Happiness - Based on the Perspective of Ecological Balance Theory. ICEME 2021: 557-563 - [c98]Shifen Wang, Xinwen Zhang:
The Impact of Macroeconomic Uncertainty on China's Stock Market - - Take the Shanghai Composite Index as an Example. IPEC 2021: 515-519
2010 – 2019
- 2019
- [c97]Yong Luo, Huaizheng Zhang, Yonggang Wen, Xinwen Zhang:
ResumeGAN: An Optimized Deep Representation Learning Framework for Talent-Job Fit via Adversarial Learning. CIKM 2019: 1101-1110 - [c96]Xinwen Zhang, Chao Jia, Weiguo Liu:
Asymptotic Stability of Nonlinear Impulsive Stochastic Systems with Markovian Switching. ICMLC 2019: 114-118 - 2018
- [j29]Han Hu, Yong Luo, Yonggang Wen, Yew-Soon Ong, Xinwen Zhang:
How to Find a Perfect Data Scientist: A Distance-Metric Learning Approach. IEEE Access 6: 60380-60395 (2018) - [j28]Weiwen Zhang, Yonggang Wen, Xinwen Zhang:
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection. IEEE Trans. Emerg. Top. Comput. 6(1): 122-134 (2018) - [c95]Yong Luo, Huaizheng Zhang, Yongjie Wang, Yonggang Wen, Xinwen Zhang:
ResumeNet: A Learning-Based Framework for Automatic Resume Quality Assessment. ICDM 2018: 307-316 - [i3]Yong Luo, Huaizheng Zhang, Yongjie Wang, Yonggang Wen, Xinwen Zhang:
ResumeNet: A Learning-based Framework for Automatic Resume Quality Assessment. CoRR abs/1810.02832 (2018) - 2017
- [j27]Qi Li, Ravi S. Sandhu, Xinwen Zhang, Mingwei Xu:
Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Trans. Dependable Secur. Comput. 14(5): 494-506 (2017) - 2016
- [j26]Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:
Direct Resource Hijacking in Android. IEEE Internet Comput. 20(5): 46-56 (2016) - [c94]Huakang Li, Xinwen Zhang, Yitao Yang, Guozi Sun:
A Demonstration of Encrypted Logistics Information System. APWeb (2) 2016: 525-528 - [c93]Xinwen Zhang, Huakang Li, Yitao Yang, Guozi Sun, Guangxuan Chen:
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code. Trustcom/BigDataSE/ISPA 2016: 996-1000 - 2015
- [j25]Lu An, Xia Lin, Chuanming Yu, Xinwen Zhang:
Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes. Scientometrics 105(3): 1605-1634 (2015) - [j24]Qi Li, Xinwen Zhang, Xin Zhang, Purui Su:
Invalidating Idealized BGP Security Proposals and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(3): 298-311 (2015) - [j23]Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, Yongdae Kim:
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(6): 675-687 (2015) - [j22]Qi Li, Xinwen Zhang, Qingji Zheng, Ravi S. Sandhu, Xiaoming Fu:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. IEEE Trans. Inf. Forensics Secur. 10(2): 308-320 (2015) - [c92]Lei Xu, Xinwen Zhang, Xiaoxin Wu, Weidong Shi:
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. CODASPY 2015: 167-169 - [c91]Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. NSS 2015: 405-417 - [c90]Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. USENIX Security Symposium 2015: 351-366 - 2014
- [j21]Songqing Chen, Lei Liu, Xinyuan Wang, Xinwen Zhang, Zhao Zhang:
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment. ACM Trans. Auton. Adapt. Syst. 8(4): 21:1-21:18 (2014) - [j20]Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms. IEEE Trans. Mob. Comput. 13(1): 188-201 (2014) - [c89]Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang:
Improved anonymous proxy re-encryption with CCA security. AsiaCCS 2014: 249-258 - [c88]Su Zhang, Xinwen Zhang, Xinming Ou:
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. AsiaCCS 2014: 317-328 - 2013
- [j19]Xingze He, Xinwen Zhang, C.-C. Jay Kuo:
A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids. IEEE Access 1: 67-78 (2013) - [j18]Hai Jin, Ge Cheng, Deqing Zou, Xinwen Zhang:
Cherub: Fine-grained application protection with on-demand virtualization. Comput. Math. Appl. 65(9): 1326-1338 (2013) - [j17]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Muhammad Ali, Sajid Anwar, Quratulain Alam:
Behavioral Attestation for Web Services using access policies. Multim. Tools Appl. 66(2): 283-302 (2013) - [c87]Wu Zhou, Xinwen Zhang, Xuxian Jiang:
AppInk: watermarking android apps for repackaging deterrence. AsiaCCS 2013: 1-12 - [c86]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. AsiaCCS 2013: 173-178 - [c85]Ravishankar Ravindran, Xuan Liu, Asit Chakraborti, Xinwen Zhang, Guoqiang Wang:
Towards software defined ICN based edge-cloud services. CloudNet 2013: 227-235 - [c84]Huijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao:
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud. CNS 2013: 172-180 - [c83]Ravishankar Ravindran, Trisha Biswas, Xinwen Zhang, Asit Chakraborti, Guoqiang Wang:
Information-centric networking based homenet. IM 2013: 1102-1108 - [c82]Shangping Wang, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang:
Lattice-Based Multi-party Concurrent Signatures Scheme. INCoS 2013: 568-572 - [c81]Trisha Biswas, Asit Chakraborti, Ravishankar Ravindran, Xinwen Zhang, Guoqiang Wang:
Contextualized information-centric home network. SIGCOMM 2013: 461-462 - [c80]Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie:
ACaaS: Access Control as a Service for IaaS Cloud. SocialCom 2013: 423-428 - 2012
- [j16]Xinwen Zhang, Zhaoxin Wu, Bo Jiao, Dongdong Wang, Dawei Wang, Xun Hou:
White organic light-emitting devices with a solution-processed small molecular emission layer. Displays 33(3): 129-132 (2012) - [j15]Hammad Banuri, Masoom Alam, Shahryar Khan, Jawad Manzoor, Bahar Ali, Yasar Khan, Mohsin Yaseen, Mir Nauman Tahir, Tamleek Ali, Quratulain Alam, Xinwen Zhang:
An Android runtime security policy enforcement framework. Pers. Ubiquitous Comput. 16(6): 631-641 (2012) - [j14]Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Secur. Comput. 9(3): 429-442 (2012) - [j13]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu:
Enhancing the Trust of Internet Routing With Lightweight Route Attestation. IEEE Trans. Inf. Forensics Secur. 7(2): 691-703 (2012) - [c79]Ravishankar Ravindran, Guoqiang Wang, Xinwen Zhang, Asit Chakraborti:
Supporting dual-mode forwarding in content-centric network. IEEE ANTS 2012: 55-60 - [c78]Lei Xu, Xiaoxin Wu, Xinwen Zhang:
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. AsiaCCS 2012: 87-88 - [c77]Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. CCS 2012: 1001-1003 - [c76]Xinwen Zhang, Xuhua Ding:
STC 2012: the seventh ACM workshop on scalable trusted computing. CCS 2012: 1058-1059 - [c75]Weidong Shi, Jong-Hyuk Lee, Taeweon Suh, Dong Hyuk Woo, Xinwen Zhang:
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security. Conf. Computing Frontiers 2012: 75-84 - [c74]Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu, Yonggang Wen:
Towards end-to-end secure content storage and delivery with public cloud. CODASPY 2012: 257-266 - [c73]Ravishankar Ravindran, Samantha Lo, Xinwen Zhang, Guoqiang Wang:
Supporting seamless mobility in named data networking. ICC 2012: 5854-5869 - [c72]Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang:
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. INFOCOM 2012: 945-953 - [c71]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Chrome Extensions: Threat Analysis and Countermeasures. NDSS 2012 - [c70]Jiafeng Zhu, Jingji Zheng, Xinwen Zhang, Zhengyi Le, Min Luo:
On-demand security service. PETRA 2012: 7 - [c69]Yang Qin, Dijiang Huang, Xinwen Zhang:
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks. TrustCom 2012: 1438-1445 - [e2]Stefan Katzenbeisser, Edgar R. Weippl, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5 [contents] - [i2]Qingji Zheng, Xinwen Zhang:
Multiparty Cloud Computation. CoRR abs/1206.3717 (2012) - 2011
- [j12]Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for electronic healthcare services. Comput. Secur. 30(2-3): 116-127 (2011) - [j11]Xinwen Zhang, Anugeetha Kunjithapatham, Sangoh Jeong, Simon Gibbs:
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing. Mob. Networks Appl. 16(3): 270-284 (2011) - [j10]Min Xu, Duminda Wijesekera, Xinwen Zhang:
Runtime Administration of an RBAC Profile for XACML. IEEE Trans. Serv. Comput. 4(4): 286-299 (2011) - [c68]Ravishankar Ravindran, Guoqiang Wang, Xinwen Zhang:
Towards Secure Mobile Virtual Group in information-centric network. IEEE ANTS 2011: 1-3 - [c67]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu:
Enhancing the trust of internet routing with lightweight route attestation. AsiaCCS 2011: 92-101 - [c66]Xiaoxin Wu, Lei Xu, Xinwen Zhang:
Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing. CCS 2011: 869-872 - [c65]Xinwen Zhang, Katharine Chang, Huijun Xiong, Yonggang Wen, Guangyu Shi, Guoqiang Wang:
Towards name-based trust and security for content-centric network. ICNP 2011: 1-6 - [c64]Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali:
xDAuth: a scalable and lightweight framework for cross domain access control and delegation. SACMAT 2011: 31-40 - [c63]Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao:
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. SecureComm 2011: 491-500 - [c62]Katharine Chang, Xinwen Zhang, Guoqiang Wang, Kang G. Shin:
TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations. SocialCom/PASSAT 2011: 1020-1025 - [c61]Lei Liu, Xinwen Zhang, Songqing Chen:
Botnet with Browser Extensions. SocialCom/PASSAT 2011: 1089-1094 - [c60]Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh:
Taming Information-Stealing Smartphone Applications (on Android). TRUST 2011: 93-107 - [e1]Yan Chen, Shouhuai Xu, Ahmad-Reza Sadeghi, Xinwen Zhang:
Proceedings of the sixth ACM workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011. ACM 2011, ISBN 978-1-4503-1001-7 [contents] - [i1]Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang:
Unleashing the Power of Mobile Cloud Computing using ThinkAir. CoRR abs/1105.3232 (2011) - 2010
- [j9]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang:
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing. Concurr. Comput. Pract. Exp. 22(13): 1893-1910 (2010) - [j8]Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Web Services Based Business Processes. Int. J. Web Serv. Res. 7(3): 52-72 (2010) - [c59]Mohammad Nauman, Sohail Khan, Xinwen Zhang:
Apex: extending Android permission model and enforcement with user-defined runtime constraints. AsiaCCS 2010: 328-332 - [c58]Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert:
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. ESORICS 2010: 182-198 - [c57]Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. ICICS 2010: 107-125 - [c56]Tamleek Ali, Mohammad Nauman, Xinwen Zhang:
On Leveraging Stochastic Models for Remote Attestation. INTRUST 2010: 290-301 - [c55]Xinwen Zhang, Won Jong Jeon, Simon Gibbs, Anugeetha Kunjithapatham:
Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices. MobiCASE 2010: 373-381 - [c54]Xinwen Zhang, Sangoh Jeong, Anugeetha Kunjithapatham, Simon Gibbs:
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms. MOBILWARE 2010: 161-174 - [c53]Joshua Schiffman, Xinwen Zhang, Simon Gibbs:
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers. POLICY 2010: 95-102 - [c52]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Sohail Khan, Quratulain Alam:
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. SERVICES 2010: 56-63 - [c51]Dijiang Huang, Xinwen Zhang, Myong H. Kang, Jim Luo:
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication. SOSE 2010: 27-34 - [c50]Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao:
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization. SRDS 2010: 72-81 - [c49]Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-Pierre Seifert:
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform. TRUST 2010: 1-15 - [c48]Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Sencun Zhu:
pBMDS: a behavior-based malware detection system for cellphone devices. WISEC 2010: 37-48
2000 – 2009
- 2009
- [j7]Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu:
Towards secure dynamic collaborations with group-based RBAC model. Comput. Secur. 28(5): 260-275 (2009) - [c47]Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Exploitation and threat analysis of open mobile devices. ANCS 2009: 20-29 - [c46]Onur Aciiçmez, Jean-Pierre Seifert, Xinwen Zhang:
A Secure DVB Set-Top Box via Trusting Computing Technologies. CCNC 2009: 1-8 - [c45]Xinwen Zhang, Joshua Schiffman, Simon Gibbs, Anugeetha Kunjithapatham, Sangoh Jeong:
Securing elastic applications on mobile devices for cloud computing. CCSW 2009: 127-134 - [c44]Basel Katt, Michael Hafner, Xinwen Zhang:
Building a stateful reference monitor with coloured petri nets. CollaborateCom 2009: 1-10 - [c43]Basel Katt, Michael Hafner, Xinwen Zhang:
A usage control policy specification with Petri nets. CollaborateCom 2009: 1-8 - [c42]Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn:
Towards System Integrity Protection with Graph-Based Policy Analysis. DBSec 2009: 65-80 - [c41]Ge Cheng, Hai Jin, Deqing Zou, Xinwen Zhang, Min Li, Chen Yu, Guofu Xiang:
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure. GRID 2009: 113-119 - [c40]Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung:
Behavioral Attestation for Business Processes. ICWS 2009: 343-350 - [c39]Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. MobiSec 2009: 71-82 - [c38]Basel Katt, Xinwen Zhang, Michael Hafner:
Towards a Usage Control Policy Specification with Petri Nets. OTM Conferences (2) 2009: 905-912 - [c37]Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray:
Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16 - [c36]Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen:
VirusMeter: Preventing Your Cellphone from Spies. RAID 2009: 244-264 - [c35]Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for sharing electronic health records. SACMAT 2009: 125-134 - [c34]Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent Jaeger, Sencun Zhu:
Designing System-Level Defenses against Cellphone Malware. SRDS 2009: 83-90 - [c33]Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali:
Remote Attestation of Attribute Updates and Information Flows in a UCON System. TRUST 2009: 63-80 - 2008
- [j6]Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:
Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1): 3:1-3:36 (2008) - [c32]Onur Aciiçmez, Afshin Latifi, Jean-Pierre Seifert, Xinwen Zhang:
A Trusted Mobile Phone Prototype. CCNC 2008: 1208-1209 - [c31]Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang:
Usage control platformization via trustworthy SELinux. AsiaCCS 2008: 245-248 - [c30]Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xinwen Zhang:
Access Control Model for Sharing Composite Electronic Health Records. CollaborateCom 2008: 340-354 - [c29]Qi Li, Mingwei Xu, Xinwen Zhang:
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. ICDCS Workshops 2008: 441-446 - [c28]Qi Li, Mingwei Xu, Xinwen Zhang:
Access control in Group Communication Systems. ISCC 2008: 380-385 - [c27]Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang:
Systematic Policy Analysis for High-Assurance Services in SELinux. POLICY 2008: 3-10 - [c26]Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert:
A general obligation model and continuity: enhanced policy enforcement engine for usage control. SACMAT 2008: 123-132 - [c25]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert:
Model-based behavioral attestation. SACMAT 2008: 175-184 - [c24]Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu:
Security Enforcement Model for Distributed Usage Control. SUTC 2008: 10-18 - [c23]Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali:
Behavioral attestation for web services (BA4WS). SWS 2008: 21-28 - 2007
- [c22]Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert:
A trusted mobile phone reference architecturevia secure kernel. STC 2007: 7-14 - [c21]Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu:
SecureBus: towards application-transparent trusted computing with mandatory access control. AsiaCCS 2007: 117-126 - [c20]Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin:
Towards a Times-Based Usage Control Model. DBSec 2007: 227-242 - [c19]Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang:
A Model-Driven Framework for Trusted Computing Based Systems. EDOC 2007: 75-86 - [c18]Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu:
Flexible Authorization with Decentralized Access Control Model for Grid Computing. HASE 2007: 156-165 - [c17]Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang:
Towards a VMM-based usage control framework for OS kernel integrity protection. SACMAT 2007: 71-80 - [c16]Berthold Agreiter, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean-Pierre Seifert, Xinwen Zhang:
A technical architecture for enforcing usage control requirements in service-oriented architectures. SWS 2007: 18-25 - 2006
- [j5]Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington:
Client-side access control enforcement using trusted computing and PEI models. J. High Speed Networks 15(3): 229-245 (2006) - [j4]Sejong Oh, Ravi S. Sandhu, Xinwen Zhang:
An effective role administration model using organization structure. ACM Trans. Inf. Syst. Secur. 9(2): 113-137 (2006) - [c15]Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang:
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. ANCS 2006: 173-182 - [c14]Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang:
Secure information sharing enabled by Trusted Computing and PEI models. AsiaCCS 2006: 2-12 - [c13]Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce:
Safety analysis of usage control authorization models. AsiaCCS 2006: 243-254 - [c12]Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu:
A general design towards secure ad-hoc collaboration. AsiaCCS 2006: 358 - [c11]Qi Li, Xinwen Zhang, Sihan Qing, Mingwei Xu:
Supporting Ad-hoc Collaboration with Group-based RBAC Model. CollaborateCom 2006 - [c10]Zhixiong Zhang, Xinwen Zhang, Ravi S. Sandhu:
ROBAC: Scalable Role and Organization Based Access Control Models. CollaborateCom 2006 - [c9]Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu:
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. IWSEC 2006: 179-195 - [c8]Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:
A usage-based authorization framework for collaborative computing systems. SACMAT 2006: 180-189 - 2005
- [j3]Yingjiu Li, Xinwen Zhang:
Securing credit card transactions with one-time payment scheme. Electron. Commer. Res. Appl. 4(4): 413-426 (2005) - [j2]Xinwen Zhang, Songqing Chen, Ravi S. Sandhu:
Enhancing Data Authenticity and Integrity in P2P Systems. IEEE Internet Comput. 9(6): 42-49 (2005) - [j1]Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park:
Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4): 351-387 (2005) - [c7]Xinwen Zhang, Yingjiu Li, Divya Nalla:
An attribute-based access matrix model. SAC 2005: 359-363 - [c6]Ravi S. Sandhu, Xinwen Zhang:
Peer-to-peer access control architecture using trusted computing technology. SACMAT 2005: 147-158 - 2004
- [c5]Jaehong Park, Xinwen Zhang, Ravi S. Sandhu:
Attribute Mutability in Usage Control. DBSec 2004: 15-29 - [c4]Yingjiu Li, Xinwen Zhang:
A Security-Enhanced One-Time Payment Scheme for Credit Card. RIDE 2004: 40-47 - [c3]Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu:
A logical specification for usage control. SACMAT 2004: 1-10 - 2003
- [c2]Xinwen Zhang, Jaehong Park, Ravi S. Sandhu:
Schema Based XML Security: RBAC Approach. DBSec 2003: 330-343 - [c1]Xinwen Zhang, Sejong Oh, Ravi S. Sandhu:
PBDM: a flexible delegation model in RBAC. SACMAT 2003: 149-157
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint