关注
Tengfei Tu
标题
引用次数
引用次数
年份
Understanding real-world concurrency bugs in go
T Tu, X Liu, L Song, Y Zhang
Proceedings of the twenty-fourth international conference on architectural …, 2019
942019
Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree
L Rao, H Zhang, T Tu
IEEE Transactions on Services Computing 13 (3), 451-463, 2017
692017
Understanding the performance of webassembly applications
Y Yan, T Tu, L Zhao, Y Zhou, W Wang
Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021
522021
LncCeRBase: a database of experimentally validated human competing endogenous long non-coding RNAs
C Pian, G Zhang, T Tu, X Ma, F Li
Database 2018, bay061, 2018
222018
DoSGuard: Mitigating denial-of-service attacks in software-defined networks
J Li, T Tu, Y Li, S Qin, Y Shi, Q Wen
Sensors 22 (3), 1061, 2022
212022
An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications
H Zhang, B Qin, T Tu, Z Guo, F Gao, Q Wen
IEEE Transactions on Industrial Informatics 16 (1), 658-668, 2019
212019
Privacy‐Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
T Tu, L Rao, H Zhang, Q Wen, J Xiao
Security and Communication Networks 2017 (1), 4603237, 2017
172017
Krprotector: Detection and files protection for iot devices on android without root against ransomware based on decoys
S Wang, H Zhang, S Qin, W Li, T Tu, A Shen, W Liu
IEEE Internet of Things Journal 9 (19), 18251-18266, 2022
142022
KRRecover: An auto-recovery tool for hijacked devices and encrypted files by ransomwares on android
S Wang, S Qin, N He, T Tu, J Hou, H Zhang, Y Shi
Symmetry 13 (5), 861, 2021
52021
Algorithmic profiling for real-world complexity problems
B Qin, T Tu, Z Liu, T Yu, L Song
IEEE Transactions on Software Engineering 48 (7), 2680-2694, 2021
52021
Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security
L Rao, T Tu, H Zhang, Q Wen, J Xiao
Wireless Communications and Mobile Computing 2018 (1), 4186243, 2018
52018
Packet injection exploiting attack and mitigation in software-defined networks
J Li, S Qin, T Tu, H Zhang, Y Li
Applied Sciences 12 (3), 1103, 2022
42022
KRDroid: Ransomware-oriented detector for mobile devices based on behaviors
S Wang, S Qin, J Qin, H Zhang, T Tu, Z Jin, J Guo
Applied Sciences 11 (14), 6557, 2021
42021
Deep-learning based injection attacks detection method for HTTP
C Zhao, S Si, T Tu, Y Shi, S Qin
Mathematics 10 (16), 2914, 2022
32022
Jasmine: A Static Analysis Framework for Spring Core Technologies
M Chen, T Tu, H Zhang, Q Wen, W Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
22022
VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG
C Zhao, T Tu, C Wang, S Qin
Applied Sciences 13 (16), 9240, 2023
12023
Micro-attention branch, a flexible plug-in that enhances existing 3d convnets
Y Li, T Tu, H Wang, W Yin
Symmetry 14 (4), 639, 2022
12022
Sound can help us see more clearly
Y Li, T Tu, H Zhang, J Li, Z Jin, Q Wen
Sensors 22 (2), 599, 2022
12022
Icmptend: internet control message protocol covert tunnel attack intent detector
T Tu, W Yin, H Zhang, X Zeng, X Deng, Y Zhou, X Liu
Computers, Materials & Continua 71 (2), 2315-2331, 2022
12022
Intelligent analysis of android application privacy policy and permission consistency
T Tu, H Zhang, B Gong, D Du, Q Wen
Artificial Intelligence Review 57 (7), 172, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20