Jinpeng Wei, Ph.D. - Publications

Affiliations: 
2009 Georgia Institute of Technology, Atlanta, GA 
Area:
Computer Science

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Wei J, Zhu F. Binary-centric defense of production operating systems against kernel queue injection attacks Journal of Computer Virology and Hacking Techniques. 15: 259-275. DOI: 10.1007/S11416-019-00337-8  0.394
2016 Wang Y, Wei J, Srivatsa M, Duan Y, Du W. IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications International Journal of Networked and Distributed Computing. 4: 116-126. DOI: 10.2991/Ijndc.2016.4.2.5  0.329
2016 Wang Y, Wei J, Ren S, Shen Y. Toward integrity assurance of outsourced computing a game theoretic perspective Future Generation Computer Systems. 55: 87-100. DOI: 10.1016/J.Future.2015.08.010  0.315
2015 Morris KA, Allison M, Costa FM, Wei J, Clarke PJ. An adaptive middleware design to support the dynamic interpretation of domain-specific models Information and Software Technology. 62: 21-41. DOI: 10.1016/J.Infsof.2015.02.003  0.396
2015 Wang Y, Wei J. Toward protecting control flow confidentiality in cloud-based computation Computers & Security. 52: 106-127. DOI: 10.1016/J.Cose.2015.04.005  0.429
2014 Wang Y, Wei J, Duan Y. Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework International Journal of Grid and Distributed Computing. 7: 53-70. DOI: 10.14257/Ijgdc.2014.7.6.05  0.398
2014 Zhu F, Wei J. Static analysis based invariant detection for commodity operating systems Computers & Security. 43: 49-63. DOI: 10.1016/J.Cose.2014.02.008  0.333
2012 Wei J, Pu C. Toward a general defense against kernel queue hooking attacks Computers and Security. 31: 176-191. DOI: 10.1016/J.Cose.2011.12.007  0.546
2010 Wei J. Knowledge management framework for cyber security learning International Journal of Management in Education. 4: 95-106. DOI: 10.1504/IJMIE.2010.029884  0.315
2010 Wei J, Pu C. Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems Computers and Security. 29: 815-830. DOI: 10.1016/J.Cose.2010.09.004  0.533
2008 Wei J, Singaravelu L, Pu C. A secure information flow architecture for web service platforms Ieee Transactions On Services Computing. 1: 75-87. DOI: 10.1109/Tsc.2008.10  0.425
Show low-probability matches.