关注
Shijie Jia
Shijie Jia
Associate Professor,State Key Laboratory of Information Security, Institute of Information
在 iie.ac.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Deftl: Implementing plausibly deniable encryption in flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
482017
Nfps: Adding undetectable secure deletion to flash translation layer
S Jia, L Xia, B Chen, P Liu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
442016
Extracting robust keys from NAND flash physical unclonable functions
S Jia, L Xia, Z Wang, J Lin, G Zhang, Y Ji
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
332015
Sanitizing data is not enough! Towards sanitizing structural artifacts in flash media
B Chen, S Jia, L Xia, P Liu
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
252016
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
222017
Ensuring data confidentiality via plausibly deniable encryption and secure deletion–a survey
Q Zhang, S Jia, B Chang, B Chen
Cybersecurity 1, 1-20, 2018
172018
Mimosaftl: adding secure and practical ransomware defense strategy to flash translation layer
P Wang, S Jia, B Chen, L Xia, P Liu
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
142019
Identification of cloned HF RFID proximity cards based on RF fingerprinting
G Zhang, L Xia, S Jia, Y Ji
2016 IEEE Trustcom/BigDataSE/ISPA, 292-300, 2016
132016
Cryptogo: Automatic detection of go cryptographic api misuses
W Li, S Jia, L Liu, F Zheng, Y Ma, J Lin
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
92022
Physical-layer identification of HF RFID cards based on RF fingerprinting
G Zhang, L Xia, S Jia, Y Ji
Information Security Practice and Experience: 12th International Conference …, 2016
62016
Splitter: an efficient scheme to determine the geolocation of cloud data publicly
Y Zhang, D Jia, S Jia, L Liu, J Lin
2020 29th International Conference on Computer Communications and Networks …, 2020
42020
VoteGeo: An IoT-based voting approach to verify the geographic location of cloud hosts
D Jia, L Liu, S Jia, J Lin
2019 IEEE 38th International Performance Computing and Communications …, 2019
42019
EHIFS: an efficient history independent file system
B Gao, B Chen, S Jia, L Xia
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
42019
EnclavePoSt: A practical proof of storage-time in cloud via intel SGX
Y Zhang, W You, S Jia, L Liu, Z Li, W Qian
Security and Communication Networks 2022, 2022
32022
MDEFTL: Incorporating multi-snapshot plausible deniability into flash translation layer
S Jia, Q Zhang, L Xia, J Jing, P Liu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3494-3507, 2021
32021
Enhancing the security of mobile device management with seccomp
Y Niu, Y Wang, S Jia, Q Zhou, L Lei, Q Zhang, X Zhao
Journal of Physics: Conference Series 1646 (1), 012138, 2020
32020
Ensuring data confidentiality with a secure XTS-AES design in flash translation layer
Q Zhang, S Jia, J He, X Zhao, L Xia, Y Niu, J Jing
2020 IEEE 5th International Conference on Cloud Computing and Big Data …, 2020
32020
Enhancing location privacy for electric vehicles by obfuscating the linkages of charging events
X Sun, L Xia, S Jia
2015 IEEE 5th International Conference on Electronics Information and …, 2015
32015
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions
Y Niu, L Lei, Y Wang, J Chang, S Jia, C Kou
2020 16th International Conference on Mobility, Sensing and Networking (MSN …, 2020
22020
Dpvgeo: Delay-based public verification of cloud data geolocation
D Jia, Y Zhang, S Jia, L Liu, J Lin
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20