Understanding real-world concurrency bugs in go T Tu, X Liu, L Song, Y Zhang Proceedings of the twenty-fourth international conference on architectural …, 2019 | 88 | 2019 |
Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree L Rao, H Zhang, T Tu IEEE Transactions on Services Computing 13 (3), 451-463, 2017 | 67 | 2017 |
Understanding the performance of webassembly applications Y Yan, T Tu, L Zhao, Y Zhou, W Wang Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021 | 44 | 2021 |
LncCeRBase: a database of experimentally validated human competing endogenous long non-coding RNAs C Pian, G Zhang, T Tu, X Ma, F Li Database 2018, bay061, 2018 | 21 | 2018 |
An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications H Zhang, B Qin, T Tu, Z Guo, F Gao, Q Wen IEEE Transactions on Industrial Informatics 16 (1), 658-668, 2019 | 17 | 2019 |
DoSGuard: Mitigating denial-of-service attacks in software-defined networks J Li, T Tu, Y Li, S Qin, Y Shi, Q Wen Sensors 22 (3), 1061, 2022 | 16 | 2022 |
Privacy-preserving outsourced auditing scheme for dynamic data storage in cloud T Tu, L Rao, H Zhang, Q Wen, J Xiao Security and Communication Networks 2017, 2017 | 16 | 2017 |
Krprotector: Detection and files protection for iot devices on android without root against ransomware based on decoys S Wang, H Zhang, S Qin, W Li, T Tu, A Shen, W Liu IEEE Internet of Things Journal 9 (19), 18251-18266, 2022 | 12 | 2022 |
Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security L Rao, T Tu, H Zhang, Q Wen, J Xiao Wireless Communications and Mobile Computing 2018, 2018 | 5 | 2018 |
Packet injection exploiting attack and mitigation in software-defined networks J Li, S Qin, T Tu, H Zhang, Y Li Applied Sciences 12 (3), 1103, 2022 | 4 | 2022 |
KRDroid: Ransomware-oriented detector for mobile devices based on behaviors S Wang, S Qin, J Qin, H Zhang, T Tu, Z Jin, J Guo Applied Sciences 11 (14), 6557, 2021 | 4 | 2021 |
KRRecover: An auto-recovery tool for hijacked devices and encrypted files by ransomwares on android S Wang, S Qin, N He, T Tu, J Hou, H Zhang, Y Shi Symmetry 13 (5), 861, 2021 | 4 | 2021 |
Algorithmic profiling for real-world complexity problems B Qin, T Tu, Z Liu, T Yu, L Song IEEE Transactions on Software Engineering 48 (7), 2680-2694, 2021 | 3 | 2021 |
Deep-Learning Based Injection Attacks Detection Method for HTTP C Zhao, S Si, T Tu, Y Shi, S Qin Mathematics 10 (16), 2914, 2022 | 2 | 2022 |
VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG C Zhao, T Tu, C Wang, S Qin Applied Sciences 13 (16), 9240, 2023 | 1 | 2023 |
Micro-attention branch, a flexible plug-in that enhances existing 3d convnets Y Li, T Tu, H Wang, W Yin Symmetry 14 (4), 639, 2022 | 1 | 2022 |
Sound can help us see more clearly Y Li, T Tu, H Zhang, J Li, Z Jin, Q Wen Sensors 22 (2), 599, 2022 | 1 | 2022 |
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector T Tu, W Yin, H Zhang, X Zeng, X Deng, Y Zhou, X Liu CMC-COMPUTERS MATERIALS & CONTINUA 71 (2), 2315-2331, 2022 | 1 | 2022 |
A detector for Android repackaged applications with layout-fingerprint T Tu, H Zhang, Y Hu, D Cui, X Zhai Journal of Information Security and Applications 76, 103527, 2023 | | 2023 |
Jasmine: A Static Analysis Framework for Spring Core Technologies M Chen, T Tu, H Zhang, Q Wen, W Wang Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | | 2022 |