Follow
Tengfei Tu
Title
Cited by
Cited by
Year
Understanding real-world concurrency bugs in go
T Tu, X Liu, L Song, Y Zhang
Proceedings of the twenty-fourth international conference on architectural …, 2019
882019
Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree
L Rao, H Zhang, T Tu
IEEE Transactions on Services Computing 13 (3), 451-463, 2017
672017
Understanding the performance of webassembly applications
Y Yan, T Tu, L Zhao, Y Zhou, W Wang
Proceedings of the 21st ACM Internet Measurement Conference, 533-549, 2021
442021
LncCeRBase: a database of experimentally validated human competing endogenous long non-coding RNAs
C Pian, G Zhang, T Tu, X Ma, F Li
Database 2018, bay061, 2018
212018
An adaptive encryption-as-a-service architecture based on fog computing for real-time substation communications
H Zhang, B Qin, T Tu, Z Guo, F Gao, Q Wen
IEEE Transactions on Industrial Informatics 16 (1), 658-668, 2019
172019
DoSGuard: Mitigating denial-of-service attacks in software-defined networks
J Li, T Tu, Y Li, S Qin, Y Shi, Q Wen
Sensors 22 (3), 1061, 2022
162022
Privacy-preserving outsourced auditing scheme for dynamic data storage in cloud
T Tu, L Rao, H Zhang, Q Wen, J Xiao
Security and Communication Networks 2017, 2017
162017
Krprotector: Detection and files protection for iot devices on android without root against ransomware based on decoys
S Wang, H Zhang, S Qin, W Li, T Tu, A Shen, W Liu
IEEE Internet of Things Journal 9 (19), 18251-18266, 2022
122022
Dynamic outsourced proofs of retrievability enabling auditing migration for remote storage security
L Rao, T Tu, H Zhang, Q Wen, J Xiao
Wireless Communications and Mobile Computing 2018, 2018
52018
Packet injection exploiting attack and mitigation in software-defined networks
J Li, S Qin, T Tu, H Zhang, Y Li
Applied Sciences 12 (3), 1103, 2022
42022
KRDroid: Ransomware-oriented detector for mobile devices based on behaviors
S Wang, S Qin, J Qin, H Zhang, T Tu, Z Jin, J Guo
Applied Sciences 11 (14), 6557, 2021
42021
KRRecover: An auto-recovery tool for hijacked devices and encrypted files by ransomwares on android
S Wang, S Qin, N He, T Tu, J Hou, H Zhang, Y Shi
Symmetry 13 (5), 861, 2021
42021
Algorithmic profiling for real-world complexity problems
B Qin, T Tu, Z Liu, T Yu, L Song
IEEE Transactions on Software Engineering 48 (7), 2680-2694, 2021
32021
Deep-Learning Based Injection Attacks Detection Method for HTTP
C Zhao, S Si, T Tu, Y Shi, S Qin
Mathematics 10 (16), 2914, 2022
22022
VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG
C Zhao, T Tu, C Wang, S Qin
Applied Sciences 13 (16), 9240, 2023
12023
Micro-attention branch, a flexible plug-in that enhances existing 3d convnets
Y Li, T Tu, H Wang, W Yin
Symmetry 14 (4), 639, 2022
12022
Sound can help us see more clearly
Y Li, T Tu, H Zhang, J Li, Z Jin, Q Wen
Sensors 22 (2), 599, 2022
12022
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
T Tu, W Yin, H Zhang, X Zeng, X Deng, Y Zhou, X Liu
CMC-COMPUTERS MATERIALS & CONTINUA 71 (2), 2315-2331, 2022
12022
A detector for Android repackaged applications with layout-fingerprint
T Tu, H Zhang, Y Hu, D Cui, X Zhai
Journal of Information Security and Applications 76, 103527, 2023
2023
Jasmine: A Static Analysis Framework for Spring Core Technologies
M Chen, T Tu, H Zhang, Q Wen, W Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20