A novel chaos-based fragile watermarking for image tampering detection and self-recovery Y Chen Harbin Institute of Technology, 2011 | 168* | 2011 |
Armlock: Hardware-based fault isolation for arm Y Zhou, X Wang, Y Chen, Z Wang Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 123 | 2014 |
Remix: On-demand live randomization Y Chen, Z Wang, D Whalley, L Lu Proceedings of the sixth ACM conference on data and application security and …, 2016 | 116 | 2016 |
Value driven security threat modeling based on attack path analysis Y Chen, B Boehm, L Sheppard 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 87 | 2007 |
Adaptive Android Kernel Live Patching Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei USENIX Security Symposium 2017, 2017 | 84 | 2017 |
{SecPod}: a Framework for Virtualization-based Security Systems X Wang, Y Chen, Z Wang, Y Qi, Y Zhou 2015 USENIX Annual Technical Conference (USENIX ATC 15), 347-360, 2015 | 76 | 2015 |
Downgrade attack on trustzone Y Chen, Y Zhang, Z Wang, T Wei arXiv preprint arXiv:1707.05082, 2017 | 64 | 2017 |
Design and implementation of SecPod, a framework for virtualization-based security systems X Wang, Y Qi, Z Wang, Y Chen, Y Zhou IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017 | 52 | 2017 |
Adaptive intrusion response to minimize risk over multiple network attacks S Tanachaiwiwat, K Hwang, Y Chen ACM Trans on Information and System Security 19 (1-30), 95-96, 2002 | 48 | 2002 |
Pinpointing vulnerabilities Y Chen, M Khandaker, Z Wang Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 42 | 2017 |
Method and system for detecting and correcting errors while accessing memory devices in microprocessor systems Y Zhang, PY Lu, Y Chen US Patent 7,334,179, 2008 | 31 | 2008 |
Stakeholder value driven threat modeling for off the shelf based systems Y Chen, BW Boehm 29th International Conference on Software Engineering (ICSE'07 Companion), 91-92, 2007 | 28 | 2007 |
Secure in-cache execution Y Chen, M Khandaker, Z Wang Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 24 | 2017 |
Method and system for codec with polyringer Y Chen, N Sollenberger, M Wang US Patent 7,653,204, 2010 | 21 | 2010 |
Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-day Root Exploits T Zhang, Yulong and Chen, Yue and Bao, Chenfu and Xia, Liangzhao and Zhen ... Black Hat USA 2016, 2016 | 15 | 2016 |
Wireless device having a hardware accelerator to support equalization processing Y Chen US Patent 7,643,549, 2010 | 13 | 2010 |
Measuring Security Investment Benefit for Off the Shelf Software Systems-A Stakeholder Value Driven Approach. Y Chen, B Boehm, L Sheppard WEIS, 2007 | 13 | 2007 |
Diesel Engine Fault Diagnosis Based on D-S Evidence Theory L Tong, Y Chen, Z Wang, Q Qin Science Technology and Engineering, 3749-3752, 2010 | 12* | 2010 |
Method and system for analog and digital RF receiver interface Y Chen, N Sollenberger, M Wang US Patent 8,060,050, 2011 | 7 | 2011 |
Equalize training method using re-encoded bits and known training sequences Y Chen, A Molev-Shteiman, A Heiman, NR Sollenberger, HH Zeng, ... US Patent 7,903,728, 2011 | 7 | 2011 |