Jinpeng Wei, Ph.D.
Affiliations: | 2009 | Georgia Institute of Technology, Atlanta, GA |
Area:
Computer ScienceGoogle:
"Jinpeng Wei"Parents
Sign in to add mentorCalton Pu | grad student | 2009 | Georgia Tech | |
(Improving operating systems security: Two case studies.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Wei J, Zhu F. (2019) Binary-centric defense of production operating systems against kernel queue injection attacks Journal of Computer Virology and Hacking Techniques. 15: 259-275 |
Wang Y, Wei J, Srivatsa M, et al. (2016) IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications International Journal of Networked and Distributed Computing. 4: 116-126 |
Wang Y, Wei J, Ren S, et al. (2016) Toward integrity assurance of outsourced computing a game theoretic perspective Future Generation Computer Systems. 55: 87-100 |
Morris KA, Allison M, Costa FM, et al. (2015) An adaptive middleware design to support the dynamic interpretation of domain-specific models Information and Software Technology. 62: 21-41 |
Wang Y, Wei J. (2015) Toward protecting control flow confidentiality in cloud-based computation Computers & Security. 52: 106-127 |
Wang Y, Wei J, Duan Y. (2014) Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework International Journal of Grid and Distributed Computing. 7: 53-70 |
Zhu F, Wei J. (2014) Static analysis based invariant detection for commodity operating systems Computers & Security. 43: 49-63 |
Wei J, Pu C. (2012) Toward a general defense against kernel queue hooking attacks Computers and Security. 31: 176-191 |
Wei J. (2010) Knowledge management framework for cyber security learning International Journal of Management in Education. 4: 95-106 |
Wei J, Pu C. (2010) Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems Computers and Security. 29: 815-830 |