
Weidong Shi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [i18]Mudabbir Kaleem, Keshav Kasichainula, Rabimba Karanjai, Lei Xu, Zhimin Gao, Lin Chen, Weidong Shi:
EDSC: An Event-Driven Smart Contract Platform. CoRR abs/2101.05475 (2021) - [i17]Mudabbir Kaleem, Weidong Shi:
Demystifying Pythia: A Survey of ChainLink Oracles Usage on Ethereum. CoRR abs/2101.06781 (2021) - 2020
- [j20]Lei Xu
, Lin Chen, Zhimin Gao, Larry Carranco, Xinxin Fan, Nolan Shah, Nour Diallo, Weidong Shi:
Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices. IEEE Consumer Electron. Mag. 9(2): 26-33 (2020) - [j19]Jian-Jun Xu, Weidong Shi, Wei-Fan Hu, Jun-Jie Huang:
A level-set immersed interface method for simulating the electrohydrodynamics. J. Comput. Phys. 400 (2020) - [j18]Yunzhou Zhang
, Shuangwei Liu, Lin Qi, Sonya Coleman, Dermot Kerr, Weidong Shi:
Multi-level and multi-scale horizontal pooling network for person re-identification. Multim. Tools Appl. 79(39-40): 28603-28619 (2020) - [j17]Lei Xu
, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi:
DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Netw. 34(1): 38-46 (2020) - [j16]Abraham Báez-Suárez, Nolan Shah, Juan Arturo Nolazco-Flores, Shou-Hsuan S. Huang, Omprakash Gnawali, Weidong Shi:
SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting. ACM Trans. Multim. Comput. Commun. Appl. 16(2): 43:1-43:23 (2020) - [c86]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Weidong Shi:
DL-DP: Improving the Security of Industrial IoT with Decentralized Ledger Defined Perimeter. BSCI 2020: 53-62 - [c85]Lin Chen
, Ahmed Sunny, Lei Xu
, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. COCOON 2020: 85-97 - [c84]Lin Chen
, Martin Koutecký, Lei Xu, Weidong Shi:
New Bounds on Augmenting Steps of Block-Structured Integer Programs. ESA 2020: 33:1-33:19 - [c83]Yunzhou Zhang, Weidong Shi, Shuangwei Liu, Jining Bao, Ying Wei:
Scale-Invariant Siamese Network For Person Re-Identification. ICIP 2020: 2436-2440 - [c82]Lei Xu
, Lin Chen
, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi:
PrivateEx: privacy preserving exchange of crypto-assets on blockchain. SAC 2020: 316-323 - [i16]Lin Chen, Lei Xu, Zhimin Gao, Keshav Kasichainula, Weidong Shi:
Nonlinear Blockchain Scalability: a Game-Theoretic Perspective. CoRR abs/2001.08231 (2020) - [i15]Xiaoqiang Yue, Shulei Zhang, Xiaowen Xu, Shi Shu, Weidong Shi:
Algebraic multigrid block preconditioning for multi-group radiation diffusion equations. CoRR abs/2002.04958 (2020) - [i14]Hadi Mansourifar, Lin Chen, Weidong Shi:
Hybrid Cryptocurrency Pump and Dump Detection. CoRR abs/2003.06551 (2020) - [i13]Hadi Mansourifar, Weidong Shi:
Deep Synthetic Minority Over-Sampling Technique. CoRR abs/2003.09788 (2020) - [i12]Hadi Mansourifar, Weidong Shi:
One-Shot GAN Generated Fake Face Detection. CoRR abs/2003.12244 (2020) - [i11]Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. CoRR abs/2007.02533 (2020) - [i10]Hadi Mansourifar, Weidong Shi:
Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack. CoRR abs/2009.02286 (2020) - [i9]Hadi Mansourifar, Weidong Shi:
Towards Stable Imbalanced Data Classification via Virtual Big Data Projection. CoRR abs/2009.08387 (2020) - [i8]Weidong Shi, Guanghui Ren, Yunpeng Chen, Shuicheng Yan:
ProxylessKD: Direct Knowledge Distillation with Inherited Classifier for Face Recognition. CoRR abs/2011.00265 (2020)
2010 – 2019
- 2019
- [c81]Han-Yee Kim, Rohyoung Myung, Boeui Hong, Heon-Chang Yu, Taeweon Suh, Lei Xu
, Weidong Shi:
SafeDB: Spark Acceleration on FPGA Clouds with Enclaved Data Processing and Bitstream Protection. CLOUD 2019: 107-114 - [c80]Lin Chen
, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. AAAI 2019: 2572-2579 - [c79]Hadi Mansourifar, Lin Chen, Weidong Shi:
Virtual Big Data for GAN Based Data Augmentation. BigData 2019: 1478-1487 - [c78]Lei Xu
, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi:
KCRS: A Blockchain-Based Key Compromise Resilient Signature System. BlockSys 2019: 226-239 - [c77]Han-Yee Kim, Taeweon Suh, Lei Xu
, Weidong Shi:
FPGALedger: FPGA based Decentralized Ledger for Enterprise Applications. IEEE ICBC 2019: 86-89 - [c76]Shuangwei Liu, Lin Qi, Yunzhou Zhang, Weidong Shi:
Dual Reverse Attention Networks for Person Re-Identification. ICIP 2019: 1232-1236 - [c75]Lin Chen
, Lei Xu
, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribe-Effect Uncertainty: A Dichotomy Result. IJCAI 2019: 158-164 - [c74]Quang Tran, Lin Chen
, Lei Xu
, Yang Lu, Weidong Shi:
Cross Chain Bribery Contracts: Majority vs Mighty Minority. PAAMS (Workshops) 2019: 121-133 - [i7]Yanling Chang, Eleftherios Iakovou, Weidong Shi:
Blockchain in Global Supply Chains and Cross Border Trade: A Critical Synthesis of the State-of-the-Art, Challenges and Opportunities. CoRR abs/1901.02715 (2019) - [i6]Zhimin Gao, Lei Xu, Keshav Kasichainula, Lin Chen, Bogdan Carbunar, Weidong Shi:
Private and Atomic Exchange of Assets over Zero Knowledge Based Payment Ledger. CoRR abs/1909.06535 (2019) - 2018
- [j15]Boeui Hong
, Han-Yee Kim, Minsu Kim, Taeweon Suh, Lei Xu
, Weidong Shi:
FASTEN: An FPGA-Based Secure System for Big Data Processing. IEEE Des. Test 35(1): 30-38 (2018) - [j14]Lin Chen
, Lei Xu
, Zhimin Gao, Yang Lu, Weidong Shi:
Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts. IEEE Secur. Priv. 16(4): 30-37 (2018) - [j13]Jian-Jun Xu, Weidong Shi, Ming-Chih Lai:
A level-set method for two-phase flows with soluble surfactant. J. Comput. Phys. 353: 336-355 (2018) - [j12]Zhimin Gao, Lei Xu
, Lin Chen
, Xi Zhao, Yang Lu, Weidong Shi:
CoC: A Unified Distributed Ledger Based Supply Chain Management System. J. Comput. Sci. Technol. 33(2): 237-248 (2018) - [j11]Die Chen, Maochao Xu, Weidong Shi:
Defending a cyber system with early warning mechanism. Reliab. Eng. Syst. Saf. 169: 224-234 (2018) - [j10]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. EAI Endorsed Trans. Security Safety 4(13): e5 (2018) - [j9]Lei Xu
, Jong-Hyuk Lee, Seung Hun Kim, Qingji Zheng, Shouhuai Xu
, Taeweon Suh, Won Woo Ro, Weidong Shi:
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. IEEE Trans. Cloud Comput. 6(2): 478-491 (2018) - [j8]Jong-Hyuk Lee, Weidong Shi, Joon-Min Gil:
Accelerated bulk memory operations on heterogeneous multi-core systems. J. Supercomput. 74(12): 6898-6922 (2018) - [c73]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Nolan Shah, Yang Lu, Weidong Shi:
Protecting Election from Bribery: New Approach and Computational Complexity Characterization. AAMAS 2018: 1894-1896 - [c72]Ton Chanh Le, Lei Xu
, Lin Chen
, Weidong Shi:
Proving Conditional Termination for Smart Contracts. BCC@AsiaCCS 2018: 57-59 - [c71]Lin Chen
, Lei Xu
, Zhimin Gao, Yang Lu, Weidong Shi:
Protecting Early Stage Proof-of-Work Based Public Blockchain. DSN Workshops 2018: 122-127 - [c70]Lin Chen
, Lei Xu
, Zhimin Gao, Nolan Shah, Ton Chanh Le, Yang Lu, Weidong Shi:
The Game Among Bribers in a Smart Contract System. Financial Cryptography Workshops 2018: 294-307 - [c69]Saeid Mofrad
, Fengwei Zhang, Shiyong Lu, Weidong Shi:
A comparison study of intel SGX and AMD memory encryption technology. HASP@ISCA 2018: 9:1-9:8 - [c68]Zhimin Gao, Lei Xu
, Glenn Turner, Brijesh Patel, Nour Diallo, Lin Chen
, Weidong Shi:
Blockchain-based Identity Management with Mobile Device. CRYBLOCK@MobiSys 2018: 66-70 - [e4]Jakub Szefer, Weidong Shi, Ruby B. Lee:
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018. ACM 2018 [contents] - [i5]Lin Chen, Lei Xu, Weidong Shi:
On the Graver basis of block-structured integer programming. CoRR abs/1805.03741 (2018) - [i4]Hadi Mansourifar, Weidong Shi:
Next Generation of Star Patterns. CoRR abs/1809.09270 (2018) - [i3]Hadi Mansourifar, Weidong Shi:
Toward Efficient Breast Cancer Diagnosis and Survival Prediction Using L-Perceptron. CoRR abs/1811.03016 (2018) - [i2]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. CoRR abs/1811.03158 (2018) - [i1]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. CoRR abs/1811.04900 (2018) - 2017
- [c67]Olga Datskova, Weidong Shi:
Modeling Instability for Large Scale Processing Tasks Within HEP Distributed Computing Environments. 3PGCIC 2017: 335-346 - [c66]Olga Datskova, Costin Grigoras, Weidong Shi:
Performance Analytics for Scientific Distributed Computing Environments. BDIOT 2017: 75-79 - [c65]Minsu Kim, Sunhee Kong, Boeui Hong, Lei Xu
, Weidong Shi, Taeweon Suh:
Evaluating coherence-exploiting hardware Trojan. DATE 2017: 157-162 - [c64]Lin Chen
, Lei Xu
, Nolan Shah, Zhimin Gao, Yang Lu, Weidong Shi:
Decentralized Execution of Smart Contracts: Agent Model Perspective and Its Implications. Financial Cryptography Workshops 2017: 468-477 - [c63]Lei Xu
, Lin Chen
, Zhimin Gao, Yang Lu, Weidong Shi:
CoC: Secure Supply Chain Management System Based on Public Ledger. ICCCN 2017: 1-6 - [c62]Zhimin Gao, Lei Xu
, Lin Chen
, Nolan Shah, Yang Lu, Weidong Shi:
Scalable Blockchain Based Smart Contract Execution. ICPADS 2017: 352-359 - [c61]Lin Chen
, Lei Xu
, Zhimin Gao, Nolan Shah, Yang Lu, Weidong Shi:
Smart Contract Execution - the (+-)-Biased Ballot Problem. ISAAC 2017: 21:1-21:12 - [c60]Zhenyu Ning, Fengwei Zhang, Weisong Shi, Weidong Shi:
Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments. HASP@ISCA 2017: 6:1-6:8 - [c59]Lei Xu
, Lin Chen
, Zhimin Gao, Shouhuai Xu, Weidong Shi:
EPBC: Efficient Public Blockchain Client for lightweight users. SERIAL@Middleware 2017: 1:1-1:6 - [c58]Lin Chen
, Lei Xu
, Nolan Shah, Zhimin Gao, Yang Lu, Weidong Shi:
On Security Analysis of Proof-of-Elapsed-Time (PoET). SSS 2017: 282-297 - [c57]Olga Datskova, Costin Grigoras, Weidong Shi:
Failure Analysis for Distributed Computing Environments. UCC (Companion") 2017: 85-90 - [c56]Lei Xu
, Lin Chen
, Nolan Shah, Zhimin Gao, Yang Lu, Weidong Shi:
DL-BAC: Distributed Ledger Based Access Control for Web Applications. WWW (Companion Volume) 2017: 1445-1450 - 2016
- [c55]Zhimin Gao, Lei Xu
, Weidong Shi:
MapReduce for Elliptic Curve Discrete Logarithm Problem. SERVICES 2016: 39-46 - 2015
- [c54]Lei Xu
, Pham Dang Khoa, Seung-Hun Kim, Won Woo Ro, Weidong Shi:
Another Look at Secure Big Data Processing: Formal Framework and a Potential Approach. CLOUD 2015: 548-555 - [c53]Xi Zhao, Zhimin Gao, Jianhua Zou, Weidong Shi, Wei Huang:
Scalable 3D Facial Shape Motion Retrieval from Image Sequences Using a Map-Reduce Framework. BigMM 2015: 252-255 - [c52]Lei Xu
, Xinwen Zhang, Xiaoxin Wu, Weidong Shi:
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud. CODASPY 2015: 167-169 - [c51]Seung-Hun Kim, Lei Xu
, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi:
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. DSN 2015: 251-262 - [c50]Zhimin Gao, Nicholas DeSalvo, Pham Dang Khoa, Seung-Hun Kim, Lei Xu
, Won Woo Ro, Rakesh M. Verma
, Weidong Shi:
Integrity Protection for Big Data Processing with Dynamic Redundancy Computation. ICAC 2015: 159-160 - [e3]Ruby B. Lee, Weidong Shi, Jakub Szefer:
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015. ACM 2015, ISBN 978-1-4503-3483-9 [contents] - 2014
- [j7]Xi Zhao, Tao Feng, Weidong Shi, Ioannis A. Kakadiaris
:
Mobile User Authentication Using Statistical Touch Dynamics Images. IEEE Trans. Inf. Forensics Secur. 9(11): 1780-1789 (2014) - [c49]Lei Xu
, Weidong Shi, Taeweon Suh:
PFC: Privacy Preserving FPGA Cloud - A Case Study of MapReduce. IEEE CLOUD 2014: 280-287 - [c48]Weidong Shi, Yuanfeng Wen, Ziyi Liu, Xi Zhao, Dainis Boumber
, Ricardo Vilalta, Lei Xu
:
Fault resilient physical neural networks on a single chip. CASES 2014: 24:1-24:10 - [c47]Pranav Koundinya, Sandhya Theril, Tao Feng, Varun Prakash, Jiming Bao, Weidong Shi:
Multi resolution touch panel with built-in fingerprint sensing support. DATE 2014: 1-6 - [c46]Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin:
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. DATE 2014: 1-6 - [c45]Lei Xu
, Han-Yee Kim, Xi Wang, Weidong Shi, Taeweon Suh:
Privacy preserving large scale DNA read-mapping in MapReduce framework using FPGAs. FPL 2014: 1-4 - [c44]Lei Xu
, Weidong Shi, Nicholas DeSalvo:
Seasoning effect based side channel attacks to AES implementation with phase change memory. HASP@ISCA 2014: 5:1-5:8 - [c43]Lei Xu
, Weidong Shi:
Removing the Root of Trust: Secure Oblivious Key Establishment for FPGAs. ISVLSI 2014: 160-165 - [c42]Xi Wang, Nicholas DeSalvo, Zhimin Gao, Xi Zhao, Dorothea C. Lerman, Omprakash Gnawali, Weidong Shi:
Eye Contact Conditioning in Autistic Children Using Virtual Reality Technology. MindCare 2014: 79-89 - [c41]Xi Wang, Xi Zhao, Omprakash Gnawali, Weidong Shi:
Enhancing independence for people with low vision to use daily panel-interface machines. MobiCASE 2014: 155-159 - [c40]Xi Wang, Nicholas DeSalvo, Xi Zhao, Tao Feng, Katherine A. Loveland, Weidong Shi, Omprakash Gnawali:
Eye contact reminder system for people with autism. MobiCASE 2014: 160-163 - [c39]Tao Feng, Nicholas DeSalvo, Lei Xu
, Xi Zhao, Xi Wang, Weidong Shi:
Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior. MobiCASE 2014: 206-215 - [c38]Tao Feng, Zhimin Gao, Dainis Boumber
, Tzu-Hua Liu, Nicholas DeSalvo, Xi Zhao, Weidong Shi:
USR: Enabling identity awareness and usable app access control during hand-free mobile interactions. MobiCASE 2014: 225-234 - [c37]Lei Xu
, Pham Dang Khoa, Seung-Hun Kim, Won Woo Ro, Weidong Shi:
LUT based secure cloud computing - An implementation using FPGAs. ReConFig 2014: 1-6 - [c36]Tao Feng, Jun Yang, Zhixian Yan, Emmanuel Munguia Tapia, Weidong Shi:
TIPS: context-aware implicit user identification using touch screen in uncontrolled environments. HotMobile 2014: 9:1-9:6 - [e2]Ruby B. Lee, Weidong Shi:
HASP 2014, Hardware and Architectural Support for Security and Privacy, Minneapolis, MN, USA, June 15, 2014. ACM 2014, ISBN 978-1-4503-2777-0 [contents] - 2013
- [c35]Varun Prakash, Yuanfeng Wen, Weidong Shi:
Tape Cloud: Scalable and Cost Efficient Big Data Infrastructure for Cloud Computing. IEEE CLOUD 2013: 541-548 - [c34]Tao Feng, Xi Zhao, Weidong Shi:
Investigating Mobile Device Picking-up motion as a novel biometric modality. BTAS 2013: 1-6 - [c33]Xi Zhao, Tao Feng, Weidong Shi:
Continuous mobile authentication using a novel Graphic Touch Gesture Feature. BTAS 2013: 1-6 - [c32]Yuanfeng Wen, Jong-Hyuk Lee, Ziyi Liu, Qingji Zheng, Weidong Shi, Shouhuai Xu, Taeweon Suh:
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment. Conf. Computing Frontiers 2013: 25:1-25:10 - [c31]Xi Wang, Weidong Shi, Omprakash Gnawali, Katherine A. Loveland:
Speaker localization and cancellation for improving social attention. ICCPS 2013: 261 - [c30]Ziyi Liu, Jong-Hyuk Lee, Junyuan Zeng, Yuanfeng Wen, Zhiqiang Lin, Weidong Shi:
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM. ISCA 2013: 392-403 - [c29]Varun Prakash, Xi Zhao, Yuanfeng Wen, Weidong Shi:
Back to the Future: Using Magnetic Tapes in Cloud Based Storage Infrastructures. Middleware 2013: 328-347 - [c28]Xi Wang, Xi Zhao, Varun Prakash, Weidong Shi, Omprakash Gnawali:
Computerized-eyewear based face recognition system for improving social lives of prosopagnosics. PervasiveHealth 2013: 77-80 - [c27]Xi Wang, Xi Zhao, Omprakash Gnawali, Katherine A. Loveland, Varun Prakash, Weidong Shi:
A real-time selective speaker cancellation system for relieving social anxiety in autistics. PervasiveHealth 2013: 420-423 - [c26]Tao Feng, Xi Zhao, Bogdan Carbunar, Weidong Shi:
Continuous Mobile Authentication Using Virtual Key Typing Biometrics. TrustCom/ISPA/IUCC 2013: 1547-1552 - [e1]Ruby B. Lee, Weidong Shi:
HASP 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013. ACM 2013, ISBN 978-1-4503-2118-1 [contents] - 2012
- [c25]Jong-Hyuk Lee, Tao Feng, Weidong Shi, Apurva Bedagkar-Gala, Shishir K. Shah, Hanako Yoshida:
Towards Quality Aware Collaborative Video Analytic Cloud. IEEE CLOUD 2012: 147-154 - [c24]Jong-Hyuk Lee, Ziyi Liu, Xiaonan Tian, Dong Hyuk Woo, Weidong Shi, Dainis Boumber
, Yonghong Yan, Kyeong-An Kwon:
Acceleration of bulk memory operations in a heterogeneous multicore architecture. PACT 2012: 423-424 - [c23]Yuanfeng Wen, Ziyi Liu, Weidong Shi, Yifei Jiang, Albert M. K. Cheng, Khoa Le:
Energy efficient hybrid display and predictive models for embedded and mobile systems. CASES 2012: 121-130 - [c22]Weidong Shi, Jong-Hyuk Lee, Taeweon Suh, Dong Hyuk Woo, Xinwen Zhang:
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security. Conf. Computing Frontiers 2012: 75-84 - [c21]Yuanfeng Wen, Ziyi Liu, Weidong Shi, Yifei Jiang, Albert M. K. Cheng, Feng Yang, Abhinav Kohar:
Support for power efficient mobile video playback on simultaneous hybrid display. ESTImedia 2012: 87-96 - [c20]Tao Feng, Ziyi Liu, Bogdan Carbunar, Dainis Boumber
, Weidong Shi:
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display. MICRO Workshops 2012: 55-62 - 2011
- [j6]Weidong Shi, Yang Lu, Zhu Li, Jonathan Engelsma:
SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud. J. Netw. Comput. Appl. 34(4): 1078-1087 (2011) - [j5]Bogdan Carbunar, Weidong Shi, Radu Sion:
Conditional e-payments with transferability. J. Parallel Distributed Comput. 71(1): 16-26 (2011) - [c19]Weidong Shi, Jun Yang, Yifei Jiang, Feng Yang, Yingen Xiong:
SenGuard: Passive user identification on smartphones using multiple sensors. WiMob 2011: 141-148 - 2010
- [j4]Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan:
Query privacy in wireless sensor networks. ACM Trans. Sens. Networks 6(2): 14:1-14:34 (2010) - [c18]Weidong Shi, Yang Lu, Zhu Li, Jonathan Engelsma:
Scalable Support for 3D Graphics Applications in Cloud. IEEE CLOUD 2010: 346-353 - [c17]Weidong Shi, Yang Lu:
Video indexed VM continuous checkpoints: time travel support for virtual 3d graphics applications. NOSSDAV 2010: 45-50
2000 – 2009
- 2007
- [j3]Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee:
Memory-Centric Security Architecture. Trans. High Perform. Embed. Archit. Compil. 1: 95-115 (2007) - [c16]Weidong Shi, Hsien-Hsin S. Lee:
Accelerating memory decryption and authentication with frequent value prediction. Conf. Computing Frontiers 2007: 35-46 - [c15]Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, Venu Vasudevan:
Query privacy in wireless sensor networks. SECON 2007: 203-212 - 2006
- [b1]Weidong Shi:
Architectural Support for Protecting Memory Integrity and Confidentiality. Georgia Institute of Technology, Atlanta, GA, USA, 2006 - [j2]Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S. Lee:
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software. J. Parallel Distributed Comput. 66(9): 1116-1128 (2006) - [c14]Weidong Shi, Hsien-Hsin S. Lee, Richard M. Yoo, Alexandra Boldyreva:
A Digital Rights Enabled Graphics Processing System. Graphics Hardware 2006: 17-26 - [c13]Weidong Shi, Joshua B. Fryman, Guofei Gu, Hsien-Hsin S. Lee, Youtao Zhang, Jun Yang:
InfoShield: a security architecture for protecting information usage in memory. HPCA 2006: 222-231 - [c12]Weidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmoy Ghosh:
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors. ISCA 2006: 102-113 - [c11]Weidong Shi, Hsien-Hsin S. Lee:
Authentication Control Point and Its Implications For Secure Processor Design. MICRO 2006: 103-112 - 2005
- [j1]Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh:
Towards the issues in architectural support for protection of software execution. SIGARCH Comput. Archit. News 33(1): 6-15 (2005) - [c10]Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee:
Memory-Centric Security Architecture. HiPEAC 2005: 153-168 - [c9]Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh:
An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. ICAC 2005: 263-273 - [c8]Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva:
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. ISCA 2005: 14-24 - 2004
- [c7]