default search action
Shijie Jia 0001
Person information
- unicode name: 贾世杰
- affiliation: Chinese Acadamy of Sciences, Institute of Information Engineering (IIE-CAS), State Key Laboratory of Information Security, Beijing, China
- affiliation (PhD 2017): University of Chinese Acadamy of Sciences (UCAS), School of Cyber Security, Beijing, China
Other persons with the same name
- Shijie Jia — disambiguation page
- Shijie Jia 0002 — Luoyang Normal University, Central Plains Economic Zone Wisdom Tourism Cooperative Innovation Center, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Xi Luo, Honghui Fan, Lihua Yin, Shijie Jia, Kaiyan Zhao, Hongyu Yang:
CAG-Malconv: A Byte-Level Malware Detection Method With CBAM and Attention-GRU. IEEE Trans. Netw. Serv. Manag. 21(5): 5859-5872 (2024) - [c29]Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jiaju Bai, Shijie Jia, Qianhong Wu:
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem. CCS 2024: 2978-2992 - [c28]Mingyu Wang, Lingjia Meng, Fangyu Zheng, Jingqiang Lin, Shijie Jia, Yuan Ma, Haoling Fan:
TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer. ICC 2024: 109-114 - [c27]Mingyu Wang, Shijie Jia, Fangyu Zheng, Yuan Ma, Jingqiang Lin, Lingjia Meng, Ziqiang Ma:
TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer. WCNC 2024: 1-6 - 2023
- [j3]Tianyu Chen, Shijie Jia, Yuan Ma, Yuan Cao, Na Lv, Wei Wang, Jing Yang, Jingqiang Lin:
A Design of High-Efficiency Coherent Sampling Based TRNG With On-Chip Entropy Assurance. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5060-5073 (2023) - [c26]Biao Gao, Shijie Jia, Jiankuo Dong, Peixin Ren:
XPORAM: A Practical Multi-client ORAM Against Malicious Adversaries. Inscrypt (1) 2023: 397-417 - [c25]Biao Gao, Shijie Jia, Peng Yin, Xueying Zhang:
Protection of Access Pattern. CSAI 2023: 99-105 - [c24]Bowen Xu, Shijie Jia, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song:
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. ESORICS (3) 2023: 263-282 - [c23]Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han, Shijie Jia:
Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test. ICISC (2) 2023: 95-112 - [c22]Haoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma:
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software. TrustCom 2023: 796-803 - 2022
- [j2]Shijie Jia, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu:
MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer. IEEE Trans. Dependable Secur. Comput. 19(5): 3494-3507 (2022) - [c21]Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin:
CryptoGo: Automatic Detection of Go Cryptographic API Misuses. ACSAC 2022: 318-331 - [c20]Mingshu Du, Yuan Ma, Na Lv, Tianyu Chen, Shijie Jia, Fangyu Zheng:
An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator. ICC 2022: 559-564 - [c19]Li Song, Qiongxiao Wang, Shijie Jia, Jingqiang Lin, Linli Lu, Yanduo Fu:
You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. TrustCom 2022: 266-273 - [c18]Li Song, Qiongxiao Wang, Jingqiang Lin, Shijie Jia, Yingjiu Li, Yikai Chen:
Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. WCNC 2022: 1010-1015 - 2021
- [c17]Jingyi Liu, Yanyan Zhao, Limin Liu, Shijie Jia:
Exploring Sequential and Collaborative Contexts for Next Point-of-Interest Recommendation. KSEM 2021: 639-655 - [c16]Xi Fang, Limin Liu, Shijie Jia, Xinyi Zhao, Yang Zhang:
P-Shake: Towards Secure Authentication and Communication between Mobile Devices. WCNC 2021: 1-7 - 2020
- [c15]Yang Zhang, Dongzheng Jia, Shijie Jia, Limin Liu, Jingqiang Lin:
Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly. ICCCN 2020: 1-11 - [c14]Jiawei Wan, Shijie Jia, Limin Liu, Yang Zhang:
Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data. IPCCC 2020: 1-12 - [c13]Dongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin:
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation. ISCC 2020: 1-7 - [c12]Yingjiao Niu, Lingguang Lei, Yuewu Wang, Jiang Chang, Shijie Jia, Chunjing Kou:
SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions. MSN 2020: 387-394
2010 – 2019
- 2019
- [c11]Biao Gao, Bo Chen, Shijie Jia, Luning Xia:
eHIFS: An Efficient History Independent File System. AsiaCCS 2019: 573-585 - [c10]Peiying Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu:
MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. CODASPY 2019: 327-338 - [c9]Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin:
VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts. IPCCC 2019: 1-9 - 2018
- [j1]Qionglu Zhang, Shijie Jia, Bing Chang, Bo Chen:
Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey. Cybersecur. 1(1): 1 (2018) - 2017
- [c8]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c7]Shijie Jia, Luning Xia, Bo Chen, Peng Liu:
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer. CCS 2017: 2217-2229 - 2016
- [c6]Bo Chen, Shijie Jia, Luning Xia, Peng Liu:
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. ACSAC 2016: 496-507 - [c5]Shijie Jia, Luning Xia, Bo Chen, Peng Liu:
NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. AsiaCCS 2016: 305-315 - [c4]Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji:
Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting. ISPEC 2016: 284-299 - [c3]Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji:
Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. Trustcom/BigDataSE/ISPA 2016: 292-300 - 2015
- [c2]Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia:
Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. ICICS 2015: 346-355 - [c1]Shijie Jia, Luning Xia, Zhan Wang, Jingqiang Lin, Guozhu Zhang, Yafei Ji:
Extracting Robust Keys from NAND Flash Physical Unclonable Functions. ISC 2015: 437-454
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint