Zhi Wang

ORCID: 0009-0009-2484-0796
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Computational Techniques and Applications
  • Image and Video Quality Assessment
  • Recommender Systems and Techniques
  • Cloud Data Security Solutions
  • Security and Verification in Computing
  • Video Analysis and Summarization
  • Advanced Malware Detection Techniques
  • Software Engineering Techniques and Practices
  • Cloud Computing and Resource Management
  • Educational Technology and Assessment
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Software Engineering Research
  • Internet Traffic Analysis and Secure E-voting
  • Complex Network Analysis Techniques
  • Cryptography and Data Security
  • Service-Oriented Architecture and Web Services
  • Privacy-Preserving Technologies in Data
  • Software Testing and Debugging Techniques
  • Real-Time Systems Scheduling
  • Cryptographic Implementations and Security
  • Engineering and Information Technology
  • Wireless Networks and Protocols
  • Safety Warnings and Signage
  • Distributed and Parallel Computing Systems

Nanjing University
2023

Emissions Reduction Alberta
2023

Florida State University
2014-2021

Tsinghua–Berkeley Shenzhen Institute
2020

University Town of Shenzhen
2014-2018

Tsinghua University
2012-2018

Northeastern University
2016-2018

Shandong University
2011-2013

Zhejiang University
2011

State Key Laboratory of Industrial Control Technology
2011

With the proliferation of social media, which is largely fostered by boom Internet and mobile ecosystems, a huge amount multimedia data has been generated, forming big data. However, because unstructured multimodal in nature, with real-time Quality ExperieInternetnce requirements, computing not only created unprecedented opportunities but also imposed fundamental challenges storage, processing, analysis. Here, authors introduce principal concepts for computing, discuss what scientific...

10.1109/mmul.2015.66 article EN IEEE Multimedia 2015-07-01

Protecting kernel control data (e.g., function pointers and return addresses) has been a serious issue plaguing rootkit defenders. In particular, authors only need to compromise one piece of launch their attacks, while defenders protect thousands such values widely scattered across memory space. Worse, some this is volatile can be dynamically generated at run time. Existing solutions, however, offer either incomplete protection or excessive performance overhead. To overcome these...

10.1109/tifs.2011.2159712 article EN IEEE Transactions on Information Forensics and Security 2011-06-21

App repackaging remains a serious threat to the emerging mobile app ecosystem. Previous solutions have mostly focused on postmortem detection of repackaged apps by measuring similarity among apps. In this paper, we propose DIVILAR, virtualization-based protection scheme enable self-defense Android against repackaging. Specifically, it re-encodes an in diversified virtual instruction set and uses specialized execute engine for these instructions run protected app. However, extra layer...

10.1145/2557547.2557558 article EN 2014-02-25

Online video sharing and social networking are cross-pollinating rapidly in today's Internet: network users more media contents among each other, while online sites leveraging connections to promote their videos. An intriguing development as it is, the operational challenge previous systems persists, em i.e., large server cost demanded for scaling of systems. Peer-to-peer could be a rescue, only if viewers' mutual resource contribution has been fully incentivized efficiently scheduled....

10.1109/tnsm.2012.12.120244 article EN IEEE Transactions on Network and Service Management 2012-10-01

Dynamic analysis based on the full-system emulator QEMU is widely used for various purposes.However, it challenging to run firmware images of embedded devices in QEMU, especially process boot Linux kernel (we call this rehosting paper). That's because usually use different system-on-chips (SoCs) from multiple vendors and only a limited number SoCs are currently supported QEMU.

10.1145/3460120.3484753 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

As a fundamental component of software documentation, code comments could help developers comprehend and maintain programs. Several datasets method header have been proposed in previous studies for machine learning-based comment generation. part comments, inline are also crucial understanding activities. However, unlike written standard format describing the whole code, often arbitrary formats by due to timelines pressures different aspects snippets described. Currently, there is no...

10.1142/s0218194023500547 article EN International Journal of Software Engineering and Knowledge Engineering 2023-09-06

Cyber-Physical Networked Systems (CPNS) are systems that integrate a multitude of nodes perform computations for the sake interacting with, or controlling, physical process. The network plays an important role in CPNS supporting interactions among distributed enable collaborative work towards application goals. Some systems, e.g., target tracking require reconciling properties strongly influenced by opposing directions. For example, it is to maintain low energy consumption prolong lifetime...

10.1109/infcomw.2011.5928913 article EN 2011-04-01

Recently, data-driven prediction strategies have shown the potential of shepherding optimization for end viewer's Quality-of-Experience in practical streaming applications. The current prediction-based designs largely focused on optimizing last-mile, i.e., viewer-side, which 1) need real-time feedback from viewers to improve accuracy; and 2) quick responses guarantee effectiveness future. Thanks emerged crowdsourced livecast services, e.g., Twitch.tv, we first time exploit opportunity...

10.1109/infocom41043.2020.9155395 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

Virtual machine(VM) scheduling algorithms optimize the energy consumption without performance degradation, where cloud providers profited greatly. However, not any performs same. To evaluate power efficiency of such algorithms, various scale clusters have to be maintained, which is costly and difficult. In this paper, we present a emulation software CloudEval evalute migration VMs. Comparing previous simulation environment, addresses evaluation dynamic VMs in cloud, by simpler non-intrusive...

10.5555/3021426.3021433 article EN Simulation Tools and Techniques for Communications, Networks and System 2016-08-22

Glass published the first report on assessment of systems and software engineering scholars institutions two decades ago. The ongoing, annual survey publications in this field provides fund managers, young scholars, graduate students, etc. with useful information for different purposes. However, studies have been questioned by some critics because a few shortcomings evaluation method. It is actually very hard to reach widely recognized consensus such an institutions. This paper presents...

10.48550/arxiv.1407.4903 preprint EN other-oa arXiv (Cornell University) 2014-01-01

Mobile devices adopt probe requests to discover nearby Wi- Fi access points (APs) and set up fast Wi-Fi connections. Preferred Network Lists (PNLs) are used store the lists of connected APs in past. Previous studies have shown that such mechanism can lead serious privacy leakage, for example, attackers infer users' identity information movement histories. In this paper, we investigate issue propose a data-driven protection strategy. First, conduct extensive measurement based on 27 million...

10.1109/icc.2018.8422764 article EN 2018-05-01
Coming Soon ...