Works (9)

Updated: July 5th, 2023 15:38

2020 journal article

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains

SECURITY AND COMMUNICATION NETWORKS, 2020.

By: H. Huang*, Q. Huang*, F. Xiao*, W. Wang*, Q. Li* & T. Dai n

TL;DR: A scalable broadcast authentication scheme named DH-μTESLA is presented, which is an extension and improvement of μTESLA and Multilevel μTESLA to achieve several vital properties, such as infinite lifecycle of hash chains, security authentication, scalability, and strong tolerance of message loss. (via Semantic Scholar)
Source: Web Of Science
Added: October 12, 2020

2019 article

A Study on Container Vulnerability Exploit Detection

2019 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), pp. 121–127.

By: O. Tunde-Onadele n, J. He n, T. Dai n & X. Gu n

author keywords: Container Security; Anomaly Detection; Machine Learning
TL;DR: This paper implements and evaluates a set of static and dynamic vulnerability attack detection schemes using 28 real world vulnerability exploits that widely exist in docker images and shows that the static vulnerability scanning scheme only detects 3 out of 28 tested vulnerabilities and dynamic anomaly detection schemes detect 22 vulnerability exploits. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: January 6, 2020

2019 article

FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric

2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), pp. 543–555.

By: H. Kang, T. Dai n, N. Jean-Louis, S. Tao & X. Gu n

author keywords: Blockchain; privacy; auditability; zero-knowledge proofs
TL;DR: FabZK conceals transaction details on a shared ledger by storing only encrypted data from each transaction, and by anonymizing the transactional relationship between members in a Blockchain network. (via Semantic Scholar)
Source: Web Of Science
Added: September 28, 2020

2019 journal article

Hytrace: A Hybrid Approach to Performance Bug Diagnosis in Production Cloud Infrastructures

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 30(1), 107–118.

By: T. Dai n, D. Dean*, P. Wang n, X. Gu n & S. Lu*

author keywords: Static analysis; dynamic analysis; reliability; availability; and serviceability; debugging aids; performance
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: January 7, 2019

2019 article

TFix: Automatic Timeout Bug Fixing in Production Server Systems

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), pp. 612–623.

By: J. He n, T. Dai n & X. Gu n

TL;DR: TFix is presented, an automatic timeout bug fixing system for correcting misused timeout bugs in production systems that adopts a drill-down bug analysis protocol that can narrow down the root cause of a misusedtimeout bug and producing recommendations for correcting theRoot cause. (via Semantic Scholar)
Source: Web Of Science
Added: September 21, 2020

2018 article

DScope: Detecting Real-World Data Corruption Hang Bugs in Cloud Server Systems

PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '18), pp. 313–325.

By: T. Dai n, J. He n, X. Gu n, S. Lu* & P. Wang n

author keywords: static analysis; data corruption; performance bug detection
TL;DR: DScope, a tool that statically detects data-corruption related software hang bugs in cloud server systems, and identifies loops whose exit conditions can be affected by I/O operations through returned data, returned error code, orI/O exception handling. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: March 4, 2019

2018 article

TScope: Automatic Timeout Bug Identification for Server Systems

15TH IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC 2018), pp. 1–10.

By: J. He*, T. Dai* & X. Gu*

TL;DR: TScope leverages kernel-level system call tracing and machine learning based anomaly detection and feature extraction schemes to achieve timeout bug identification and introduces a unique system call selection scheme to achieve higher accuracy than existing generic performance bug detection tools. (via Semantic Scholar)
Source: Web Of Science
Added: December 3, 2018

2017 article

Hytrace: A Hybrid Approach to Performance Bug Diagnosis in Production Cloud Infrastructures

PROCEEDINGS OF THE 2017 SYMPOSIUM ON CLOUD COMPUTING (SOCC '17), pp. 641–641.

By: T. Dai n, D. Dean*, P. Wang n, X. Gu n & S. Lu*

author keywords: Hybrid analysis; performance bug diagnosis
TL;DR: Hytrace combines rule-based static analysis and runtime inference techniques to achieve higher bug localization accuracy than pure-static and pure-dynamic approaches for performance bugs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

An Improved mu TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs

JOURNAL OF SENSORS, 2016.

By: H. Huang*, T. Gong*, T. Chen*, M. Xiong*, X. Pan* & T. Dai n

TL;DR: A self-renewal hash chain based on Benaloh-Leichter secret sharing scheme (SRHC-BL SSS) is designed, which can prolong the lifetime of network and improve the traditional μTESLA by determining the publication of broadcast key based on the network data flow rather than the fixed time interval. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.