Xiali (Sharon) Hei
Titre
Citée par
Citée par
Année
Defending resource depletion attacks on implantable medical devices
X Hei, X Du, J Wu, F Hu
2010 IEEE global telecommunications conference GLOBECOM 2010, 1-5, 2010
1012010
Biometric-based two-level secure access control for implantable medical devices during emergencies
X Hei, X Du
2011 Proceedings IEEE INFOCOM, 346-350, 2011
962011
PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system
X Hei, X Du, S Lin, I Lee
2013 Proceedings IEEE INFOCOM, 3030-3038, 2013
782013
Patient infusion pattern based access control schemes for wireless insulin pump system
X Hei, X Du, S Lin, I Lee, O Sokolsky
IEEE Transactions on parallel and Distributed Systems 26 (11), 3108-3121, 2014
322014
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
Y Tu, Z Lin, I Lee, X Hei
USENIX SECURIYT Symp., 2018
222018
A decomposition-based chemical reaction optimization for multi-objective vehicle routing problem for simultaneous delivery and pickup with time windows
H Li, L Wang, X Hei, W Li, Q Jiang
Memetic Computing 10 (1), 103-120, 2018
192018
木马的植入与隐藏技术分析
蔺聪, 黑霞丽
信息安全与通信保密, 53-55, 2008
152008
Two vulnerabilities in Android OS kernel
X Hei, X Du, S Lin
2013 IEEE International Conference on Communications (ICC), 6123-6127, 2013
132013
Security for wireless implantable medical devices
X Hei, X Du
Springer, 2013
132013
Energy-aware real-time scheduling on Heterogeneous Multi-Processor
G Wang, W Li, X Hei
2015 49th Annual Conference on Information Sciences and Systems (CISS), 1-7, 2015
122015
Poster: Near field communication based access control for wireless medical devices
X Hei, X Du, S Lin
Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014
112014
Two matrices for Blakley's secret sharing scheme
X Hei, X Du, B Song
2012 IEEE International Conference on Communications (ICC), 810-814, 2012
102012
Hybrid multicast scheme for many-to-many videoconferencing
X Zhang, C Li, X Li
2008 Fourth International Conference on Networked Computing and Advanced …, 2008
62008
Analysis on Embedding and Hiding Technologies of Trojan Horse [J]
C LIN, X HEI
Information Security and Communications Privacy 7, 2008
62008
移动电子商务安全问题研究
倪永健, 黑霞丽
科技情报开发与经济 17 (14), 228-229, 2007
52007
Trick or heat? Manipulating critical temperature-based control systems using rectification attacks
Y Tu, S Rampazzi, B Hao, A Rodriguez, K Fu, X Hei
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
42019
Enabling Fair Spectrum Sharing between Wi-Fi and LTE-Unlicensed
K Chi, L Wu, X Du, G Yin, J Wu, B Ji, X Hei
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
42018
Double outlyingness analysis in quantitative spectral calibration: Implicit detection and intuitive categorization of outliers
H Cao, Y Yu, Y Zhou, X Hei
Chemometrics and Intelligent Laboratory Systems 166, 23-36, 2017
42017
基于动态口令的电子商务身份认证技术
蔺聪, 黑霞丽
计算机安全, 58-60, 2008
42008
移动电子商务的发展及其关键技术研究
黑霞丽
科技情报开发与经济 17 (1), 191-192, 2007
42007
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20