Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
- Wenhao Wang, Guoxing Chen, +5 authors Carl A. Gunter
- Computer Science, Medicine
- CCS
- 20 May 2017
TLDR
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
- M. Liu, Jingchun Yang, Wenhao Wang, D. Lin
- Computer Science
- IACR Cryptol. ePrint Arch.
- 29 April 2018
TLDR
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks
- Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, S. Hao
- Computer Science
- ESORICS
- 3 September 2018
TLDR
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
- Guoxing Chen, Wenhao Wang, +5 authors D. Lin
- Computer Science
- IEEE Symposium on Security and Privacy (SP)
- 1 May 2018
TLDR
Wireless Physical-Layer Identification: Modeling and Validation
- Wenhao Wang, Zhi Sun, Sixu Piao, Bocheng Zhu, K. Ren
- Computer Science, Mathematics
- IEEE Transactions on Information Forensics and…
- 28 October 2015
TLDR
VisDrone-SOT2018: The Vision Meets Drone Single-Object Tracking Challenge Results
- Longyin Wen, Pengfei Zhu, +70 authors Zhiqun He
- Computer Science
- ECCV Workshops
- 8 September 2018
TLDR
Searching cubes for testing Boolean functions and its application to Trivium
- M. Liu, D. Lin, Wenhao Wang
- Mathematics, Computer Science
- IEEE International Symposium on Information…
- 14 June 2015
TLDR
Fire detection based on flame color and area
- Wenhao Wang, H. Zhou
- Computer Science
- IEEE International Conference on Computer Science…
- 25 May 2012
TLDR
Activity coefficients of individual ions in aqueous solutions of sodium halides at 298.15 K
- K. Zhuo, Weiyan Dong, Wenhao Wang, J. Wang
- Chemistry
- 25 December 2008
Abstract A method for measuring individual ionic activity coefficients is proposed and used to obtain activity coefficients of the individual ions in aqueous solutions of NaF (about 0.02–0.99 mol… Expand
An Anomaly Detection Model Based on Cloud Model and Danger Theory
- Wenhao Wang, C. Zhang, Q. Zhang
- Computer Science
- ISCTCS
- 29 November 2013
TLDR