I2C Home »




  • Lei Xu(external link), Pham Dang Khoa, Seung-Hun Kim, Won Woo Ro(external link), Weidong Shi.
    • Another Look at Secure Big Data Processing: Formal Framework and a Potential Approach.
    • 8th IEEE International Conference on Cloud Computing, CLOUD 2015: 548-555. New York City, NY, USA, June 27 - July 2, 2015.
  • Xi Zhao, Zhimin Gao, Jianhua Zou, Weidong Shi, Wei Huang.
    • Scalable 3D Facial Shape Motion Retrieval from Image Sequences Using a Map-Reduce Framework.
    • 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015: 252-255. Beijing, China, April 20-22, 2015.
  • Lei Xu(external link), Xinwen Zhang(external link), Xiaoxin Wu, Weidong Shi.
    • ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
    • Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015: 167-169. San Antonio, TX, USA, March 2-4, 2015.
  • Seung-Hun Kim, Lei Xu(external link), Ziyi Liu, Zhiqiang Lin(external link), Won Woo Ro(external link), Weidong Shi.
    • Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
    • 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015: 251-262. Rio de Janeiro, Brazil, June 22-25, 2015.
  • Zhimin Gao, Nicholas DeSalvo, Pham Dang Khoa, Seung-Hun Kim, Lei Xu(external link), Won Woo Ro(external link), Rakesh M. Verma(external link), Weidong Shi.
    • Integrity Protection for Big Data Processing with Dynamic Redundancy Computation.
    • 2015 IEEE International Conference on Autonomic Computing, ICAC 2015: 159-160. Grenoble, France, July 7-10, 2015.
  • Ruby B. Lee(external link), Weidong Shi, Jakub Szefer(external link).
    • Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy.
    • HASP@ISCA 2015, Portland, OR, USA, June 14, 2015. ACM 2015, ISBN.


  • Lei Xu, Hanyee Kim, Weidong Shi, Taeweon Suh(external link) and Xi Wang.
    • Privacy Preserving Large Scale DNA Read-mapping in MapReduce Framework using FPGA. Short Pager
    • 24th International Conference on Field Programmable Logic and Applications
  • Xi Wang, Nicholas DeSalvo, Zhimin Gao, Xi Zhao, Dorothea C. Lerman(external link), Omprakash Gnawali(external link), Weidong Shi.
    • Eye Contact Conditioning in Autistic Children Using Virtual Reality Technology.
    • 4th International Symposium on Pervasive Computing Paradigms for Mental Health.
  • Lei Xu(external link), Weidong Shi, Nicholas Desalvo
    • Seasoning Effect Based Side Channel Attacks to AES Implementation with Phase Change Memory
    • The 3rd Workshop on Hardware and Architectural Support for Security and Privacy. In conjunction with ISCA 2014.
  • Pranav Koundinya,Sandhya Theril,Tao Feng, Varun Prakash, Xi Zhao and Weidong Shi.
    • Touch-Fingerprint Display for Supporting Identity Sensing. Poster
    • 2014 SID International Symposium. San Diego, California.
  • Lei Xu(external link), and Weidong Shi.
    • Removing the Root of Trust: Secure Oblivious Key Establishment for FPGAs. Poster
    • IEEE Computer Society Annual Symposium on VLSI.
  • Lei Xu(external link), Weidong Shi, and Taeweon Suh(external link).
    • Privacy Preserving FPGA Cloud: the Case of MapReduce. Research Track
    • The Seventh International Conference on Cloud Computing. 2014.
  • Pranav Koundinya, Sandhya Theril, Tao Feng, Varun Prakash, Jiming Bao(external link), and Weidong Shi.
    • Multi Resolution Touch Panel with Built-in Fingerprint Sensing Support.
    • The 14th Design, Automation and Test in Europe, Dresden, Germany, 2014.
  • Ziyi Liu, Weidong Shi, Shouhuai Xu(external link), Zhiqiang Lin(external link).
    • Programmable Decoder and Shadow Threads: Tolerate Remote Code Injection Exploits with Diversified Redundancy.
    • Proceedings of the 14th Design, Automation and Test in Europe (DATE), Dresden, Germany, 2014.
  • Tao Feng, Jun Yang(external link), Zhixian Yan, Emmanuel Munguia Tapia, and Weidong Shi.
    • TIPS: Context-Aware Implicit User Identification using Touch Screen in Uncontrolled Environments.
    • The Fifteenth Workshop on Mobile Computing Systems and Applications (ACM HotMobile), 2014, Santa Barbara, CA.









Larry's Publications Before 2010











  • Weidong Shi(external link), Hsien-Hsin S. Lee(external link), Mrinmoy Ghosh(external link), Chenghuai Lu
    • Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems.
    • IEEE PACT 2004: 123-134
  • Weidong Shi(external link), Hsien-Hsin S. Lee(external link), Chenghuai Lu, Tao Zhang(external link)
    • Attacks and risk analysis for hardware supported software copy protection systems.
    • Digital Rights Management Workshop 2004: 54-62
  • Tao Zhang(external link), Weidong Shi(external link), Santosh Pande(external link)
    • Static Techniques to Improve Power Efficiency of Branch Predictors.
    • HiPC 2004: 274-285
  • Mrinmoy Ghosh(external link), Weidong Shi(external link), Hsien-Hsin S. Lee(external link)
    • CoolPression - a hybrid significance compression technique for reducing energy in caches.
    • IEEE SoCC 2004: 399-402
  • Larry Shi(external link), Weiyun Huang
    • Apply Social Network Analysis and Data Mining to Dynamic Task Synthesis for Persistent MMORPG Virtual World.
    • ICEC 2004: 204-215





Created by admin. Last Modification: Saturday 23 of September, 2017 18:03:33 UTC by larryshi. (Version 145)