上海同济大学计算机学院院长,江建慧

[01]Ying Zhang,Krishnendu Chakrabarty, Zebo Peng, Ahmed Rezine, Huawei Li, Petru Eles, Jianhui Jiang. Software-based self-testing using bounded model checking for out-of-order superscalar processors. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019, Early Access Article (CCF-A)

[02]张颖, 张嘉琦, 王真, 江建慧. 基于有界模型检测的门级软件自测试方法. 同济大学学报(自然科学版), 2018, 46(11): 1576-1581

[03]Yuchang Mo, Liudong Xing,Wenzhong Guo, Shaobin Cai, Zhao Zhang, Jian Hui Jiang. Reliability analysis of IoT networks with community structures. IEEE Transactions on Network Science and Engineering, 2018, Early Access Article

[04]Yuchang Mo, Liudong Xing, Jianhui Jiang. Modeling and analyzing linear wireless sensor networks with backbone support. IEEE Transactions on Systems, Man and Cybernetics: Systems, 2018, Early Access Article

[05]Chunyan Shuai, Xin Ouyang, Jianghui Jiang, Siqi Li. P-CCBFF: A lightweight cooperative detection and trackback framework of DDoS/DoS attacks. Journal of Internet Technology, 2017, 18(5): 1147-1158 (SCIE)

[06]Xiao Chen and Jianhui Jiang. A method of virtual machine placement for fault-tolerant cloud applications. Intelligent Automation andSoft Computing, 2016, 22(4): 587-597 (SCIE)

[07]陈晓, 江建慧*. 动态可配置的两阶段虚拟机容错分配方法. 电子科技大学学报, 2016, 45(3): 442-447

[08]张颖, 江建慧*, 李华伟, 李晓维. 基于信号跳变时间可调整的容错路由器. 同济大学学报(自然科学版), 2015, 43(2): 305-311

[09]陈林博, 江建慧, 张丹青. 用多密钥加密方法防御面向返回编程的攻击. 高技术通讯, 2014, 24(4): 355-364

[10]陈林博, 江建慧, 张丹青. 基于双栈的缓冲区溢出攻击的防御. 同济大学学报(自然科学版), 2012, 40(3): 452-458

[11]周焕盛, 江建慧*. 一个多维信息安全指标体系及等级保护量化模型. 中国科学技术大学学报, 2012, 42(1): 67-76

[12]Jie YIN, Jianhui JIANG, Yu LIU. AC-RMT: A fault-tolerance SMT architecture based on asynchronous checkpoint. Intelligent Automation and Soft Computing, 2011, 17(6): 803-813 (SCIE)

[13]印杰, 江建慧. 冗余多线程结构的重命名寄存器配对共享分配策略. 计算机研究与发展, 2011, 48(3): 516-527

[14]陈林博, 江建慧, 张丹青, 帅春燕. 基于多版本冗余进程的容侵系统. 清华大学学报(自然科学版),2011, 51(S1): 1519-1526

[15]杨洋, 帅春燕, 江建慧. 基于堆栈分析的缓冲区溢出漏洞检测方法. 计算机研究与发展, 2011, 47(S): 291-295

[16]江建慧, 章力源, 金涛, 陈川. 基于k循环随机序列的动态缓冲区溢出防御. 同济大学学报(自然科学版), 2010, 38(6): 917-924

[17]田春岐, 江建慧, 胡治国, 李峰. 一种基于聚集超级节点的P2P网络信任模型. 计算机学报, 2010, 33(2): 345-355

[18]王真, 江建慧, 员春欣. 高性能处理器的差错校正技术. 计算机研究与发展, 2008, 45(2): 358-366

[19]江建慧, 朱为国. 嵌入式存储器的内建自测试和内建自修复. 同济大学学报(自然科学版), 2004, 32(8): 1050-1056

[20]JIANG Jianhui, MIN Yinghua, and PENG Chenglian. Fault-tolerant systems with concurrent error-locating capability. Journal of Computer Science and Technology, 2003, 18(2): 190-200 (SCIE)

[21]江建慧, 闵应骅, 彭澄廉. N为偶数的并发差错可定位N-模冗余结构. 计算机学报, 2002, 25(8): 837-844

[22]江建慧. 交替互补定位器及其用于双模比较冗余结构的差错定位. 计算机研究与发展, 2001, 38(6): 754-764

[23]江建慧, 施鸿宝. 具有故障定位能力的健壮故障安全系统. 电子学报, 2000, 28(8): 35-38

[24]江建慧, 闵应骅, 施鸿宝. 一种扩展故障安全系统理论. 电路与系统学报, 1999, 4(4): 1-9

[25]Zhongshen Chen, Ying Zhang, Zebo Peng, Jianhui Jiang. A deterministic-path routing algorithm for tolerating many faults on wafer-level NoC. The 22nd IEEE/IFIP Design, Automation, and Test in Europe Conference and Exhibition, Florence, Italy, Mar 2019 (CCF-B)

[26]Ying Zhang, Krishnendu Chakrabarty*, Huawei Li, Jianhui Jiang*. Software-based online self-testing of network-on-chip using bounded model checking. Proceedings of 48th IEEEInternational Test Conference, Fort Worth, Texas,USA, Oct 2017 (CCF-B)

[27]Xiao Chen, Jian-Hui Jiang* and Qu Jiang. A method of self-adaptive pre-copy container checkpoint. Proceedings of 21st IEEE Pacific Rim International Symposium on Dependable Computing, Zhangjiajie, China, Nov 2015, pp. 290-300

[28]Ying Zhang, Zebo Peng, Jianhui Jiang*, Huawei Li, Masahiro Fujita. Temperature-aware software-based self-testing for delay faults. Proceedings of 18th IEEE/ACM Design, Automation, and Test in Europe Conference and Exhibition, Grenoble, France, Mar 2015 (CCF-B)

[29]Linbo Chen,Jianhui Jiang* andDanqing Zhang.Code reuse prevention throughcontrol flow lazily check. Proceedings of IEEE 18th Pacific Rim International Symposium on Dependable Computing, Niigata, Japan, Dec 2012, pp. 51-60

[30]Jie Yin and Jianhui Jiang. An asynchronous checkpoint-based redundant multithreading architecture. Proceedings of IEEE 16th Pacific Rim International Symposium on Dependable Computing, Tokyo, Japan, Dec 2010, pp. 243-244

[31]Ying Wu, Jianhui Jiang*, and Liangliang Kong. Sequential frequency vector based system call anomaly detection. Proceedings of IEEE 16th Pacific Rim International Symposium on Dependable Computing, Tokyo, Japan, Dec 2010, pp. 215-222

[32]Jie Yin and Jianhui Jiang*. Design and analysis of an asynchronous checkpoint-based redundant multithreading architecture. Dependable Computing, vol. 25, San Antonio: TSI Press, 2010, pp. 519-524

[33]Ying Wu and Jianhui Jiang*. Frequency weighted Hamming distance for system call anomaly detection. Proceedings of the WRI World Congress on Computer Science and Information Engineering, Los Angeles, California,USA, Mar 2009, pp. 105-109

[34]Jianhui Jiang, Hongbao Shi, Yinghua Min, and Xiaodong Zhao. A novel NMR structure with concurrent output error location capability. Proceedings of Pacific Rim International Symposium on Dependable Computing, Hong Kong, Dec 1999, pp. 32-39[1]

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值