Chuangang Ren
Cited by
Cited by
Constants count: Practical improvements to oblivious {RAM}
L Ren, C Fletcher, A Kwon, E Stefanov, E Shi, M Van Dijk, S Devadas
24th USENIX Security Symposium (USENIX Security 15), 415-430, 2015
Energy storage in datacenters: what, where, and how much?
D Wang, C Ren, A Sivasubramaniam, B Urgaonkar, H Fathy
Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international …, 2012
Carbon-aware energy capacity planning for datacenters
C Ren, D Wang, B Urgaonkar, A Sivasubramaniam
20th IEEE International Symposium on Modeling, Analysis & Simulation of …, 2012
Virtualizing power distribution in datacenters
D Wang, C Ren, A Sivasubramaniam
Proceedings of the 40th Annual International Symposium on Computer …, 2013
Droidmarking: resilient software watermarking for impeding android application repackaging
C Ren, K Chen, P Liu
29th ACM/IEEE international conference on Automated software engineering …, 2014
WindowGuard: Systematic Protection of GUI Security in Android.
C Ren, P Liu, S Zhu
NDSS, 2017
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android
H Huang, K Chen, C Ren, P Liu, S Zhu, D Wu
10th ACM Symposium on Information, Computer and Communications Security …, 2015
ACE: Abstracting, characterizing and exploiting datacenter power demands
D Wang, C Ren, S Govindan, A Sivasubramaniam, B Urgaonkar, ...
2013 IEEE International Symposium on Workload Characterization (IISWC), 44-55, 2013
ACE: abstracting, characterizing and exploiting peaks and valleys in datacenter power consumption
D Wang, C Ren, S Govindan, A Sivasubramaniam, B Urgaonkar, ...
ACM SIGMETRICS Performance Evaluation Review 41 (1), 333-334, 2013
Sidewinder Targeted Attack against Android in The Golden Age of Ad Libraries
T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song
Blackhat USA 2014, 2014
A Study of Selected Issues in Android Security
C Ren
The system can't perform the operation now. Try again later.
Articles 1–11