Cssp: The consortium blockchain model for improving the trustworthiness of network software services L Zhou, G Wang, T Cui, X Xing 2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017 | 20 | 2017 |
KShot: Live kernel patching with SMM and SGX L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 17 | 2020 |
Nighthawk: Transparent system introspection from ring-3 L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 13 | 2019 |
A coprocessor-based introspection framework via intel management engine L Zhou, F Zhang, J Xiao, K Leach, W Weimer, X Ding, G Wang IEEE Transactions on Dependable and Secure Computing 18 (4), 1920-1932, 2021 | 11 | 2021 |
A simulation platform for ZigBee-UMTS hybrid networks L Zhou, Y Zhu, A Chen, C Liu IEEE communications letters 17 (2), 293-296, 2013 | 10 | 2013 |
Smile: Secure memory introspection for live enclave L Zhou, X Ding, F Zhang 2022 IEEE Symposium on Security and Privacy (SP), 386-401, 2022 | 7 | 2022 |
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks L Zhou, E Luo, G Wang, S Yu Information Sciences 554, 15-32, 2021 | 7 | 2021 |
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications L Zhou, F Zhang, G Wang 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017 | 5 | 2017 |
A cleanroom monitoring system for network computing service based on remote attestation L Zhou, X Liu, Q Liu, G Wang 2016 IEEE Trustcom/BigDataSE/ISPA, 451-457, 2016 | 5 | 2016 |
RAitc: Securely auditing the remotely executed applications L Zhou, E Luo, G Wang IEEE Access 8, 163045-163059, 2020 | 4 | 2020 |
A consortium blockchain-based model for data sharing in Internet of Vehicles Q Wang, L Zhou, Z Tang, G Wang Smart City and Informatization: 7th International Conference, iSCI 2019 …, 2019 | 4 | 2019 |
Enclavetree: Privacy-preserving data stream training and inference using tee Q Wang, S Cui, L Zhou, O Wu, Y Zhu, G Russello Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 2 | 2022 |
EVCS: An edge-assisted virtual computing and storage approach for heterogeneous desktop deployment M Wu, L Zhou, F Huang 2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2022 | 2 | 2022 |
A software detection mechanism based on smm in network computing L Zhou, Y Shu, G Wang Security, Privacy and Anonymity in Computation, Communication and Storage …, 2016 | 2 | 2016 |
Armor: Protecting Software Against Hardware Tracing Techniques T Yue, F Zhang, Z Ning, P Wang, X Zhou, K Lu, L Zhou IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE Q Wang, L Zhou, J Bai, YS Koh, S Cui, G Russello Computers & Security 135, 103509, 2023 | | 2023 |
A Survey of the Security Analysis of Embedded Devices X Zhou, P Wang, L Zhou, P Xun, K Lu Sensors 23 (22), 9221, 2023 | | 2023 |
Hardware-assisted Live Kernel Function Updating on Intel Platforms L Zhou, F Zhang, K Leach, X Ding, Z Ning, G Wang, J Xiao IEEE Transactions on Dependable and Secure Computing, 2023 | | 2023 |
ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting Tai Yue , Pengfei Wang , Lei Zhou , Xu Zhou , Gen Zhang , Kai Lu, Huijun Wu Proceedings of the 2023 2nd International Conference on Networks …, 2023 | | 2023 |
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference Q Wang, S Cui, L Zhou, Y Dong, J Bai, YS Koh, G Russello arXiv preprint arXiv:2305.00645, 2023 | | 2023 |