Obserwuj
Jianyu Jiang
Jianyu Jiang
Zweryfikowany adres z connect.hku.hk - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Apus: Fast and scalable paxos on rdma
C Wang, J Jiang, X Chen, N Yi, H Cui
Proceedings of the 2017 Symposium on Cloud Computing, 94-107, 2017
882017
Uranus: Simple, efficient sgx programming and its applications
J Jiang, X Chen, TO Li, C Wang, T Shen, S Zhao, H Cui, CL Wang, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
142020
Bidl: A high-throughput, low-latency permissioned blockchain framework for datacenter networks
J Qi, X Chen, Y Jiang, J Jiang, T Shen, S Zhao, S Wang, G Zhang, L Chen, ...
Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021
102021
Efficient and DoS-resistant consensus for permissioned blockchains
X Chen, S Zhao, J Qi, J Jiang, H Song, C Wang, T On Li, TH Hubert Chan, ...
ACM SIGMETRICS Performance Evaluation Review 49 (3), 61-62, 2022
9*2022
Achieving low tail-latency and high scalability for serializable transactions in edge computing
X Chen, H Song, J Jiang, C Ruan, C Li, S Wang, G Zhang, R Cheng, ...
Proceedings of the Sixteenth European Conference on Computer Systems, 210-227, 2021
92021
vPipe: A Virtualized Acceleration System for Achieving Efficient and Scalable Pipeline Parallel DNN Training
S Zhao, F Li, X Chen, X Guan, J Jiang, D Huang, Y Qing, S Wang, P Wang, ...
IEEE Transactions on Parallel and Distributed Systems 33 (3), 489-506, 2021
82021
DAENet: making strong anonymity scale in a fully decentralized network
T Shen, J Jiang, Y Jiang, X Chen, J Qi, S Zhao, F Zhang, X Luo, H Cui
IEEE Transactions on Dependable and Secure Computing 19 (4), 2286-2303, 2021
62021
Kakute: A precise, unified information flow analysis system for big-data security
J Jiang, S Zhao, D Alsayed, Y Wang, H Cui, F Liang, Z Gu
Proceedings of the 33rd Annual Computer Security Applications Conference, 79-90, 2017
52017
On the Challenges of Detecting Side-Channel Attacks in SGX
J Jiang, C Soriente, G Karame
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
2*2022
UPA: An Automated, Accurate and Efficient Differentially Private Big-data Mining System
TO Li, J Jiang, J Qi, CC So, J Ma, X Chen, T Shen, H Cui, Y Wang, ...
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
22020
CRONUS: Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment
J Jiang, J Qi, T Shen, X Chen, S Zhao, S Wang, L Chen, G Zhang, X Luo, ...
2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 124-143, 2022
12022
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge
T Shen, J Qi, J Jiang, X Wang, S Wen, X Chen, S Zhao, S Wang, L Chen, ...
2022 USENIX Annual Technical Conference (USENIX ATC 22), 723-738, 2022
12022
Autonomous detection of cache-based side-channel attacks
J Jiang, G Karame, C Soriente
US Patent App. 16/826,319, 2021
2021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–13