Hongbo Chen
Hongbo Chen
Zweryfikowany adres z iu.edu
Cytowane przez
Cytowane przez
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
Understanding TEE Containers, Easy to Use? Hard to Trust
W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang
arXiv preprint arXiv:2109.01923, 2021
Practical and Efficient in-Enclave Verification of Privacy Compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition
TT Kuo, X Jiang, H Tang, XF Wang, A Harmanci, M Kim, K Post, D Bu, ...
Journal of the American Medical Informatics Association 29 (12), 2182-2190, 2022
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework
C Widanage, W Liu, J Li, H Chen, XF Wang, H Tang, J Fox
2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 733-743, 2021
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance
W Liu, W Wang, X Wang, X Meng, Y Lu, H Chen, X Wang, Q Shen, ...
arXiv preprint arXiv:2007.10513, 2020
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services
W Wang, W Liu, H Chen, X Wang, H Tian, D Lin
IEEE Transactions on Dependable and Secure Computing, 2021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–7