Obserwuj
Hongbo Chen
Hongbo Chen
Zweryfikowany adres z iu.edu
Tytuł
Cytowane przez
Cytowane przez
Rok
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
172022
The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition
TT Kuo, X Jiang, H Tang, XF Wang, A Harmanci, M Kim, K Post, D Bu, ...
Journal of the American Medical Informatics Association 29 (12), 2182-2190, 2022
132022
Practical and efficient in-enclave verification of privacy compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
82021
Trust beyond border: lightweight, verifiable user isolation for protecting in-enclave services
W Wang, W Liu, H Chen, XF Wang, H Tian, D Lin
IEEE transactions on dependable and secure computing 20 (1), 522-538, 2021
62021
Understanding TEE containers, easy to use? Hard to trust
W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang
arXiv preprint arXiv:2109.01923, 2021
62021
HySec-Flow: privacy-preserving genomic computing with SGX-based big-data analytics framework
C Widanage, W Liu, J Li, H Chen, XF Wang, H Tang, J Fox
2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 733-743, 2021
32021
A verified confidential computing as a service framework for privacy preservation
H Chen, HH Chen, M Sun, K Li, Z Chen, XF Wang
32nd USENIX Security Symposium (USENIX Security 23), 4733-4750, 2023
12023
Confidential attestation: Efficient in-enclave verification of privacy policy compliance
W Liu, W Wang, X Wang, X Meng, Y Lu, H Chen, X Wang, Q Shen, ...
arXiv preprint arXiv:2007.10513, 2020
12020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–8