Obserwuj
Zhongshu Gu
Zhongshu Gu
IBM Research
Zweryfikowany adres z us.ibm.com - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
2492018
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
1222016
Containerleaks: Emerging security threats of information leakages in container clouds
X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
1082017
Process implanting: A new active introspection framework for virtualization
Z Gu, Z Deng, D Xu, X Jiang
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 147-156, 2011
842011
Verifiable Deep Learning Training Service
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent App. 16/124,657, 2020
812020
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
782018
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 2018
53*2018
GUITAR: Piecing together android app GUIs from memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
532015
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
Z Gu, K Pei, Q Wang, L Si, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP …, 2015
492015
Vcr: App-agnostic recovery of photographic evidence from android device memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
412015
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
B Saltaformaggio, Z Gu, X Zhang, D Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 255-269, 2014
382014
Security namespace: making linux security frameworks available to containers
Y Sun, D Safford, M Zohar, D Pendarakis, Z Gu, T Jaeger
27th USENIX Security Symposium (USENIX Security 18), 1423-1439, 2018
362018
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
Z Gu, B Saltaformaggio, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP …, 2014
222014
Houdini's escape: Breaking the resource rein of linux control groups
X Gao, Z Gu, Z Li, H Jamjoom, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
212019
A study on the security implications of information leakages in container clouds
X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 174-191, 2018
192018
Reaching data confidentiality and model accountability on the caltrain
Z Gu, H Jamjoom, D Su, H Huang, J Zhang, T Ma, D Pendarakis, I Molloy
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
92019
Confidential Inference via Ternary Model Partitioning
Z Gu, H Huang, J Zhang, D Su, H Jamjoom, A Lamba, D Pendarakis, ...
arXiv preprint arXiv:1807.00969, arXiv: 1807.00969, 2018
92018
Fuzzy Cyber Detection Pattern Matching
X Shu, Z Gu, MP Stoecklin, HT Jamjoom
US Patent App. 16/783,274, 2021
62021
Domain-aware device protection via cross-validation among spatially-adjacent devices
Z Gu, H Huang, D Pendarakis
US Patent 9,854,445, 2017
62017
Privacy implications of DNSSEC look-aside validation
A Mohaisen, Z Gu, K Ren
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
62017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20