Obserwuj
Lei Zhou
Lei Zhou
SUSTech
Zweryfikowany adres z sustech.edu.cn
Tytuł
Cytowane przez
Cytowane przez
Rok
Cssp: The consortium blockchain model for improving the trustworthiness of network software services
L Zhou, G Wang, T Cui, X Xing
2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017
172017
A simulation platform for ZigBee-UMTS hybrid networks
L Zhou, Y Zhu, A Chen, C Liu
IEEE communications letters 17 (2), 293-296, 2013
92013
KShot: Live kernel patching with SMM and SGX
L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
82020
Nighthawk: Transparent system introspection from ring-3
L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang
European Symposium on Research in Computer Security, 217-238, 2019
72019
A consortium blockchain-based model for data sharing in Internet of Vehicles
Q Wang, L Zhou, Z Tang, G Wang
International Conference on Smart City and Informatization, 253-267, 2019
42019
A cleanroom monitoring system for network computing service based on remote attestation
L Zhou, X Liu, Q Liu, G Wang
2016 IEEE Trustcom/BigDataSE/ISPA, 451-457, 2016
42016
SMILE: Secure Memory Introspection for Live Enclave
L Zhou, X Ding, F Zhang
2022 IEEE Symposium on Security and Privacy (SP), 1536-1536, 2022
32022
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications
L Zhou, F Zhang, G Wang
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
32017
A coprocessor-based introspection framework via intel management engine
L Zhou, F Zhang, J Xiao, K Leach, W Weimer, X Ding, G Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1920-1932, 2021
22021
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks
L Zhou, E Luo, G Wang, S Yu
Information Sciences 554, 15-32, 2021
22021
A software detection mechanism based on smm in network computing
L Zhou, Y Shu, G Wang
International Conference on Security, Privacy and Anonymity in Computation …, 2016
22016
RAitc: Securely Auditing the Remotely Executed Applications
L Zhou, E Luo, G Wang
IEEE Access 8, 163045-163059, 2020
12020
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE
Q Wang, S Cui, L Zhou, O Wu, Y Zhu, G Russello
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
2022
EVCS: An Edge-assisted Virtual Computing and Storage Approach for Heterogeneous Desktop Deployment
M Wu, L Zhou, F Huang
2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2022
2022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–14