关注
Lei Zhou
Lei Zhou
SUSTech
在 sustech.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cssp: The consortium blockchain model for improving the trustworthiness of network software services
L Zhou, G Wang, T Cui, X Xing
2017 IEEE International Symposium on Parallel and Distributed Processing …, 2017
212017
KShot: Live kernel patching with SMM and SGX
L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
202020
Nighthawk: Transparent system introspection from ring-3
L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
172019
A coprocessor-based introspection framework via intel management engine
L Zhou, F Zhang, J Xiao, K Leach, W Weimer, X Ding, G Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1920-1932, 2021
112021
A simulation platform for ZigBee-UMTS hybrid networks
L Zhou, Y Zhu, A Chen, C Liu
IEEE communications letters 17 (2), 293-296, 2013
102013
Smile: Secure memory introspection for live enclave
L Zhou, X Ding, F Zhang
2022 IEEE Symposium on Security and Privacy (SP), 386-401, 2022
82022
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks
L Zhou, E Luo, G Wang, S Yu
Information Sciences 554, 15-32, 2021
82021
A consortium blockchain-based model for data sharing in Internet of Vehicles
Q Wang, L Zhou, Z Tang, G Wang
Smart City and Informatization: 7th International Conference, iSCI 2019 …, 2019
62019
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications
L Zhou, F Zhang, G Wang
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
52017
A cleanroom monitoring system for network computing service based on remote attestation
L Zhou, X Liu, Q Liu, G Wang
2016 IEEE Trustcom/BigDataSE/ISPA, 451-457, 2016
52016
Enclavetree: Privacy-preserving data stream training and inference using tee
Q Wang, S Cui, L Zhou, O Wu, Y Zhu, G Russello
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
42022
RAitc: Securely auditing the remotely executed applications
L Zhou, E Luo, G Wang
IEEE Access 8, 163045-163059, 2020
42020
EVCS: An edge-assisted virtual computing and storage approach for heterogeneous desktop deployment
M Wu, L Zhou, F Huang
2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2022
22022
A software detection mechanism based on smm in network computing
L Zhou, Y Shu, G Wang
Security, Privacy and Anonymity in Computation, Communication and Storage …, 2016
22016
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE
Q Wang, L Zhou, J Bai, YS Koh, S Cui, G Russello
Computers & Security 135, 103509, 2023
12023
A Survey of the Security Analysis of Embedded Devices
X Zhou, P Wang, L Zhou, P Xun, K Lu
Sensors 23 (22), 9221, 2023
12023
FortifyPatch: Towards Tamper-resistant Live Patching in Linux-based Hypervisor
Z Ye, L Zhou, F Zhang, W Jin, Z Ning, Y Hu, Z Qin
Proceedings of the ACM SIGSOFT International Symposium on Software Testing …, 2024
2024
IEmu: Interrupt modeling from the logic hidden in the firmware
Y Wei, Y Wang, L Zhou, X Zhou, Z Jiang
Journal of Systems Architecture 154, 103237, 2024
2024
FuzzFabric: A Scalable Grey-box Fuzzing Framework for Polymorphic Network Services
B Yu, L Zhou, C Cai, etc.
The IEEE International Conference on Web Services (ICWS 2024), 2024
2024
Armor: Protecting Software Against Hardware Tracing Techniques
T Yue, F Zhang, Z Ning, P Wang, X Zhou, K Lu, L Zhou
IEEE Transactions on Information Forensics and Security, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20