关注
Zhi Li
标题
引用次数
引用次数
年份
Exploring new opportunities to defeat low-rate DDoS attack in container-based cloud environment
Z Li, H Jin, D Zou, B Yuan
IEEE Transactions on Parallel and Distributed Systems 31 (3), 695-706, 2019
702019
Dseom: A framework for dynamic security evaluation and optimization of mtd in container-based cloud
H Jin, Z Li, D Zou, B Yuan
IEEE Transactions on Dependable and Secure Computing 18 (3), 1125-1136, 2019
662019
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
202022
Understanding TEE containers, easy to use? Hard to trust
W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang
arXiv preprint arXiv:2109.01923, 2021
132021
Enhancing deep learning-based vulnerability detection by building behavior graph model
B Yuan, Y Lu, Y Fang, Y Wu, D Zou, Z Li, Z Li, H Jin
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
92023
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection
W Liu, X Liu, Z Li, B Liu, R Yu, L Wang
IEEE Transactions on Information Forensics and Security 17, 2311-2323, 2022
72022
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation
Z Li, W Liu, XF Wang, B Yuan, H Tian, H Jin, S Yan
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–7