Zhongshu Gu
Zhongshu Gu
IBM Research
Bestätigte E-Mail-Adresse bei us.ibm.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
1172018
Process implanting: A new active introspection framework for virtualization
Z Gu, Z Deng, D Xu, X Jiang
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 147-156, 2011
812011
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
772016
ContainerLeaks: Emerging security threats of information leakages in container clouds
X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
692017
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
532018
GUITAR: Piecing together android app GUIs from memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
472015
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
Z Gu, K Pei, Q Wang, L Si, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP …, 2015
432015
Vcr: App-agnostic recovery of photographic evidence from android device memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
362015
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
B Saltaformaggio, Z Gu, X Zhang, D Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 255-269, 2014
332014
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 2018
26*2018
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
Z Gu, B Saltaformaggio, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP …, 2014
202014
Security namespace: making linux security frameworks available to containers
Y Sun, D Safford, M Zohar, D Pendarakis, Z Gu, T Jaeger
27th {USENIX} Security Symposium ({USENIX} Security 18), 1423-1439, 2018
182018
Houdini's Escape: Breaking the Resource Rein of Linux Control Groups
X Gao, Z Gu, Z Li, H Jamjoom, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
72019
Single channel input multi-factor authentication via separate processing pathways
S Chari, Z Gu, H Huang, D Pendarakis
US Patent 10,904,246, 2021
62021
Reaching data confidentiality and model accountability on the caltrain
Z Gu, H Jamjoom, D Su, H Huang, J Zhang, T Ma, D Pendarakis, I Molloy
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
52019
A study on the security implications of information leakages in container clouds
X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang
IEEE Transactions on Dependable and Secure Computing, 2018
52018
Privacy implications of DNSSEC look-aside validation
A Mohaisen, Z Gu, K Ren
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
52017
Protecting deep learning models using watermarking
Z Gu, H Huang, MP Stoecklin, J Zhang
US Patent App. 15/997,159, 2019
42019
Domain-aware device protection via cross-validation among spatially-adjacent devices
Z Gu, H Huang, D Pendarakis
US Patent 9,854,445, 2017
42017
Drip: A framework for purifying trojaned kernel drivers
Z Gu, WN Sumner, Z Deng, X Zhang, D Xu
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
42013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20