Zhongshu Gu
Orcid: 0000-0001-9624-2669
According to our database1,
Zhongshu Gu
authored at least 31 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the ResilientFL '21: Proceedings of the First Workshop on Systems Challenges in Reliable and Secure Federated Learning, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018
Comput. Secur., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016
HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2011
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011