Follow
Zhongshu Gu
Zhongshu Gu
IBM Research
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5172018
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
1772016
Containerleaks: Emerging security threats of information leakages in container clouds
X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
1622017
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
1222018
Process implanting: A new active introspection framework for virtualization
Z Gu, Z Deng, D Xu, X Jiang
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 147-156, 2011
962011
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 2018
74*2018
Security namespace: making linux security frameworks available to containers
Y Sun, D Safford, M Zohar, D Pendarakis, Z Gu, T Jaeger
27th USENIX Security Symposium (USENIX Security 18), 1423-1439, 2018
682018
GUITAR: Piecing together android app GUIs from memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
572015
Houdini's escape: Breaking the resource rein of linux control groups
X Gao, Z Gu, Z Li, H Jamjoom, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
532019
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
Z Gu, K Pei, Q Wang, L Si, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP …, 2015
502015
A study on the security implications of information leakages in container clouds
X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 174-191, 2018
492018
Vcr: App-agnostic recovery of photographic evidence from android device memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
Z Gu, B Saltaformaggio, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP …, 2014
402014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
B Saltaformaggio, Z Gu, X Zhang, D Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 255-269, 2014
392014
Fuzzy cyber detection pattern matching
X Shu, Z Gu, MP Stoecklin, HT Jamjoom
US Patent 11,544,527, 2023
372023
Reaching data confidentiality and model accountability on the caltrain
Z Gu, H Jamjoom, D Su, H Huang, J Zhang, T Ma, D Pendarakis, I Molloy
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
212019
Confidential Inference via Ternary Model Partitioning
Z Gu, H Huang, J Zhang, D Su, H Jamjoom, A Lamba, D Pendarakis, ...
arXiv preprint arXiv:1807.00969, arXiv: 1807.00969, 2018
202018
Privacy enhancing deep learning cloud service using a trusted execution environment
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent 11,443,182, 2022
172022
Intel tdx demystified: A top-down approach
PC Cheng, W Ozga, E Valdez, S Ahmed, Z Gu, H Jamjoom, H Franke, ...
ACM Computing Surveys, 2023
152023
Scarecrow: Deactivating evasive malware via its own evasive logic
J Zhang, Z Gu, J Jang, D Kirat, M Stoecklin, X Shu, H Huang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
152020
The system can't perform the operation now. Try again later.
Articles 1–20