2024

Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks
Yu, He and Boheng, Li and Yao, Wang and Mengda, Yang and Juan, Wang and Hongxin, Hu and Xingyu, Zhao
ACM Conference on Computer and Communications Security, 2024

A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
Xu, Xiaoyang and Yang, Mengda and Yi, Wenzhe and Li, Ziang and Wang, Juan and Hu, Hongxin and Zhuang, Yong and Liu, Yaxin
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

GAN you see me? enhanced data reconstruction attacks against split inference
Li, Ziang and Yang, Mengda and Liu, Yaxin and Wang, Juan and Hu, Hongxin and Yi, Wenzhe and Xu, Xiaoyang
Advances in Neural Information Processing Systems, 2024

Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge
Yang, Mengda and Yi, Wenzhe and Wang, Juan and Hu, Hongxin and Xu, Xiaoyang and Li, Ziang
Future Generation Computer Systems, 2024

2023

SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing
Wang, Juan and Wang, Jie and Fan, Chengyang and Yan, Fei and Cheng, Yueqiang and Zhang, Yinqian and Zhang, Wenhui and Yang, Mengda and Hu, Hongxin
IEEE Transactions on Cloud Computing, 2023

2022

ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning
Wang, Juan and Ma, Chenjun and Li, Ziang and Yuan, Huanyu and Wang, Jie
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022

Measuring data reconstruction defenses in collaborative inference systems
Yang, Mengda and Li, Ziang and Wang, Juan and Hu, Hongxin and Ren, Ao and Xu, Xiaoyang and Yi, Wenzhe
Advances in Neural Information Processing Systems, 2022

2020

Online Rule-Based Classifier Learning on Dynamic Unlabeled Multivariate Time Series Data
He, Guoliang and Xin, Xin and Peng, Rong and Han, Min and Wang, Juan and Wu, Xiaoqun
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020

S-Blocks: Lightweight and Trusted Virtual Security Function with SGX
Wang, Juan and Hao, Shirong and Hu, Hongxin and Zhao, Bo and Li, Hongda and Zhang, Wenhui and Xu, Jun and Liu, Peng and Ma, Jing
IEEE Transactions on Cloud Computing, 2020

2019

TVIDS: Trusted Virtual IDS with SGX
Wang, Juan and Hao, Shirong and Li, Yi and Hong, Zhi and Yan, Fei and Zhao, Bo and Ma, Jing and Zhang, Huanguo
China Communications, 2019

Towards a Reliable Firewall for Software-Defined Networks
Hu, Hongxin and Han, Wonkyu and Kyung, Sukwha and Wang, Juan and Ahn, Gail-Joon and Zhao, Ziming and Li, Hongda
Computers & Security, 2019

2018

Detecting and Mitigating Target Link-Flooding Attacks Using SDN
Wang, Juan and Wen, Ru and Li, Jiangqi and Yan, Fei and Zhao, Bo and Yu, Fajiang
IEEE Transactions on dependable and secure computing, 2018

SGX 技术的分析和研究
王鹃, 樊成阳, 程越强, 赵波, 韦韬, 严飞, 张焕国, 马婧
软件学报, 2018

2017

Enabling Security-Enhanced Attestation with Intel SGX for Remote Terminal and IoT
Wang, Juan and Hong, Zhi and Zhang, Yuhan and Jin, Yier
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017

Chaos: An Sdn-Based Moving Target Defense System
Shi, Yuan and Zhang, Huanguo and Wang, Juan and Xiao, Feng and Huang, Jianwei and Zha, Daochen and Hu, Hongxin and Yan, Fei and Zhao, Bo and others
Security and Communication Networks, 2017

2016

A Formal Analysis of Trusted Platform Module 2.0 Hash-Based Message Authentication Code Authorization under Digital Rights Management Scenario
Yu, Fajiang and Zhang, Huanguo and Zhao, Bo and Wang, Juan and Zhang, Liqiang and Yan, Fei and Chen, Zhenlin
Security and Communication Networks, 2016

Survey on Key Technology Development and Application in Trusted Computing
Wang, Juan and Shi, Yuan and Peng, Guojun and Zhang, Huanguo and Zhao, Bo and Yan, Fei and Yu, Fajiang and Zhang, Liqiang
China Communications, 2016

2015

一种基于 OpenFlow 的 SDN 访问控制策略实时冲突检测与解决方法
王鹃, 王江, 焦虹阳, 王勇, 陈诗雅, 刘世辉, 胡宏新
计算机学报, 2015

2014

Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing
Wang, Juan and Xie, Xuhui and Wang, Qingfei and Yan, Fei and Hu, Hongxin and Zhou, Sijun and Wang, Tao
Cloud Computing: 4th International Conference, CloudComp 2013, Wuhan, China, October 17-19, 2013, Revised Selected Papers 4, 2014

A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
Wang, Juan and Lin, Wutao and Li, Haoyu and Du, Bianxia and Meng, Ke and Wang, Jiang
Wuhan University Journal of Natural Sciences, 2014

POSTER: An E2E Trusted Cloud Infrastructure
Wang, Juan and Zhao, Bo and Zhang, Huanguo and Yan, Fei and Yu, Fajiang and Zhang, Liqiang and Hu, Hongxin
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013

Formal Analysis of Information Card Federated Identity-Management Protocol
Wang, Juan and Hu, Hongxin and Zhao, Bo and Yan, Fei and Zhang, Huanguo and Wu, Qianhong
Chinese Journal of Electronics, 2013

Towards a Security-Enhanced Firewall Application for Openflow Networks
Wang, Juan and Wang, Yong and Hu, Hongxin and Sun, Qingxin and Shi, He and Zeng, Longjie
Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings 5, 2013