Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks
Yu, He and Boheng, Li and Yao, Wang and Mengda, Yang and Juan, Wang and Hongxin, Hu and Xingyu, Zhao
ACM Conference on Computer and Communications Security, 2024
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
Xu, Xiaoyang and Yang, Mengda and Yi, Wenzhe and Li, Ziang and Wang, Juan and Hu, Hongxin and Zhuang, Yong and Liu, Yaxin
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
GAN you see me? enhanced data reconstruction attacks against split inference
Li, Ziang and Yang, Mengda and Liu, Yaxin and Wang, Juan and Hu, Hongxin and Yi, Wenzhe and Xu, Xiaoyang
Advances in Neural Information Processing Systems, 2024
Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge
Yang, Mengda and Yi, Wenzhe and Wang, Juan and Hu, Hongxin and Xu, Xiaoyang and Li, Ziang
Future Generation Computer Systems, 2024
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing
Wang, Juan and Wang, Jie and Fan, Chengyang and Yan, Fei and Cheng, Yueqiang and Zhang, Yinqian and Zhang, Wenhui and Yang, Mengda and Hu, Hongxin
IEEE Transactions on Cloud Computing, 2023
ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning
Wang, Juan and Ma, Chenjun and Li, Ziang and Yuan, Huanyu and Wang, Jie
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022
Measuring data reconstruction defenses in collaborative inference systems
Yang, Mengda and Li, Ziang and Wang, Juan and Hu, Hongxin and Ren, Ao and Xu, Xiaoyang and Yi, Wenzhe
Advances in Neural Information Processing Systems, 2022
Online Rule-Based Classifier Learning on Dynamic Unlabeled Multivariate Time Series Data
He, Guoliang and Xin, Xin and Peng, Rong and Han, Min and Wang, Juan and Wu, Xiaoqun
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020
S-Blocks: Lightweight and Trusted Virtual Security Function with SGX
Wang, Juan and Hao, Shirong and Hu, Hongxin and Zhao, Bo and Li, Hongda and Zhang, Wenhui and Xu, Jun and Liu, Peng and Ma, Jing
IEEE Transactions on Cloud Computing, 2020
TVIDS: Trusted Virtual IDS with SGX
Wang, Juan and Hao, Shirong and Li, Yi and Hong, Zhi and Yan, Fei and Zhao, Bo and Ma, Jing and Zhang, Huanguo
China Communications, 2019
Towards a Reliable Firewall for Software-Defined Networks
Hu, Hongxin and Han, Wonkyu and Kyung, Sukwha and Wang, Juan and Ahn, Gail-Joon and Zhao, Ziming and Li, Hongda
Computers & Security, 2019
Detecting and Mitigating Target Link-Flooding Attacks Using SDN
Wang, Juan and Wen, Ru and Li, Jiangqi and Yan, Fei and Zhao, Bo and Yu, Fajiang
IEEE Transactions on dependable and secure computing, 2018
SGX 技术的分析和研究
王鹃, 樊成阳, 程越强, 赵波, 韦韬, 严飞, 张焕国, 马婧
软件学报, 2018
Enabling Security-Enhanced Attestation with Intel SGX for Remote Terminal and IoT
Wang, Juan and Hong, Zhi and Zhang, Yuhan and Jin, Yier
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017
Chaos: An Sdn-Based Moving Target Defense System
Shi, Yuan and Zhang, Huanguo and Wang, Juan and Xiao, Feng and Huang, Jianwei and Zha, Daochen and Hu, Hongxin and Yan, Fei and Zhao, Bo and others
Security and Communication Networks, 2017
A Formal Analysis of Trusted Platform Module 2.0 Hash-Based Message Authentication Code Authorization under Digital Rights Management Scenario
Yu, Fajiang and Zhang, Huanguo and Zhao, Bo and Wang, Juan and Zhang, Liqiang and Yan, Fei and Chen, Zhenlin
Security and Communication Networks, 2016
Survey on Key Technology Development and Application in Trusted Computing
Wang, Juan and Shi, Yuan and Peng, Guojun and Zhang, Huanguo and Zhao, Bo and Yan, Fei and Yu, Fajiang and Zhang, Liqiang
China Communications, 2016
一种基于 OpenFlow 的 SDN 访问控制策略实时冲突检测与解决方法
王鹃, 王江, 焦虹阳, 王勇, 陈诗雅, 刘世辉, 胡宏新
计算机学报, 2015
Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing
Wang, Juan and Xie, Xuhui and Wang, Qingfei and Yan, Fei and Hu, Hongxin and Zhou, Sijun and Wang, Tao
Cloud Computing: 4th International Conference, CloudComp 2013, Wuhan, China, October 17-19, 2013, Revised Selected Papers 4, 2014
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
Wang, Juan and Lin, Wutao and Li, Haoyu and Du, Bianxia and Meng, Ke and Wang, Jiang
Wuhan University Journal of Natural Sciences, 2014
POSTER: An E2E Trusted Cloud Infrastructure
Wang, Juan and Zhao, Bo and Zhang, Huanguo and Yan, Fei and Yu, Fajiang and Zhang, Liqiang and Hu, Hongxin
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Formal Analysis of Information Card Federated Identity-Management Protocol
Wang, Juan and Hu, Hongxin and Zhao, Bo and Yan, Fei and Zhang, Huanguo and Wu, Qianhong
Chinese Journal of Electronics, 2013
Towards a Security-Enhanced Firewall Application for Openflow Networks
Wang, Juan and Wang, Yong and Hu, Hongxin and Sun, Qingxin and Shi, He and Zeng, Longjie
Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings 5, 2013