Follow
Zhongshu Gu
Zhongshu Gu
IBM Research
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5612018
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
1852016
Containerleaks: Emerging security threats of information leakages in container clouds
X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
1672017
Securing Real-Time Microcontroller Systems through Customized Memory View Switching
CH Kim, T Kim, H Choi, Z Gu, B Lee, X Zhang, D Xu
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
1272018
Process implanting: A new active introspection framework for virtualization
Z Gu, Z Deng, D Xu, X Jiang
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 147-156, 2011
962011
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 2018
75*2018
Security namespace: making linux security frameworks available to containers
Y Sun, D Safford, M Zohar, D Pendarakis, Z Gu, T Jaeger
27th USENIX Security Symposium (USENIX Security 18), 1423-1439, 2018
752018
Houdini's escape: Breaking the resource rein of linux control groups
X Gao, Z Gu, Z Li, H Jamjoom, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
602019
GUITAR: Piecing together android app GUIs from memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
602015
A study on the security implications of information leakages in container clouds
X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang
IEEE Transactions on Dependable and Secure Computing 18 (1), 174-191, 2018
552018
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis
Z Gu, K Pei, Q Wang, L Si, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP …, 2015
542015
Vcr: App-agnostic recovery of photographic evidence from android device memory images
B Saltaformaggio, R Bhatia, Z Gu, X Zhang, D Xu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
452015
Fuzzy cyber detection pattern matching
X Shu, Z Gu, MP Stoecklin, HT Jamjoom
US Patent 11,544,527, 2023
432023
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
Z Gu, B Saltaformaggio, X Zhang, D Xu
Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP …, 2014
422014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse
B Saltaformaggio, Z Gu, X Zhang, D Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 255-269, 2014
422014
Protecting deep learning models using watermarking
Z Gu, H Huang, MP Stoecklin, J Zhang
US Patent 11,163,860, 2021
362021
Intel tdx demystified: A top-down approach
PC Cheng, W Ozga, E Valdez, S Ahmed, Z Gu, H Jamjoom, H Franke, ...
ACM Computing Surveys 56 (9), 1-33, 2024
342024
Reaching data confidentiality and model accountability on the caltrain
Z Gu, H Jamjoom, D Su, H Huang, J Zhang, T Ma, D Pendarakis, I Molloy
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
232019
Privacy enhancing deep learning cloud service using a trusted execution environment
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent 11,443,182, 2022
222022
Confidential Inference via Ternary Model Partitioning
Z Gu, H Huang, J Zhang, D Su, H Jamjoom, A Lamba, D Pendarakis, ...
arXiv preprint arXiv:1807.00969, arXiv: 1807.00969, 2018
212018
The system can't perform the operation now. Try again later.
Articles 1–20