Liang Gu
Citata da
Citata da
Context-aware usage control for android
G Bai, L Gu, T Feng, Y Guo, X Chen
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
Remote attestation on program execution
L Gu, X Ding, RH Deng, B Xie, H Mei
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008
CertiKOS: A certified kernel for secure cloud computing
L Gu, A Vaynberg, B Ford, Z Shao, D Costanzo
Proceedings of the Second Asia-Pacific Workshop on Systems, 1-5, 2011
Context‐aware usage control for web of things
G Bai, L Yan, L Gu, Y Guo, X Chen
Security and Communication Networks 7 (12), 2696-2712, 2014
Deterministically deterring timing attacks in deterland
W Wu, B Ford
arXiv preprint arXiv:1504.07070, 2015
Runtime software trustworthiness evidence collection mechanism based on TPM
古亮, 郭耀, 王华, 邹艳珍, 谢冰, 邵维忠
Journal of Software 21 (2), 373-387, 2010
Rectifying prejudicial feedback ratings in reputation based trust management
Y Zou, L Gu, G Li, B Xie, H Mei
IEEE International Conference on Services Computing (SCC 2007), 530-535, 2007
Model-driven remote attestation: Attesting remote system from behavioral aspect
L Gu, X Ding, RH Deng, Y Zou, B Xie, W Shao, H Mei
2008 The 9th International Conference for Young Computer Scientists, 2347-2353, 2008
Remote attestation on function execution (work-in-progress)
L Gu, Y Cheng, X Ding, RH Deng, Y Guo, W Shao
International Conference on Trusted Systems, 60-72, 2009
A risk-evaluation assisted system for service selection
E Zhai, L Gu, Y Hai
2015 IEEE International Conference on Web Services, 671-678, 2015
Poster: LBMS: Load balancing based on multilateral security in cloud
P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Rvface: Reliable vector guided softmax loss for face recognition
X Wang, S Wang, Y Liang, L Gu, Z Lei
IEEE Transactions on Image Processing 31, 2337-2351, 2022
Security model oriented attestation on dynamically reconfigurable component-based systems
L Gu, G Bai, Y Guo, X Chen, H Mei
Journal of Network and Computer Applications 35 (3), 974-981, 2012
Multilateral security architecture for virtualization platform in multi-tenancy cloud environment
P Sun, Q Shen, L Gu, Y Li, S Qing, Z Chen
IEEE Conference Anthology, 1-5, 2013
Addressing leakage of re-encryption key in proxy re-encryption using trusted computing
Y Yang, L Gu, F Bao
Trusted Systems: Second International Conference, INTRUST 2010, Beijing …, 2011
Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites
L Wang, F Liu, G Li, L Gu, L Zhang, B Xie
European Conference on a Service-Based Internet, 429-436, 2009
Modeling TCG-based secure systems with colored petri nets
L Gu, Y Guo, Y Yang, F Bao, H Mei
International Conference on Trusted Systems, 67-86, 2010
Remote Platform Attestation: The Testimony for Trust Management
X Ding, L Gu, RH Deng, B Xie, H Mei
Trust Modeling and Management in Digital Environments: from Social Concept …, 2010
SCOBA: source code based attestation on custom software
L Gu, Y Guo, A Ruan, Q Shen, H Mei
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
A Ruan, Q Shen, L Gu, L Wang, L Shi, Y Yang, Z Chen
Information and Communications Security: 11th International Conference …, 2009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20