Context-aware usage control for android G Bai, L Gu, T Feng, Y Guo, X Chen Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010 | 124 | 2010 |
Remote attestation on program execution L Gu, X Ding, RH Deng, B Xie, H Mei Proceedings of the 3rd ACM workshop on Scalable trusted computing, 11-20, 2008 | 109 | 2008 |
CertiKOS: A certified kernel for secure cloud computing L Gu, A Vaynberg, B Ford, Z Shao, D Costanzo Proceedings of the Second Asia-Pacific Workshop on Systems, 1-5, 2011 | 83 | 2011 |
Context‐aware usage control for web of things G Bai, L Yan, L Gu, Y Guo, X Chen Security and Communication Networks 7 (12), 2696-2712, 2014 | 33 | 2014 |
Deterministically deterring timing attacks in deterland W Wu, B Ford arXiv preprint arXiv:1504.07070, 2015 | 30 | 2015 |
Runtime software trustworthiness evidence collection mechanism based on TPM 古亮, 郭耀, 王华, 邹艳珍, 谢冰, 邵维忠 Journal of Software 21 (2), 373-387, 2010 | 26 | 2010 |
Rectifying prejudicial feedback ratings in reputation based trust management Y Zou, L Gu, G Li, B Xie, H Mei IEEE International Conference on Services Computing (SCC 2007), 530-535, 2007 | 23 | 2007 |
Model-driven remote attestation: Attesting remote system from behavioral aspect L Gu, X Ding, RH Deng, Y Zou, B Xie, W Shao, H Mei 2008 The 9th International Conference for Young Computer Scientists, 2347-2353, 2008 | 19 | 2008 |
Remote attestation on function execution (work-in-progress) L Gu, Y Cheng, X Ding, RH Deng, Y Guo, W Shao International Conference on Trusted Systems, 60-72, 2009 | 17 | 2009 |
Rvface: Reliable vector guided softmax loss for face recognition X Wang, S Wang, Y Liang, L Gu, Z Lei IEEE Transactions on Image Processing 31, 2337-2351, 2022 | 16 | 2022 |
A risk-evaluation assisted system for service selection E Zhai, L Gu, Y Hai 2015 IEEE International Conference on Web Services, 671-678, 2015 | 15 | 2015 |
Poster: LBMS: Load balancing based on multilateral security in cloud P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 15 | 2011 |
Security model oriented attestation on dynamically reconfigurable component-based systems L Gu, G Bai, Y Guo, X Chen, H Mei Journal of Network and Computer Applications 35 (3), 974-981, 2012 | 7 | 2012 |
Multilateral security architecture for virtualization platform in multi-tenancy cloud environment P Sun, Q Shen, L Gu, Y Li, S Qing, Z Chen IEEE Conference Anthology, 1-5, 2013 | 5 | 2013 |
Addressing leakage of re-encryption key in proxy re-encryption using trusted computing Y Yang, L Gu, F Bao Trusted Systems: Second International Conference, INTRUST 2010, Beijing …, 2011 | 5 | 2011 |
Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites L Wang, F Liu, G Li, L Gu, L Zhang, B Xie European Conference on a Service-Based Internet, 429-436, 2009 | 4 | 2009 |
Modeling TCG-based secure systems with colored petri nets L Gu, Y Guo, Y Yang, F Bao, H Mei International Conference on Trusted Systems, 67-86, 2010 | 3 | 2010 |
SCOBA: source code based attestation on custom software L Gu, Y Guo, A Ruan, Q Shen, H Mei Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 3 | 2010 |
Remote Platform Attestation: The Testimony for Trust Management X Ding, L Gu, RH Deng, B Xie, H Mei Trust Modeling and Management in Digital Environments: from Social Concept …, 2010 | 2 | 2010 |
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model A Ruan, Q Shen, L Gu, L Wang, L Shi, Y Yang, Z Chen Information and Communications Security: 11th International Conference …, 2009 | | 2009 |