JZ

Jianying Zhou

11 records found

Authored

PAID

Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems

Modern Autonomous Vehicles (AVs) leverage road context information collected through sensors (e.g., LiDAR, radar, and camera) to support the automated driving experience. Once such information is collected, a neural network model predicts subsequent actions that the AV execute ...

HolA

Holistic and Autonomous Attestation for IoT Networks

Collective Remote Attestation (CRA) is a well-established approach where a single Verifier attests the integrity of multiple devices in a single execution of the challenge-response protocol. Current CRA solutions are well-suited for Internet of Things (IoT) networks, where the ...

SnakeGX

A Sneaky Attack Against SGX Enclaves

Intel Software Guard eXtension (SGX) is a technology to create enclaves (i.e., trusted memory regions) hardware isolated from a compromised operating system. Recently, researchers showed that unprivileged adversaries can mount code-reuse attacks to steal secrets from enclaves. ...

Extended proxy-assisted approach

Achieving revocable fine-grained encryption of cloud data

Attribute-based encryption has the potential to be deployed in a cloud computing environment to provide scalable and fine-grained data sharing. However, user revocation within ABE deployment remains a challenging issue to overcome, particularly when there is a large number of ...