JZ
Jianying Zhou
11 records found
1
PAID
Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems
Modern Autonomous Vehicles (AVs) leverage road context information collected through sensors (e.g., LiDAR, radar, and camera) to support the automated driving experience. Once such information is collected, a neural network model predicts subsequent actions that the AV executes.
...
HolA
Holistic and Autonomous Attestation for IoT Networks
Collective Remote Attestation (CRA) is a well-established approach where a single Verifier attests the integrity of multiple devices in a single execution of the challenge-response protocol. Current CRA solutions are well-suited for Internet of Things (IoT) networks, where the de
...
SnakeGX
A Sneaky Attack Against SGX Enclaves
Intel Software Guard eXtension (SGX) is a technology to create enclaves (i.e., trusted memory regions) hardware isolated from a compromised operating system. Recently, researchers showed that unprivileged adversaries can mount code-reuse attacks to steal secrets from enclaves. Ho
...
Extended proxy-assisted approach
Achieving revocable fine-grained encryption of cloud data
Attribute-based encryption has the potential to be deployed in a cloud computing environment to provide scalable and fine-grained data sharing. However, user revocation within ABE deployment remains a challenging issue to overcome, particularly when there is a large number of use
...