Tianwei Zhang
Tianwei Zhang
Verified email at ntu.edu.sg - Homepage
TitleCited byYear
Cloudradar: A real-time side-channel attack detection system in clouds
T Zhang, Y Zhang, RB Lee
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
Cloudmonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing
T Zhang, RB Lee
Proceedings of the 42nd Annual International Symposium on Computer …, 2015
New models of cache architectures characterizing information leakage from cache side channels
T Zhang, RB Lee
Proceedings of the 30th annual computer security applications conference, 96-105, 2014
Machine learning based DDoS attack detection from source side in cloud
Z He, T Zhang, RB Lee
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
Side channel vulnerability metrics: the promise and the pitfalls
T Zhang, F Liu, S Chen, RB Lee
Proceedings of the 2nd International Workshop on Hardware and Architectural …, 2013
A framework for realizing security on demand in cloud computing
P Jamkhedkar, J Szefer, D Perez-Botero, T Zhang, G Triolo, RB Lee
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
Dos attacks on your memory in cloud
T Zhang, Y Zhang, RB Lee
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Privacy-preserving machine learning through data obfuscation
T Zhang, Z He, RB Lee
arXiv preprint arXiv:1807.01860, 2018
Icorating: A deep-learning system for scam ICO identification
S Bian, Z Deng, F Li, W Monroe, P Shi, Z Sun, W Wu, S Wang, WY Wang, ...
arXiv preprint arXiv:1803.03670, 2018
Monitoring and attestation of virtual machine security health in cloud computing
T Zhang, RB Lee
IEEE Micro 36 (5), 28-37, 2016
Memory DoS attacks in multi-tenant clouds: Severity and mitigation
T Zhang, Y Zhang, RB Lee
arXiv preprint arXiv:1603.03404, 2016
Secure cache modeling for measuring side-channel leakage
T Zhang, RB Lee
Technical Report, Princeton University, 2014
Analyzing cache side channels using deep neural networks
T Zhang, Y Zhang, RB Lee
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health
T Zhang, RB Lee
IEEE Transactions on Computers 67 (6), 799-815, 2017
System and Method for Security Health Monitoring And Attestation Of Virtual Machines In Cloud Computing Systems
RB Lee, T Zhang
US Patent App. 15/179,734, 2016
Sensitive-sample fingerprinting of deep neural networks
Z He, T Zhang, R Lee
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019
Verideep: Verifying integrity of deep neural networks through sensitive-sample fingerprinting
Z He, T Zhang, RB Lee
arXiv preprint arXiv:1808.03277, 2018
Host-based dos attacks and defense in the cloud
T Zhang, RB Lee
Proceedings of the Hardware and Architectural Support for Security and …, 2017
Self-heating effects in gate-all-around silicon nanowire MOSFETs: Modeling and analysis
X Huang, T Zhang, R Wang, C Liu, Y Liu, R Huang
Thirteenth International Symposium on Quality Electronic Design (ISQED), 727-731, 2012
Detection and mitigation of security threats in cloud computing
T Zhang
Princeton University, 2017
The system can't perform the operation now. Try again later.
Articles 1–20