Follow
Zhang Xu
Zhang Xu
Verified email at email.wm.edu
Title
Cited by
Cited by
Year
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud
Z Wu, Z Xu, H Wang
IEEE/ACM Transactions on Networking 23 (2), 603-615, 2014
3962014
A measurement study on co-residence threat inside the cloud
Z Xu, H Wang, Z Wu
24th USENIX Security Symposium (USENIX Security 15), 929-944, 2015
1272015
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1052016
Security implications of memory deduplication in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
772013
Power attack: an increasing threat to data centers.
Z Xu, H Wang, Z Xu, X Wang
NDSS, 2014
752014
A covert channel construction in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
382012
Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center.
X Gao, Z Xu, H Wang, L Li, X Wang
NDSS, 2018
292018
Why" Some" Like It Hot Too: Thermal Attack on Data Centers
X Gao, Z Xu, H Wang, L Li, X Wang
Proceedings of the 2017 ACM SIGMETRICS/International Conference on …, 2017
122017
Intrusion detection using efficient system dependency analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,462, 2017
72017
Investigating security vulnerabilities in a hot data center with reduced cooling redundancy
X Gao, G Liu, Z Xu, H Wang, L Li, X Wang
IEEE Transactions on Dependable and Secure Computing, 2020
62020
Gemini: An emergency line of defense against phishing attacks
Z Xu, H Wang, S Jajodia
2014 IEEE 33rd International Symposium on Reliable Distributed Systems, 11-20, 2014
62014
High Fidelity Data Reduction for System Dependency Analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,346, 2017
22017
Understanding Security Threats in Cloud
Z Xu
12016
June 28, 2015
Z Xu, H Wang, Z Wu
2015
The system can't perform the operation now. Try again later.
Articles 1–14