Zongwei Zhou
Zongwei Zhou
Software Engineer at Google (Ph.D. from Carnegie Mellon University)
Verified email at andrew.cmu.edu - Homepage
Cited by
Cited by
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
International conference on trust and trustworthy computing, 159-178, 2012
Dancing with giants: Wimpy kernels for on-demand isolated i/o
Z Zhou, M Yu, VD Gligor
2014 IEEE symposium on security and privacy, 308-323, 2014
ShortMAC: Efficient Data-Plane Fault Localization.
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
NDSS, 2012
Network fault localization with small TCB
X Zhang, Z Zhou, G Hasker, A Perrig, V Gligor
2011 19th IEEE International Conference on Network Protocols, 143-154, 2011
Trusted display on untrusted commodity platforms
M Yu, VD Gligor, Z Zhou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set
Z Zhou, Y Xue, J Liu, W Zhang, J Li
International Conference on Information and Communications Security, 201-215, 2007
KISS:“Key It Simple and Secure” corporate key management
Z Zhou, J Han, YH Lin, A Perrig, V Gligor
International Conference on Trust and Trustworthy Computing, 1-18, 2013
Scale mlperf-0.6 models on google tpu-v3 pods
S Kumar, V Bitorff, D Chen, C Chou, B Hechtman, HJ Lee, N Kumar, ...
arXiv preprint arXiv:1909.09756, 2019
Using trustworthy host-based information in the network
B Parno, Z Zhou, A Perrig
Proceedings of the seventh ACM workshop on Scalable trusted computing, 33-44, 2012
Security enhancement over ad-hoc AODV routing protocol
Z Zhou
Proceedings of the 4th IASTED Conference on Communication, Network, and …, 2007
Don’t Talk to Zombies: Mitigating DDoS Attacks via Attestation
B Parno, Z Zhou, A Perrig
June, 2009
Ten lessons from three generations shaped google’s tpuv4i: Industrial product
NP Jouppi, DH Yoon, M Ashcraft, M Gottscho, TB Jablin, G Kurian, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
Towards high-performance pattern matching on multi-core network processing platforms
Y Qi, Z Zhou, Y Wu, Y Xue, J Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
Towards effective network algorithms on multi-core network processors
Y Qi, Z Zhou, B Yang, F He, Y Xue, J Li
Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking …, 2008
Dancing with giants: Wimpy kernels for on-demand I/O isolation
Z Zhou, M Yu, VD Gligor
IEEE Security & Privacy 13 (2), 38-46, 2015
Fast path session creation on network processors
B Xu, Y Qi, F He, Z Zhou, Y Xue, J Li
2008 The 28th International Conference on Distributed Computing Systems, 573-580, 2008
Experimental investigation on MPEG-2 based video coding at 22 Mbps
L Hua, C Yong, Z Zhihe, Y Sile
IEEE transactions on consumer electronics 41 (3), 615-619, 1995
The system can't perform the operation now. Try again later.
Articles 1–20