Yukun Zhou
Cited by
Cited by
One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation
Y Xiao, X Zhang, Y Zhang, R Teodorescu
25th USENIX security symposium (USENIX Security 16), 19-35, 2016
A comprehensive study of the past, present, and future of data deduplication
W Xia, H Jiang, D Feng, F Douglis, P Shilane, Y Hua, M Fu, Y Zhang, ...
Proceedings of the IEEE 104 (9), 1681-1710, 2016
AE: An Asymmetric Extremum Content Defined Chunking Algorithm for Fast and Bandwidth-Efficient Data Deduplication
YZ Yucheng Zhang, Hong Jiang, Dan Feng, Wen Xia, Min Fu, Fangting Huang
IEEE INFOCOM 2015, 2015
SecDep: A User-Aware Efficient Fine-Grained Secure Deduplication Scheme with Multi-Level Key Management
Massive Storage Systems and Technology (MSST), 2015 31st International …, 2015
Ddelta: A deduplication-inspired fast delta compression approach
W Xia, H Jiang, D Feng, L Tian, M Fu, Y Zhou
Performance Evaluation 79, 258-272, 2014
A Fast Asymmetric Extremum Content Defined Chunking Algorithm for Data Deduplication in Backup Storage Systems
YZ Yucheng Zhang, Dan Feng, Hong Jiang, Wen Xia, Min Fu, Fangting Huang
IEEE Transactions on Computers, 2016
The design of fast content-defined chunking for data deduplication based storage systems
W Xia, X Zou, H Jiang, Y Zhou, C Liu, D Feng, Y Hua, Y Hu, Y Zhang
IEEE Transactions on Parallel and Distributed Systems 31 (9), 2017-2031, 2020
Security RBSG: Protecting Phase Change Memory with Security-Level Adjustable Dynamic Mapping
YZ Fangting Huang, Dan Feng, Wen Xia, Wen Zhou, Yucheng Zhang, Min Fu ...
the 30th IEEE International Parallel & Distributed Processing Symposium …, 2016
A similarity-aware encrypted deduplication scheme with flexible access control in the cloud
Y Zhou, D Feng, Y Hua, W Xia, M Fu, F Huang, Y Zhang
Future Generation Computer Systems 84, 177-189, 2018
Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage
P Zuo, Y Hua, C Wang, W Xia, S Cao, Y Zhou, Y Sun
Proceedings of the 2017 Symposium on Cloud Computing, 638-638, 2017
BAC: Bandwidth-aware compression for efficient live migration of virtual machines
C Li, D Feng, Y Hua, W Xia, L Qin, Y Huang, Y Zhou
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Reducing chunk fragmentation for in-line delta compressed and deduplicated backup systems
Y Zhang, D Feng, Y Hua, Y Hu, W Xia, M Fu, X Tang, Z Wang, F Huang, ...
2017 International Conference on Networking, Architecture, and Storage (NAS …, 2017
DEC: An efficient deduplication-enhanced compression approach
Z Han, W Xia, Y Hu, D Feng, Y Zhang, Y Zhou, M Fu, L Gu
2016 IEEE 22nd International Conference on Parallel and Distributed Systems …, 2016
An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
Y Zhou, Z Yu, L Gu, D Feng
BenchCouncil Transactions on Benchmarks, Standards and Evaluations 2 (2), 100062, 2022
Darm: A deduplication-aware redundancy management approach for reliable-enhanced storage systems
Y Zhou, D Feng, W Xia, M Fu, Y Xiao
Algorithms and Architectures for Parallel Processing: 18th International …, 2018
Bandwidth-efficient storage services for mitigating side channel attack
P Zuo, Y Hua, C Wang, W Xia, S Cao, Y Zhou, Y Sun
arXiv preprint arXiv:1703.05126, 2017
周玉坤, 冯丹, 夏文, 付忞
计算机工程与科学 38 (9), 1755-1762, 2016
Enhancing security of NVM-based main memory with dynamic Feistel network mapping
F Huang, D Feng, W Xia, W Zhou, Y Zhang, M Fu, C Jiang, Y Zhou
Frontiers of Information Technology & Electronic Engineering 19 (7), 847-863, 2018
基于 Feistel 动态网络映射的非易失存储内存安全增强方法
F Huang, D Feng, W Xia, W Zhou, Y Zhang, M Fu, C Jiang, Y Zhou, ...
Frontiers 19 (7), 847-863, 2018
A Twice-Hash based Convergent Encryption Strategy for Data Deduplication
MF Yukun Zhou, Dan Feng, Wen Xia
National Conference of Information Storage (NCIS'15) Computer Engineering …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20