One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation Y Xiao, X Zhang, Y Zhang, R Teodorescu 25th USENIX security symposium (USENIX Security 16), 19-35, 2016 | 454* | 2016 |
A comprehensive study of the past, present, and future of data deduplication W Xia, H Jiang, D Feng, F Douglis, P Shilane, Y Hua, M Fu, Y Zhang, ... Proceedings of the IEEE 104 (9), 1681-1710, 2016 | 347 | 2016 |
AE: An Asymmetric Extremum Content Defined Chunking Algorithm for Fast and Bandwidth-Efficient Data Deduplication YZ Yucheng Zhang, Hong Jiang, Dan Feng, Wen Xia, Min Fu, Fangting Huang IEEE INFOCOM 2015, 2015 | 109* | 2015 |
SecDep: A User-Aware Efficient Fine-Grained Secure Deduplication Scheme with Multi-Level Key Management YZDFWXMFFHYZC Li Massive Storage Systems and Technology (MSST), 2015 31st International …, 2015 | 99* | 2015 |
Ddelta: A deduplication-inspired fast delta compression approach W Xia, H Jiang, D Feng, L Tian, M Fu, Y Zhou Performance Evaluation 79, 258-272, 2014 | 95 | 2014 |
A Fast Asymmetric Extremum Content Defined Chunking Algorithm for Data Deduplication in Backup Storage Systems YZ Yucheng Zhang, Dan Feng, Hong Jiang, Wen Xia, Min Fu, Fangting Huang IEEE Transactions on Computers, 2016 | 74* | 2016 |
The design of fast content-defined chunking for data deduplication based storage systems W Xia, X Zou, H Jiang, Y Zhou, C Liu, D Feng, Y Hua, Y Hu, Y Zhang IEEE Transactions on Parallel and Distributed Systems 31 (9), 2017-2031, 2020 | 60 | 2020 |
Security RBSG: Protecting Phase Change Memory with Security-Level Adjustable Dynamic Mapping YZ Fangting Huang, Dan Feng, Wen Xia, Wen Zhou, Yucheng Zhang, Min Fu ... the 30th IEEE International Parallel & Distributed Processing Symposium …, 2016 | 35* | 2016 |
A similarity-aware encrypted deduplication scheme with flexible access control in the cloud Y Zhou, D Feng, Y Hua, W Xia, M Fu, F Huang, Y Zhang Future Generation Computer Systems 84, 177-189, 2018 | 34 | 2018 |
Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage P Zuo, Y Hua, C Wang, W Xia, S Cao, Y Zhou, Y Sun Proceedings of the 2017 Symposium on Cloud Computing, 638-638, 2017 | 27 | 2017 |
BAC: Bandwidth-aware compression for efficient live migration of virtual machines C Li, D Feng, Y Hua, W Xia, L Qin, Y Huang, Y Zhou IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 12 | 2017 |
Reducing chunk fragmentation for in-line delta compressed and deduplicated backup systems Y Zhang, D Feng, Y Hua, Y Hu, W Xia, M Fu, X Tang, Z Wang, F Huang, ... 2017 International Conference on Networking, Architecture, and Storage (NAS …, 2017 | 5 | 2017 |
DEC: An efficient deduplication-enhanced compression approach Z Han, W Xia, Y Hu, D Feng, Y Zhang, Y Zhou, M Fu, L Gu 2016 IEEE 22nd International Conference on Parallel and Distributed Systems …, 2016 | 5 | 2016 |
An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing Y Zhou, Z Yu, L Gu, D Feng BenchCouncil Transactions on Benchmarks, Standards and Evaluations 2 (2), 100062, 2022 | 4 | 2022 |
Darm: A deduplication-aware redundancy management approach for reliable-enhanced storage systems Y Zhou, D Feng, W Xia, M Fu, Y Xiao Algorithms and Architectures for Parallel Processing: 18th International …, 2018 | 3 | 2018 |
Bandwidth-efficient storage services for mitigating side channel attack P Zuo, Y Hua, C Wang, W Xia, S Cao, Y Zhou, Y Sun arXiv preprint arXiv:1703.05126, 2017 | 3 | 2017 |
面向数据去重的基于二次哈希的收敛加密策略 周玉坤, 冯丹, 夏文, 付忞 计算机工程与科学 38 (09), 1755, 2016 | 1 | 2016 |
Enhancing security of NVM-based main memory with dynamic Feistel network mapping F Huang, D Feng, W Xia, W Zhou, Y Zhang, M Fu, C Jiang, Y Zhou Frontiers of Information Technology & Electronic Engineering 19 (7), 847-863, 2018 | | 2018 |
基于 Feistel 动态网络映射的非易失存储内存安全增强方法 F Huang, D Feng, W Xia, W Zhou, Y Zhang, M Fu, C Jiang, Y Zhou, ... Frontiers 19 (7), 847-863, 2018 | | 2018 |
A Twice-Hash based Convergent Encryption Strategy for Data Deduplication MF Yukun Zhou, Dan Feng, Wen Xia National Conference of Information Storage (NCIS'15) Computer Engineering …, 2015 | | 2015 |