Suivre
Ke Zhong
Ke Zhong
Adresse e-mail validée de seas.upenn.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Optimizing data-intensive systems in disaggregated data centers with teleport
Q Zhang, X Chen, S Sankhe, Z Zheng, K Zhong, S Angel, A Chen, V Liu, ...
Proceedings of the 2022 International Conference on Management of Data, 1345 …, 2022
232022
Mycelium: Large-scale distributed graph queries with differential privacy
E Roth, K Newatia, Y Ma, K Zhong, S Angel, A Haeberlen
Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021
222021
Incremental {Offline/Online}{PIR}
Y Ma, K Zhong, T Rabin, S Angel
31st USENIX Security Symposium (USENIX Security 22), 1741-1758, 2022
192022
Ibex: Privacy-preserving ad conversion tracking and bidding
K Zhong, Y Ma, S Angel
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
Addax: A fast, private, and accountable ad exchange infrastructure
K Zhong, Y Ma, Y Mao, S Angel
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
42023
Making Break-ups Less Painful: Source-level Support for Transforming Legacy Software into a Network of Tasks
N Sultana, A Rao, Z Jin, P Pashakhanloo, H Zhu, K Zhong, BT Loo
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018
32018
Towards Practical Application-level Support for Privilege Separation
N Sultana, H Zhu, K Zhong, Z Zheng, R Mao, D Chauhan, S Carrasquillo, ...
Proceedings of the 38th Annual Computer Security Applications Conference, 71-87, 2022
22022
A file system for safely interacting with untrusted {USB} flash drives
K Zhong, Z Jiang, K Ma, S Angel
12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 20), 2020
22020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–8