Jianyu Jiang
Cited by
Cited by
Apus: Fast and scalable paxos on rdma
C Wang, J Jiang, X Chen, N Yi, H Cui
Proceedings of the 2017 Symposium on Cloud Computing, 94-107, 2017
Bidl: A high-throughput, low-latency permissioned blockchain framework for datacenter networks
J Qi, X Chen, Y Jiang, J Jiang, T Shen, S Zhao, S Wang, G Zhang, L Chen, ...
Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021
Uranus: Simple, efficient sgx programming and its applications
J Jiang, X Chen, TO Li, C Wang, T Shen, S Zhao, H Cui, CL Wang, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
vPipe: A Virtualized Acceleration System for Achieving Efficient and Scalable Pipeline Parallel DNN Training
S Zhao, F Li, X Chen, X Guan, J Jiang, D Huang, Y Qing, S Wang, P Wang, ...
IEEE Transactions on Parallel and Distributed Systems 33 (3), 489-506, 2021
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge
T Shen, J Qi, J Jiang, X Wang, S Wen, X Chen, S Zhao, S Wang, L Chen, ...
2022 USENIX Annual Technical Conference (USENIX ATC 22), 723-738, 2022
Achieving low tail-latency and high scalability for serializable transactions in edge computing
X Chen, H Song, J Jiang, C Ruan, C Li, S Wang, G Zhang, R Cheng, ...
Proceedings of the Sixteenth European Conference on Computer Systems, 210-227, 2021
Efficient and DoS-resistant consensus for permissioned blockchains
X Chen, S Zhao, J Qi, J Jiang, H Song, C Wang, T On Li, TH Hubert Chan, ...
ACM SIGMETRICS Performance Evaluation Review 49 (3), 61-62, 2022
On the challenges of detecting side-channel attacks in SGX
J Jiang, C Soriente, G Karame
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
Daenet: Making strong anonymity scale in a fully decentralized network
T Shen, J Jiang, Y Jiang, X Chen, J Qi, S Zhao, F Zhang, X Luo, H Cui
IEEE Transactions on Dependable and Secure Computing 19 (4), 2286-2303, 2021
CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment
J Jiang, J Qi, T Shen, X Chen, S Zhao, S Wang, L Chen, G Zhang, X Luo, ...
2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 124-143, 2022
Kakute: A precise, unified information flow analysis system for big-data security
J Jiang, S Zhao, D Alsayed, Y Wang, H Cui, F Liang, Z Gu
Proceedings of the 33rd Annual Computer Security Applications Conference, 79-90, 2017
Autonomous detection of cache-based side-channel attacks
J Jiang, G Karame, C Soriente
US Patent 11,775,635, 2023
Upa: An automated, accurate and efficient differentially private big-data mining system
TO Li, J Jiang, J Qi, CC So, J Ma, X Chen, T Shen, H Cui, Y Wang, ...
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
Data synchronization method and apparatus
J Jiang
US Patent App. 18/146,955, 2023
Application processing method and apparatus, cloud environment, medium, and program product
J Jiang, X Chen, TO Li, C Wang, H Cui, S Wang, P Wang, G Zhang
US Patent App. 17/975,163, 2023
Data Processing Method and Apparatus, Computing Device for Data Processing, and Storage Medium
TO Li, J Jiang, J Qi, CC So, H Cui, S Wang, P Wang, G Zhang
US Patent App. 18/074,972, 2023
The system can't perform the operation now. Try again later.
Articles 1–16