


default search action
Rui Hou 0001
Person information
- affiliation: Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Rui Hou — disambiguation page
- Rui Hou 0002
— Duke University, Durham, NC, USA - Rui Hou 0003
— South-Central University for Nationalities, Wuhan, Hubei, China - Rui Hou 0004 — North China Electric Power University, Beijing, China
- Rui Hou 0005
— Chengdu University of Technology, Chengdu, China - Rui Hou 0006
— Guangdong University of Technology, Guangzhou, China - Rui Hou 0007
— University of Michigan, Ann Arbor, MI, USA - Rui Hou 0008 — Niantic Labs, Sunnyvale, CA, USA (and 1 more)
- Rui Hou 0009
— Guangdong University of Technology, Guangzhou, Guangdong, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j26]Zhuoyu Tian, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang:
LP-HENN: fully homomorphic encryption accelerator with high energy efficiency. Cybersecur. 8(1): 98 (2025)
[j25]Lingbo Zhao, Zhilu Wang, Shuquan Wang, Yuhui Zhang, Rui Hou, Dan Meng:
Exploring the ransomware ecosystem and the active defense concept: Review of attacks and defense. J. Inf. Secur. Appl. 94: 104171 (2025)
[j24]Chong Wang
, Wanyi Fu
, Jiangwei Zhang
, Shiyao Li
, Rui Hou
, Jian Yang
, Yu Wang
:
WOLF: Weight-Level OutLier and Fault Integration for Reliable LLM Deployment. IEEE Trans. Computers 74(10): 3390-3403 (2025)
[j23]Yansong Zhang
, Xiaojun Chen
, Ye Dong
, Qinghui Zhang
, Rui Hou
, Qiang Liu
, Xudong Chen
:
MD-SONIC: Maliciously-Secure Outsourcing Neural Network Inference With Reduced Online Communication. IEEE Trans. Inf. Forensics Secur. 20: 3534-3549 (2025)
[j22]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. IEEE Trans. Inf. Forensics Secur. 20: 11431-11446 (2025)
[j21]Yuhui Zhang
, Hong Liao, Lutan Zhao
, Yuncong Shao, Zhihong Tian
, XiaoFeng Wang, Dan Meng, Rui Hou
:
An Efficient Speculative Federated Tree Learning System With a Lightweight NN-Based Predictor. IEEE Trans. Parallel Distributed Syst. 36(8): 1728-1743 (2025)
[j20]Zhiwei Wang
, Haoqi He
, Lutan Zhao
, Peinan Li
, Zhihao Li
, Dan Meng, Rui Hou
:
Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs. IEEE Trans. Parallel Distributed Syst. 36(11): 2264-2280 (2025)
[c56]Yan Wang
, Xingbin Wang
, Yulan Su
, Sisi Zhang
, Zechao Lin
, Dan Meng
, Rui Hou
:
ROBIN: A Novel Framework for Accelerating Robust Multi-Variant Training. ASP-DAC 2025: 1120-1125
[c55]Zihao Yang
, Mengxin Zheng
, Shengyu Fan
, Qian Lou
, Rui Hou
, Dan Meng
, Mingzhe Zhang
:
Corrosion Hammer: A Self-Activated Bit-Flip Attack to the Processing-In-Memory Accelerator. CF 2025: 128-131
[c54]Zhengbang Yang, Lutan Zhao, Peinan Li, Han Liu, Kai Li, Boyan Zhao, Dan Meng, Rui Hou:
LegoZK: A Dynamically Reconfigurable Accelerator for Zero-Knowledge Proof. HPCA 2025: 113-126
[c53]Zechao Lin, Sisi Zhang, Xingbin Wang, Yulan Su, Yan Wang, Rui Hou, Dan Meng:
LoRATEE: A Secure and Efficient Inference Framework for Multi-Tenant LoRA LLMs Based on TEE. ICASSP 2025: 1-5
[c52]Zhilu Wang, Peinan Li, Lingbo Zhao, Fengkai Yuan, Rui Hou, Dan Meng:
RanDoctor: System-Level Ransomware Detection with ProbSparse Self-Attention. ICASSP 2025: 1-5
[c51]Sisi Zhang, Zechao Lin, Xingbin Wang, Yulan Su, Yan Wang, Rui Hou, Dan Meng:
Jack of All Trades, Master of None: PMP-Guided Adaptive Multi-Teacher Distillation with Meta-Learning. ICASSP 2025: 1-5
[c50]Zhilu Wang, Peinan Li, Lingbo Zhao, Fengkai Yuan, Rui Hou, Dan Meng:
RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-head Attention. ICIC (4) 2025: 27-38
[c49]Shengyu Fan
, Xianglong Deng
, Liang Kong
, Guiming Shi
, Guang Fan
, Dan Meng
, Rui Hou
, Mingzhe Zhang
:
FAST: An FHE Accelerator for Scalable-parallelism with Tunable-bit. ISCA 2025: 92-106
[c48]Dian Jiao
, Xianglong Deng
, Zhiwei Wang
, Shengyu Fan
, Yi Chen
, Dan Meng
, Rui Hou
, Mingzhe Zhang
:
Neo: Towards Efficient Fully Homomorphic Encryption Acceleration using Tensor Core. ISCA 2025: 107-121
[c47]Yulan Su, Sisi Zhang, Zechao Lin, Xingbin Wang, Lutan Zhao, Dan Meng, Rui Hou:
Poseidon: A NAS-Based Ensemble Defense Method Against Multiple Perturbations. MMM (3) 2025: 215-228
[c46]Yulan Su, Sisi Zhang, Yan Wang, Xingbin Wang, Lutan Zhao, Dan Meng, Rui Hou:
RobSparse: Automatic Search for GPU-Friendly Robust and Sparse Vision Transformers. MMM (3) 2025: 311-325
[c45]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
The Road to Trust: Building Enclaves within Confidential VMs. NDSS 2025
[c44]Yiming Zhang, Fengwei Zhang, Xiapu Luo, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan, Tao Wei, Zhengyu He:
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone. NDSS 2025
[c43]Lingbo Zhao, Yuhui Zhang, Zhilu Wang, Fengkai Yuan, Rui Hou:
ERW-Radar: An Adaptive Detection System against Evasive Ransomware by Contextual Behavior Detection and Fine-grained Content Analysis. NDSS 2025
[c42]Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. SP 2025: 2827-2845
[i16]Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. CoRR abs/2505.07239 (2025)
[i15]Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou:
CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning. CoRR abs/2508.12264 (2025)
[i14]Ruida Wang, Jikang Bai, Xuan Shen, Xianhui Lu, Zhihao Li, Binwu Xiang, Zhiwei Wang, Hongyu Wang, Lutan Zhao, Kunpeng Wang, Rui Hou:
Tetris: Versatile TFHE LUT and Its Application to FHE Instruction Set Architecture. IACR Cryptol. ePrint Arch. 2025: 1623 (2025)
[i13]Ruida Wang, Jikang Bai, Yijian Liu, Xinxuan Zhang, Xianhui Lu, Lutan Zhao, Kunpeng Wang, Rui Hou:
Bootstrapping over Free ℛ-Module. IACR Cryptol. ePrint Arch. 2025: 1753 (2025)- 2024
[j19]Xingbin Wang
, Yan Wang
, Yulan Su
, Sisi Zhang
, Dan Meng, Rui Hou
:
EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3088-3101 (2024)
[j18]Zhihao Li, Xianhui Lu, Zhiwei Wang, Ruida Wang, Ying Liu, Yinhang Zheng, Lutan Zhao, Kunpeng Wang, Rui Hou:
Faster NTRU-based Bootstrapping in less than 4 ms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 418-451 (2024)
[j17]Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 258-284 (2024)
[j16]Xingbin Wang
, Boyan Zhao
, Yulan Su
, Sisi Zhang
, Fengkai Yuan
, Jun Zhang
, Dan Meng
, Rui Hou
:
A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks. ACM Trans. Embed. Comput. Syst. 23(5): 79:1-79:28 (2024)
[j15]Peng Li, Cheng Che
, Rui Hou:
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning. J. Supercomput. 80(5): 5815-5831 (2024)
[c41]Yifan Zhu
, Peinan Li
, Yunkai Bai
, Yubiao Huang
, Shiwen Wang
, Xingbin Wang
, Dan Meng
, Rui Hou
:
EnTurbo: Accelerate Confidential Serverless Computing via Parallelizing Enclave Startup Procedure. DAC 2024: 2:1-2:6
[c40]Yunkai Bai
, Peinan Li
, Yubiao Huang
, Shiwen Wang
, Xingbin Wang
, Dan Meng
, Rui Hou
:
SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks. DAC 2024: 3:1-3:6
[c39]Yan Wang
, Xingbin Wang
, Zechao Lin
, Yulan Su
, Sisi Zhang
, Rui Hou
, Dan Meng
:
Garrison: A High-Performance GPU-Accelerated Inference System for Adversarial Ensemble Defense. DAC 2024: 5:1-5:6
[c38]Xingbin Wang
, Dan Meng, Rui Hou, Yan Wang:
FakeGuard: Novel Architecture Support for Deepfake Detection Networks. Euro-Par (2) 2024: 32-46
[c37]Yuhui Zhang, Lutan Zhao, Cheng Che
, XiaoFeng Wang, Dan Meng, Rui Hou:
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training. HPCA 2024: 817-831
[c36]Yunkai Bai, Peinan Li, Yubiao Huang, Michael C. Huang, Shijun Zhao, Lutan Zhao, Fengwei Zhang, Dan Meng, Rui Hou:
HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management. MICRO 2024: 105-120
[c35]Xianglong Deng, Shengyu Fan, Zhicheng Hu, Zhuoyu Tian, Zihao Yang, Jiangrui Yu, Dingyuan Cao, Dan Meng, Rui Hou, Meng Li, Qian Lou, Mingzhe Zhang:
Trinity: A General Purpose FHE Accelerator. MICRO 2024: 338-351
[c34]Feng He, Shijun Zhao, Dan Meng, Rui Hou:
MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels. TrustCom 2024: 37-48
[i12]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024)
[i11]Shengyu Fan, Xianglong Deng, Zhuoyu Tian, Zhicheng Hu, Liang Chang, Rui Hou, Dan Meng, Mingzhe Zhang:
Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption. CoRR abs/2403.10188 (2024)
[i10]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024)
[i9]Zhiwei Wang, Haoqi He, Lutan Zhao, Peinan Li, Zhihao Li, Dan Meng, Rui Hou:
Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs. CoRR abs/2410.05934 (2024)
[i8]Xianglong Deng, Shengyu Fan, Zhicheng Hu, Zhuoyu Tian, Zihao Yang, Jiangrui Yu, Dingyuan Cao, Dan Meng, Rui Hou, Meng Li, Qian Lou, Mingzhe Zhang:
Trinity: A General Purpose FHE Accelerator. CoRR abs/2410.13405 (2024)
[i7]Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. IACR Cryptol. ePrint Arch. 2024: 57 (2024)- 2023
[j14]Fengkai Yuan
, Kai Wang
, Jiameng Ying, Rui Hou
, Lutan Zhao, Peinan Li
, Yifan Zhu, Zhenzhou Ji
, Dan Meng:
Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1280-1294 (2023)
[j13]Zhiwei Wang
, Peinan Li
, Rui Hou
, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023)
[c33]Yifan Zhu, Peinan Li, Lutan Zhao, Dan Meng, Rui Hou:
ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE. DAC 2023: 1-6
[c32]Shengyu Fan, Zhiwei Wang, Weizhi Xu
, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. HPCA 2023: 922-934
[c31]Zhiwei Wang, Peinan Li, Rui Hou, Dan Meng:
NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs. ICCD 2023: 357-365- 2022
[j12]Jiameng Ying
, Rui Hou, Lutan Zhao, Fengkai Yuan, Penghui Zhao, Dan Meng:
CPP: A lightweight memory page management extension to prevent code pointer leakage. J. Syst. Archit. 130: 102679 (2022)
[j11]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks. Microprocess. Microsystems 89: 104420 (2022)
[c30]Jing Li
, Sisi Zhang
, Xingbin Wang
, Rui Hou
:
Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples Using Mimetic Feature for 3D Humans. Inscrypt 2022: 429-444
[c29]Peinan Li, Rui Hou, Lutan Zhao
, Yifan Zhu, Dan Meng:
Conditional address propagation: an efficient defense mechanism against transient execution attacks. DAC 2022: 547-552
[c28]Lutan Zhao
, Peinan Li, Rui Hou, Michael C. Huang
, Xuehai Qian, Lixin Zhang, Dan Meng:
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor. HPCA 2022: 346-359
[c27]Chaochao Zhang, Rui Hou:
LAK: A Low-Overhead Lock-and-Key Based Schema for GPU Memory Safety. ICCD 2022: 705-713
[c26]Jianping Zhu, Rui Hou, Dan Meng:
TACC: a secure accelerator enclave for AI workloads. SYSTOR 2022: 58-71
[c25]Chaochao Zhang, Rui Hou:
Security Support on Memory Controller for Heap Memory Safety. TrustCom 2022: 248-257
[i6]Depeng Liu, Lutan Zhao, Pengfei Yang, Bow-Yaw Wang, Rui Hou, Lijun Zhang, Naijun Zhan:
Defensive Design of Saturating Counters Based on Differential Privacy. CoRR abs/2206.00279 (2022)
[i5]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022)
[i4]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. CoRR abs/2212.14191 (2022)- 2021
[j10]Lutan Zhao, Rui Hou, Kai Wang, Yu-Lan Su, Peinan Li, Dan Meng:
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor. J. Comput. Sci. Technol. 36(5): 1022-1036 (2021)
[j9]Qianlong Zhang
, Xiufeng Sui, Rui Hou, Lixin Zhang:
Line-Coalescing DRAM Cache. Sustain. Comput. Informatics Syst. 29(Part): 100449 (2021)
[j8]Lutan Zhao
, Peinan Li
, Rui Hou
, Michael C. Huang
, Peng Liu
, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021)
[j7]Kai Wang
, Fengkai Yuan, Lutan Zhao, Rui Hou
, Zhenzhou Ji
, Dan Meng:
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection. IEEE Trans. Very Large Scale Integr. Syst. 29(2): 347-358 (2021)
[c24]Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. CF 2021: 161-168
[c23]Lutan Zhao
, Peinan Li, Rui Hou, Michael C. Huang
, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. DAC 2021: 1267-1272
[c22]Fengkai Yuan, Kai Wang
, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad
, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. DATE 2021: 1697-1702
[c21]Chaochao Zhang, Amro Awad
, Rui Hou, Mazen Al-Wadi:
Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection. HPCC/DSS/SmartCity/DependSys 2021: 405-414
[c20]Xingbin Wang
, Boyan Zhao, Rui Hou, Amro Awad
, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789- 2020
[j6]Dan Meng, Rui Hou
, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020)
[c19]Xingbin Wang
, Rui Hou, Boyan Zhao, Fengkai Yuan, Jun Zhang, Dan Meng, Xuehai Qian:
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. ASPLOS 2020: 19-34
[c18]Xiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng:
RCecker: a lightweight rule-based mechanism for backward control-flow integrity. CF 2020: 158-164
[c17]Xingbin Wang
, Boyan Zhao, Rui Hou, Dan Meng:
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure. DATE 2020: 192-197
[c16]Kai Wang
, Fengkai Yuan, Rui Hou, Zhenzhou Ji, Dan Meng:
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks. DATE 2020: 1408-1413
[c15]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465
[i3]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. CoRR abs/2005.08183 (2020)
[i2]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. CoRR abs/2012.01046 (2020)
2010 – 2019
- 2019
[j5]Jun Zhang, Rui Hou, Wei Song
, Sally A. McKee, Zhen Jia, Chen Zheng, Mingyu Chen, Lixin Zhang, Dan Meng:
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks. ACM Trans. Archit. Code Optim. 15(4): 50:1-50:21 (2019)
[c14]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41
[c13]Xingbin Wang
, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. CF 2019: 190-196
[c12]Peinan Li, Lutan Zhao
, Rui Hou, Lixin Zhang, Dan Meng:
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. HPCA 2019: 264-276
[i1]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Lutan Zhao, Fengkai Yuan, Peinan Li, Zhongpu Wang, Boyan Zhao, Lixin Zhang, Dan Meng:
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment. CoRR abs/1904.04782 (2019)- 2018
[j4]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018)
[j3]Mingliang Xu
, Chunxu Li, Pei Lv
, Nie Lin, Rui Hou, Bing Zhou:
An Efficient Method of Crowd Aggregation Computation in Public Areas. IEEE Trans. Circuits Syst. Video Technol. 28(10): 2814-2825 (2018)
[j2]Boyan Zhao
, Rui Hou, Jianbo Dong, Michael C. Huang
, Sally A. McKee, Qianlong Zhang, Yueji Liu, Ye Li, Lixin Zhang, Dan Meng:
Venice: An Effective Resource Sharing Architecture for Data Center Servers. ACM Trans. Comput. Syst. 36(1): 2:1-2:26 (2018)
[c11]Jun Zhang, Rui Hou, Wei Song, Zhiyuan Zhan, Boyan Zhao, Mingyu Chen, Dan Meng:
Stateful Forward-Edge CFI Enforcement with Intel MPX. ACA 2018: 79-94- 2017
[c10]Jun Zhang, Rui Hou, Junfeng Fan, Ke Liu, Lixin Zhang, Sally A. McKee:
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity. Conf. Computing Frontiers 2017: 27-34- 2016
[c9]Liuhang Zhang, Rui Hou, Sally A. McKee, Jianbo Dong, Lixin Zhang:
P-Socket: optimizing a communication library for a PCIe-based intra-rack interconnect. Conf. Computing Frontiers 2016: 145-153
[c8]Jianbo Dong, Rui Hou, Michael C. Huang
, Tao Jiang, Boyan Zhao, Sally A. McKee, Haibin Wang, Xiaosong Cui, Lixin Zhang:
Venice: Exploring server architectures for effective resource sharing. HPCA 2016: 507-518- 2015
[j1]Tao Jiang, Rui Hou, Jianbo Dong, Lin Chai, Sally A. McKee, Bin Tian, Lixin Zhang, Ninghui Sun:
Adapting Memory Hierarchies for Emerging Datacenter Interconnects. J. Comput. Sci. Technol. 30(1): 97-109 (2015)- 2014
[c7]Tao Jiang, Qianlong Zhang, Rui Hou, Lin Chai, Sally A. McKee, Zhen Jia, Ninghui Sun:
Understanding the behavior of in-memory computing workloads. IISWC 2014: 22-30- 2013
[c6]Chunkun Bo, Rui Hou, Junmin Wu, Tao Jiang, Liuhang Zhang:
TCNet: cross-node virtual machine communication acceleration. Conf. Computing Frontiers 2013: 33:1-33:9
[c5]Rui Hou, Tao Jiang, Liuhang Zhang, Pengfei Qi, Jianbo Dong, Haibin Wang, Xiongli Gu, Shujie Zhang:
Cost effective data center servers. HPCA 2013: 179-187
[c4]Tao Jiang, Lele Zhang, Rui Hou, Yi Zhang, Qianlong Zhang, Lin Chai, Jing Han, Wuxiong Zhang, Cong Wang, Lixin Zhang:
The ARMv8 simulator. ICS 2013: 477-478
[c3]Cong Wang, Tao Jiang, Rui Hou:
V-OpenCL: a method to use remote GPGPU. ICS 2013: 493-494- 2012
[c2]Tao Jiang, Rui Hou, Lixin Zhang, Ke Zhang, Licheng Chen, Mingyu Chen, Ninghui Sun:
Micro-architectural characterization of desktop cloud workloads. IISWC 2012: 131-140- 2011
[c1]Rui Hou, Lixin Zhang, Michael C. Huang
, Kun Wang, Hubertus Franke, Yi Ge, Xiaotao Chang:
Efficient data streaming with on-chip accelerators: Opportunities and challenges. HPCA 2011: 312-320
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-11 02:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







