Optimizing data-intensive systems in disaggregated data centers with teleport Q Zhang, X Chen, S Sankhe, Z Zheng, K Zhong, S Angel, A Chen, V Liu, ... Proceedings of the 2022 International Conference on Management of Data, 1345 …, 2022 | 23 | 2022 |
Mycelium: Large-scale distributed graph queries with differential privacy E Roth, K Newatia, Y Ma, K Zhong, S Angel, A Haeberlen Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021 | 22 | 2021 |
Incremental {Offline/Online}{PIR} Y Ma, K Zhong, T Rabin, S Angel 31st USENIX Security Symposium (USENIX Security 22), 1741-1758, 2022 | 19 | 2022 |
Ibex: Privacy-preserving ad conversion tracking and bidding K Zhong, Y Ma, S Angel Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
Addax: A fast, private, and accountable ad exchange infrastructure K Zhong, Y Ma, Y Mao, S Angel 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023 | 4 | 2023 |
Making Break-ups Less Painful: Source-level Support for Transforming Legacy Software into a Network of Tasks N Sultana, A Rao, Z Jin, P Pashakhanloo, H Zhu, K Zhong, BT Loo Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software …, 2018 | 3 | 2018 |
Towards Practical Application-level Support for Privilege Separation N Sultana, H Zhu, K Zhong, Z Zheng, R Mao, D Chauhan, S Carrasquillo, ... Proceedings of the 38th Annual Computer Security Applications Conference, 71-87, 2022 | 2 | 2022 |
A file system for safely interacting with untrusted {USB} flash drives K Zhong, Z Jiang, K Ma, S Angel 12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 20), 2020 | 2 | 2020 |