default search action
Rui Hou 0001
Person information
- affiliation: Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Rui Hou — disambiguation page
- Rui Hou 0002 — Duke University, Durham, NC, USA
- Rui Hou 0003 — South-Central University for Nationalities, Wuhan, Hubei, China
- Rui Hou 0004 — North China Electric Power University, Beijing, China
- Rui Hou 0005 — Chengdu University of Technology, Chengdu, China
- Rui Hou 0006 — Guangdong University of Technology, Guangzhou, China
- Rui Hou 0007 — University of Michigan, Ann Arbor, MI, USA
- Rui Hou 0008 — Niantic Labs, Sunnyvale, CA, USA (and 1 more)
- Rui Hou 0009 — Guangdong University of Technology, Guangzhou, Guangdong, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Xingbin Wang, Yan Wang, Yulan Su, Sisi Zhang, Dan Meng, Rui Hou:
EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3088-3101 (2024) - [j18]Zhihao Li, Xianhui Lu, Zhiwei Wang, Ruida Wang, Ying Liu, Yinhang Zheng, Lutan Zhao, Kunpeng Wang, Rui Hou:
Faster NTRU-based Bootstrapping in less than 4 ms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 418-451 (2024) - [j17]Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 258-284 (2024) - [j16]Xingbin Wang, Boyan Zhao, Yulan Su, Sisi Zhang, Fengkai Yuan, Jun Zhang, Dan Meng, Rui Hou:
A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks. ACM Trans. Embed. Comput. Syst. 23(5): 79:1-79:28 (2024) - [j15]Peng Li, Cheng Che, Rui Hou:
Nacc-Guard: a lightweight DNN accelerator architecture for secure deep learning. J. Supercomput. 80(5): 5815-5831 (2024) - [c38]Yifan Zhu, Peinan Li, Yunkai Bai, Yubiao Huang, Shiwen Wang, Xingbin Wang, Dan Meng, Rui Hou:
EnTurbo: Accelerate Confidential Serverless Computing via Parallelizing Enclave Startup Procedure. DAC 2024: 2:1-2:6 - [c37]Yunkai Bai, Peinan Li, Yubiao Huang, Shiwen Wang, Xingbin Wang, Dan Meng, Rui Hou:
SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks. DAC 2024: 3:1-3:6 - [c36]Yan Wang, Xingbin Wang, Zechao Lin, Yulan Su, Sisi Zhang, Rui Hou, Dan Meng:
Garrison: A High-Performance GPU-Accelerated Inference System for Adversarial Ensemble Defense. DAC 2024: 5:1-5:6 - [c35]Xingbin Wang, Dan Meng, Rui Hou, Yan Wang:
FakeGuard: Novel Architecture Support for Deepfake Detection Networks. Euro-Par (2) 2024: 32-46 - [c34]Yuhui Zhang, Lutan Zhao, Cheng Che, XiaoFeng Wang, Dan Meng, Rui Hou:
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training. HPCA 2024: 817-831 - [i11]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - [i10]Shengyu Fan, Xianglong Deng, Zhuoyu Tian, Zhicheng Hu, Liang Chang, Rui Hou, Dan Meng, Mingzhe Zhang:
Taiyi: A high-performance CKKS accelerator for Practical Fully Homomorphic Encryption. CoRR abs/2403.10188 (2024) - [i9]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - [i8]Zhiwei Wang, Haoqi He, Lutan Zhao, Peinan Li, Zhihao Li, Dan Meng, Rui Hou:
Chameleon: An Efficient FHE Scheme Switching Acceleration on GPUs. CoRR abs/2410.05934 (2024) - [i7]Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. IACR Cryptol. ePrint Arch. 2024: 57 (2024) - 2023
- [j14]Fengkai Yuan, Kai Wang, Jiameng Ying, Rui Hou, Lutan Zhao, Peinan Li, Yifan Zhu, Zhenzhou Ji, Dan Meng:
Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(4): 1280-1294 (2023) - [j13]Zhiwei Wang, Peinan Li, Rui Hou, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023) - [c33]Yifan Zhu, Peinan Li, Lutan Zhao, Dan Meng, Rui Hou:
ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE. DAC 2023: 1-6 - [c32]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. HPCA 2023: 922-934 - [c31]Zhiwei Wang, Peinan Li, Rui Hou, Dan Meng:
NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs. ICCD 2023: 357-365 - 2022
- [j12]Jiameng Ying, Rui Hou, Lutan Zhao, Fengkai Yuan, Penghui Zhao, Dan Meng:
CPP: A lightweight memory page management extension to prevent code pointer leakage. J. Syst. Archit. 130: 102679 (2022) - [j11]Kai Wang, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Secure hybrid replacement policy: Mitigating conflict-based cache side channel attacks. Microprocess. Microsystems 89: 104420 (2022) - [c30]Jing Li, Sisi Zhang, Xingbin Wang, Rui Hou:
Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples Using Mimetic Feature for 3D Humans. Inscrypt 2022: 429-444 - [c29]Peinan Li, Rui Hou, Lutan Zhao, Yifan Zhu, Dan Meng:
Conditional address propagation: an efficient defense mechanism against transient execution attacks. DAC 2022: 547-552 - [c28]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Xuehai Qian, Lixin Zhang, Dan Meng:
HyBP: Hybrid Isolation-Randomization Secure Branch Predictor. HPCA 2022: 346-359 - [c27]Chaochao Zhang, Rui Hou:
LAK: A Low-Overhead Lock-and-Key Based Schema for GPU Memory Safety. ICCD 2022: 705-713 - [c26]Jianping Zhu, Rui Hou, Dan Meng:
TACC: a secure accelerator enclave for AI workloads. SYSTOR 2022: 58-71 - [c25]Chaochao Zhang, Rui Hou:
Security Support on Memory Controller for Heap Memory Safety. TrustCom 2022: 248-257 - [i6]Depeng Liu, Lutan Zhao, Pengfei Yang, Bow-Yaw Wang, Rui Hou, Lijun Zhang, Naijun Zhan:
Defensive Design of Saturating Counters Based on Differential Privacy. CoRR abs/2206.00279 (2022) - [i5]Wei Song, Rui Hou, Peng Liu, Xiaoxin Li, Peinan Li, Lutan Zhao, Xiaofei Fu, Yifei Sun, Dan Meng:
Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense. CoRR abs/2211.06056 (2022) - [i4]Shengyu Fan, Zhiwei Wang, Weizhi Xu, Rui Hou, Dan Meng, Mingzhe Zhang:
TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. CoRR abs/2212.14191 (2022) - 2021
- [j10]Lutan Zhao, Rui Hou, Kai Wang, Yu-Lan Su, Peinan Li, Dan Meng:
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor. J. Comput. Sci. Technol. 36(5): 1022-1036 (2021) - [j9]Qianlong Zhang, Xiufeng Sui, Rui Hou, Lixin Zhang:
Line-Coalescing DRAM Cache. Sustain. Comput. Informatics Syst. 29(Part): 100449 (2021) - [j8]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Peng Liu, Lixin Zhang, Dan Meng:
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks. IEEE Trans. Computers 70(7): 963-978 (2021) - [j7]Kai Wang, Fengkai Yuan, Lutan Zhao, Rui Hou, Zhenzhou Ji, Dan Meng:
Mitigating Cross-Core Cache Attacks via Suspicious Traffic Detection. IEEE Trans. Very Large Scale Integr. Syst. 29(2): 347-358 (2021) - [c24]Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. CF 2021: 161-168 - [c23]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. DAC 2021: 1267-1272 - [c22]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. DATE 2021: 1697-1702 - [c21]Chaochao Zhang, Amro Awad, Rui Hou, Mazen Al-Wadi:
Punchcard: A Practical Red-Zone Based Scheme for Low-Overhead Heap Protection. HPCC/DSS/SmartCity/DependSys 2021: 405-414 - [c20]Xingbin Wang, Boyan Zhao, Rui Hou, Amro Awad, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - 2020
- [j6]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [c19]Xingbin Wang, Rui Hou, Boyan Zhao, Fengkai Yuan, Jun Zhang, Dan Meng, Xuehai Qian:
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. ASPLOS 2020: 19-34 - [c18]Xiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng:
RCecker: a lightweight rule-based mechanism for backward control-flow integrity. CF 2020: 158-164 - [c17]Xingbin Wang, Boyan Zhao, Rui Hou, Dan Meng:
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure. DATE 2020: 192-197 - [c16]Kai Wang, Fengkai Yuan, Rui Hou, Zhenzhou Ji, Dan Meng:
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks. DATE 2020: 1408-1413 - [c15]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465 - [i3]Lutan Zhao, Peinan Li, Rui Hou, Michael C. Huang, Jiazhen Li, Lixin Zhang, Xuehai Qian, Dan Meng:
A Lightweight Isolation Mechanism for Secure Branch Predictors. CoRR abs/2005.08183 (2020) - [i2]Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng:
PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter. CoRR abs/2012.01046 (2020)
2010 – 2019
- 2019
- [j5]Jun Zhang, Rui Hou, Wei Song, Sally A. McKee, Zhen Jia, Chen Zheng, Mingyu Chen, Lixin Zhang, Dan Meng:
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks. ACM Trans. Archit. Code Optim. 15(4): 50:1-50:21 (2019) - [c14]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41 - [c13]Xingbin Wang, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. CF 2019: 190-196 - [c12]Peinan Li, Lutan Zhao, Rui Hou, Lixin Zhang, Dan Meng:
Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks. HPCA 2019: 264-276 - [i1]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Lutan Zhao, Fengkai Yuan, Peinan Li, Zhongpu Wang, Boyan Zhao, Lixin Zhang, Dan Meng:
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment. CoRR abs/1904.04782 (2019) - 2018
- [j4]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j3]Mingliang Xu, Chunxu Li, Pei Lv, Nie Lin, Rui Hou, Bing Zhou:
An Efficient Method of Crowd Aggregation Computation in Public Areas. IEEE Trans. Circuits Syst. Video Technol. 28(10): 2814-2825 (2018) - [j2]Boyan Zhao, Rui Hou, Jianbo Dong, Michael C. Huang, Sally A. McKee, Qianlong Zhang, Yueji Liu, Ye Li, Lixin Zhang, Dan Meng:
Venice: An Effective Resource Sharing Architecture for Data Center Servers. ACM Trans. Comput. Syst. 36(1): 2:1-2:26 (2018) - [c11]Jun Zhang, Rui Hou, Wei Song, Zhiyuan Zhan, Boyan Zhao, Mingyu Chen, Dan Meng:
Stateful Forward-Edge CFI Enforcement with Intel MPX. ACA 2018: 79-94 - 2017
- [c10]Jun Zhang, Rui Hou, Junfeng Fan, Ke Liu, Lixin Zhang, Sally A. McKee:
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity. Conf. Computing Frontiers 2017: 27-34 - 2016
- [c9]Liuhang Zhang, Rui Hou, Sally A. McKee, Jianbo Dong, Lixin Zhang:
P-Socket: optimizing a communication library for a PCIe-based intra-rack interconnect. Conf. Computing Frontiers 2016: 145-153 - [c8]Jianbo Dong, Rui Hou, Michael C. Huang, Tao Jiang, Boyan Zhao, Sally A. McKee, Haibin Wang, Xiaosong Cui, Lixin Zhang:
Venice: Exploring server architectures for effective resource sharing. HPCA 2016: 507-518 - 2015
- [j1]Tao Jiang, Rui Hou, Jianbo Dong, Lin Chai, Sally A. McKee, Bin Tian, Lixin Zhang, Ninghui Sun:
Adapting Memory Hierarchies for Emerging Datacenter Interconnects. J. Comput. Sci. Technol. 30(1): 97-109 (2015) - 2014
- [c7]Tao Jiang, Qianlong Zhang, Rui Hou, Lin Chai, Sally A. McKee, Zhen Jia, Ninghui Sun:
Understanding the behavior of in-memory computing workloads. IISWC 2014: 22-30 - 2013
- [c6]Chunkun Bo, Rui Hou, Junmin Wu, Tao Jiang, Liuhang Zhang:
TCNet: cross-node virtual machine communication acceleration. Conf. Computing Frontiers 2013: 33:1-33:9 - [c5]Rui Hou, Tao Jiang, Liuhang Zhang, Pengfei Qi, Jianbo Dong, Haibin Wang, Xiongli Gu, Shujie Zhang:
Cost effective data center servers. HPCA 2013: 179-187 - [c4]Tao Jiang, Lele Zhang, Rui Hou, Yi Zhang, Qianlong Zhang, Lin Chai, Jing Han, Wuxiong Zhang, Cong Wang, Lixin Zhang:
The ARMv8 simulator. ICS 2013: 477-478 - [c3]Cong Wang, Tao Jiang, Rui Hou:
V-OpenCL: a method to use remote GPGPU. ICS 2013: 493-494 - 2012
- [c2]Tao Jiang, Rui Hou, Lixin Zhang, Ke Zhang, Licheng Chen, Mingyu Chen, Ninghui Sun:
Micro-architectural characterization of desktop cloud workloads. IISWC 2012: 131-140 - 2011
- [c1]Rui Hou, Lixin Zhang, Michael C. Huang, Kun Wang, Hubertus Franke, Yi Ge, Xiaotao Chang:
Efficient data streaming with on-chip accelerators: Opportunities and challenges. HPCA 2011: 312-320
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint