Weigang Li

Affiliations:
  • Intel Corporation, Shanghai, China


According to our database1, Weigang Li authored at least 13 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022

2021
STYX: A Hierarchical Key Management System for Elastic Content Delivery Networks on Public Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Multi-Task Hierarchical Learning Based Network Traffic Analytics.
Proceedings of the ICC 2021, 2021

2020
QWEB: High-Performance Event-Driven Web Architecture With QAT Acceleration.
IEEE Trans. Parallel Distributed Syst., 2020

NetML: A Challenge for Network Traffic Analytics.
CoRR, 2020

ACETA: Accelerating Encrypted Traffic Analytics on Network Edge.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
QZFS: QAT Accelerated Compression in File System for Application Agnostic and Cost Efficient Data Storage.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

2018
Protecting Your Own Private Key in Cloud: Security, Scalability and Performance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Optimize Genomics Data Compression with Hardware Accelerator.
Proceedings of the 2017 Data Compression Conference, 2017

STYX: a trusted and accelerated hierarchical SSL key management and distribution system for cloud based CDN application.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
Accelerate Data Compression in File System.
Proceedings of the 2016 Data Compression Conference, 2016

A study of HSM based key protection in encryption file system.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016


  Loading...