A survey of distributed consensus protocols for blockchain networks Y Xiao, N Zhang, W Lou, YT Hou IEEE Communications Surveys & Tutorials 22 (2), 1432-1465, 2020 | 881 | 2020 |
Truspy: Cache Side-channel Information Leakage from the Secure World on ARM Devices N Zhang, K Sun, D Shands, W Lou, YT Hou Cryptology ePrint Archive, 2016 | 189* | 2016 |
Case: Cache-assisted Secure Execution on ARM Devices N Zhang, K Sun, W Lou, YT Hou Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016 | 125* | 2016 |
Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided waves Q Yan, K Liu, Q Zhou, H Guo, N Zhang Network and Distributed Systems Security (NDSS) Symposium, 2020 | 116 | 2020 |
Privacyguard: Enforcing private data usage control with blockchain and attested off-chain contract execution Y Xiao, N Zhang, J Li, W Lou, YT Hou Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 99* | 2020 |
Improving Robustness of {ML} Classifiers against Realizable Evasion Attacks Using Conserved Features L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik 28th {USENIX} Security Symposium ({USENIX} Security 19), 285-302, 2019 | 99* | 2019 |
Efficient signature generation for classifying cross-architecture IoT malware M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 94 | 2018 |
Distributed data mining with differential privacy N Zhang, M Li, W Lou 2011 IEEE international conference on Communications (ICC), 1-5, 2011 | 89 | 2011 |
Distributed consensus protocols and algorithms Y Xiao, N Zhang, J Li, W Lou, YT Hou Blockchain for Distributed Systems Security 25, 40, 2019 | 76 | 2019 |
CacheKit: Evading memory introspection using cache incoherence N Zhang, H Sun, K Sun, W Lou, YT Hou 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 337-352, 2016 | 56 | 2016 |
Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou IEEE Transactions on Information Forensics and Security 14 (7), 1830-1842, 2018 | 55 | 2018 |
Modeling the impact of network connectivity on consensus security of proof-of-work blockchain Y Xiao, N Zhang, W Lou, YT Hou IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1648-1657, 2020 | 47 | 2020 |
RusTEE: developing memory-safe ARM TrustZone applications S Wan, M Sun, K Sun, N Zhang, X He Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 42 | 2020 |
Looks good to me: Authentication for augmented reality E Gaebel, N Zhang, W Lou, YT Hou Proceedings of the 6th international workshop on trustworthy embedded …, 2016 | 36 | 2016 |
Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone J Wang, A Li, H Li, C Lu, N Zhang 2022 IEEE Symposium on Security and Privacy (SP), 352-369, 2022 | 35 | 2022 |
Decentralized spectrum access system: Vision, challenges, and a blockchain solution Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed IEEE Wireless Communications 29 (1), 220-228, 2022 | 31 | 2022 |
Security and privacy in the emerging cyber-physical world: A survey Z Yu, Z Kaplan, Q Yan, N Zhang IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021 | 30 | 2021 |
PCBChain: Lightweight reconfigurable blockchain primitives for secure IoT applications W Yan, N Zhang, LL Njilla, X Zhang IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (10 …, 2020 | 28 | 2020 |
When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data W Sun, N Zhang, W Lou, YT Hou International Conference on Computer Communications (INFOCOM), 2017 | 28 | 2017 |
Memory forensic challenges under misused architectural features N Zhang, R Zhang, K Sun, W Lou, YT Hou, S Jajodia IEEE Transactions on Information Forensics and Security 13 (9), 2345-2358, 2018 | 23 | 2018 |