关注
Jiliang Zhang
Jiliang Zhang
Professor, Hunan University
在 hnu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Adversarial Examples: Opportunities and Challenges
J Zhang, C Li
IEEE Transactions on Neural Networks and Learning Systems, 2020
2892020
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
2422020
A Survey of Hardware Trojan Threat and Defense
H Lia, Q Liua, J Zhang
Integration, the VLSI Journal, 2016
1972016
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-per-Device Licensing
J Zhang, Y Lin, Y Lyu, G Qu
IEEE Transactions on Information Forensics and Security, 2015
1902015
A Practical Logic Obfuscation Technique for Hardware Security
J Zhang
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24 (3 …, 2016
1862016
A survey on silicon PUFs and recent advances in ring oscillator PUFs
JL Zhang, G Qu, YQ Lv, Q Zhou
Journal of computer science and technology 29 (4), 664-678, 2014
1612014
Physical Unclonable Function-based Key Sharing via Machine Leaning for IoT Security
J Zhang, G Qu
IEEE Transactions on Industrial Electronics, 2020
1502020
Approximation Attacks on Strong PUFs
J Shi, Y Lu, J Zhang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
1342020
Set-based obfuscation for strong PUFs against machine learning attacks
J Zhang, C Shen
IEEE transactions on circuits and systems I: regular papers 68 (1), 288-300, 2021
1082021
Artificial intelligence security: Threats and countermeasures
Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li
ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021
1072021
Voltage over-scaling-based lightweight authentication for IoT security
J Zhang, C Shen, H Su, MT Arafin, G Qu
IEEE Transactions on Computers 71 (2), 323-336, 2022
972022
Recent attacks and defenses on FPGA-based systems
J Zhang, G Qu
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 12 (3), 1-24, 2019
862019
A novel method for malware detection on ML-based visualization technique
X Liu, Y Lin, H Li, J Zhang
Computers & Security 89, 101682, 2020
802020
APMSA: Adversarial perturbation against model stealing attacks
J Zhang, S Peng, Y Gao, Z Zhang, Q Hong
IEEE Transactions on Information Forensics and Security 18, 1667-1679, 2023
792023
CT PUF: Configurable tristate PUF against machine learning attacks for IoT security
J Zhang, C Shen, Z Guo, Q Wu, W Chang
IEEE Internet of Things Journal 9 (16), 14452-14462, 2021
662021
HCIC: Hardware-assisted Control-flow Integrity Checking
J Zhang, B Qi, Z Qin, G Qu
IEEE Internet of Things Journal 6 (1), 458-471, 2019
662019
T2FA: Transparent two-factor authentication
J Zhang, X Tan, X Wang, A Yan, Z Qin
IEEE Access 6, 32677-32686, 2018
632018
ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples
X Liu, J Zhang, Y Lin, H Li
Proceedings of the International Symposium on Quality of Service, 1-10, 2019
622019
A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network
X Tan, J Zhang, Y Zhang, Z Qin, Y Ding, X Wang
Tsinghua Science and Technology 26 (1), 36-47, 2020
582020
A double-node-upset self-recoverable latch design for high performance and low power application
A Yan, K Yang, Z Huang, J Zhang, J Cui, X Fang, M Yi, X Wen
IEEE Transactions on Circuits and Systems II: Express Briefs 66 (2), 287-291, 2018
532018
系统目前无法执行此操作,请稍后再试。
文章 1–20