Adversarial Examples: Opportunities and Challenges J Zhang, C Li IEEE Transactions on Neural Networks and Learning Systems, 2020 | 289 | 2020 |
Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 242 | 2020 |
A Survey of Hardware Trojan Threat and Defense H Lia, Q Liua, J Zhang Integration, the VLSI Journal, 2016 | 197 | 2016 |
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-per-Device Licensing J Zhang, Y Lin, Y Lyu, G Qu IEEE Transactions on Information Forensics and Security, 2015 | 190 | 2015 |
A Practical Logic Obfuscation Technique for Hardware Security J Zhang IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24 (3 …, 2016 | 186 | 2016 |
A survey on silicon PUFs and recent advances in ring oscillator PUFs JL Zhang, G Qu, YQ Lv, Q Zhou Journal of computer science and technology 29 (4), 664-678, 2014 | 161 | 2014 |
Physical Unclonable Function-based Key Sharing via Machine Leaning for IoT Security J Zhang, G Qu IEEE Transactions on Industrial Electronics, 2020 | 150 | 2020 |
Approximation Attacks on Strong PUFs J Shi, Y Lu, J Zhang IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020 | 134 | 2020 |
Set-based obfuscation for strong PUFs against machine learning attacks J Zhang, C Shen IEEE transactions on circuits and systems I: regular papers 68 (1), 288-300, 2021 | 108 | 2021 |
Artificial intelligence security: Threats and countermeasures Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021 | 107 | 2021 |
Voltage over-scaling-based lightweight authentication for IoT security J Zhang, C Shen, H Su, MT Arafin, G Qu IEEE Transactions on Computers 71 (2), 323-336, 2022 | 97 | 2022 |
Recent attacks and defenses on FPGA-based systems J Zhang, G Qu ACM Transactions on Reconfigurable Technology and Systems (TRETS) 12 (3), 1-24, 2019 | 86 | 2019 |
A novel method for malware detection on ML-based visualization technique X Liu, Y Lin, H Li, J Zhang Computers & Security 89, 101682, 2020 | 80 | 2020 |
APMSA: Adversarial perturbation against model stealing attacks J Zhang, S Peng, Y Gao, Z Zhang, Q Hong IEEE Transactions on Information Forensics and Security 18, 1667-1679, 2023 | 79 | 2023 |
CT PUF: Configurable tristate PUF against machine learning attacks for IoT security J Zhang, C Shen, Z Guo, Q Wu, W Chang IEEE Internet of Things Journal 9 (16), 14452-14462, 2021 | 66 | 2021 |
HCIC: Hardware-assisted Control-flow Integrity Checking J Zhang, B Qi, Z Qin, G Qu IEEE Internet of Things Journal 6 (1), 458-471, 2019 | 66 | 2019 |
T2FA: Transparent two-factor authentication J Zhang, X Tan, X Wang, A Yan, Z Qin IEEE Access 6, 32677-32686, 2018 | 63 | 2018 |
ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples X Liu, J Zhang, Y Lin, H Li Proceedings of the International Symposium on Quality of Service, 1-10, 2019 | 62 | 2019 |
A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network X Tan, J Zhang, Y Zhang, Z Qin, Y Ding, X Wang Tsinghua Science and Technology 26 (1), 36-47, 2020 | 58 | 2020 |
A double-node-upset self-recoverable latch design for high performance and low power application A Yan, K Yang, Z Huang, J Zhang, J Cui, X Fang, M Yi, X Wen IEEE Transactions on Circuits and Systems II: Express Briefs 66 (2), 287-291, 2018 | 53 | 2018 |