{ARI}: Attestation of Real-time Mission Execution Integrity J Wang, Y Wang, A Li, Y Xiao, R Zhang, W Lou, YT Hou, N Zhang 32nd USENIX Security Symposium (USENIX Security 23), 2761-2778, 2023 | 9 | 2023 |
{SMACK}: Semantically Meaningful Adversarial Audio Attack Z Yu, Y Chang, N Zhang, C Xiao 32nd USENIX Security Symposium (USENIX Security 23), 3799-3816, 2023 | 12 | 2023 |
{XCheck}: Verifying Integrity of 3D Printed {Patient-Specific} Devices via Computing Tomography Z Yu, Y Chang, S Zhai, N Deily, T Ju, XF Wang, U Jammalamadaka, ... 32nd USENIX Security Symposium (USENIX Security 23), 2815-2832, 2023 | | 2023 |
A Capture The Flag (CTF) platform and exercises for an intro to computer security class Z Kaplan, N Zhang, SV Cole Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022 | 7 | 2022 |
A decentralized truth discovery approach to the blockchain oracle problem Y Xiao, N Zhang, W Lou, YT Hou IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023 | 3 | 2023 |
A Procrastinating Control-Flow Integrity Framework for Periodic Real-Time Systems T Mishra, J Wang, T Chantem, R Gerdes, N Zhang Proceedings of the 31st International Conference on Real-Time Networks and …, 2023 | | 2023 |
A secure remote monitoring framework supporting efficient fine-grained access control and data processing in IoT Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou International Conference on Security and Privacy in Communication Systems, 3-21, 2018 | 10 | 2018 |
A survey of distributed consensus protocols for blockchain networks Y Xiao, N Zhang, W Lou, YT Hou IEEE Communications Surveys & Tutorials 22 (2), 1432-1465, 2020 | 893 | 2020 |
Achieving Cyber-Resilience for Power Systems using a Learning, Model-Assisted Blockchain Framework R Gerdes, H Wang, M Li, N Zhang, S Adams, T Erpek, A Giani, ... Virginia Polytechnic Inst. and State Univ.(Virginia Tech), Blacksburg, VA …, 2024 | | 2024 |
Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference A Li, M Sudvarg, H Liu, Z Yu, C Gill, N Zhang | | |
An empirical study of performance interference: Timing violation patterns and impacts A Li, J Wang, S Baruah, B Sinopoli, N Zhang Proceedings of the 30th IEEE Real-Time and Embedded Technology and …, 2024 | 3 | 2024 |
Antifake: Using adversarial audio to prevent unauthorized speech synthesis Z Yu, S Zhai, N Zhang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 5 | 2023 |
Attack and Defense with Hardware-Aided Security N Zhang Virginia Tech, 2016 | | 2016 |
AugAuth: Shoulder-Surfing Resistant Authentication for Augmented Reality R Zhang, N Zhang, C Du, W Lou, YT Hou, Y Kawamoto International Conference on Communications (ICC), 2017 | 22 | 2017 |
Bd-sas: Enabling dynamic spectrum sharing in low-trust environment Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed IEEE Transactions on Cognitive Communications and Networking 9 (4), 842-856, 2023 | 5 | 2023 |
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory W Yan, H Zhu, Z Yu, F Tehranipoor, J Chandy, N Zhang, X Zhang 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 2 | 2020 |
Black Penguin: On the Feasibility of Detecting Intrusion with Homogeneous Memory N Zhang, R Zhang, Q Yan, W Lou, YT Hou, D Yao Network Forensic Workshop (NFW), IEEE Conference on Communication and …, 2017 | | 2017 |
CacheKit: Evading memory introspection using cache incoherence N Zhang, H Sun, K Sun, W Lou, YT Hou 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 337-352, 2016 | 56 | 2016 |
Case: Cache-assisted Secure Execution on ARM Devices N Zhang, K Sun, W Lou, YT Hou Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016 | 126* | 2016 |
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems C Zhou, Q Yan, Z Yu, E Dixit, N Zhang, H Zeng, AS Ghanhdari arXiv preprint arXiv:2305.08037, 2023 | 2 | 2023 |