关注
Ning Zhang
标题
引用次数
年份
{ARI}: Attestation of Real-time Mission Execution Integrity
J Wang, Y Wang, A Li, Y Xiao, R Zhang, W Lou, YT Hou, N Zhang
32nd USENIX Security Symposium (USENIX Security 23), 2761-2778, 2023
92023
{SMACK}: Semantically Meaningful Adversarial Audio Attack
Z Yu, Y Chang, N Zhang, C Xiao
32nd USENIX Security Symposium (USENIX Security 23), 3799-3816, 2023
122023
{XCheck}: Verifying Integrity of 3D Printed {Patient-Specific} Devices via Computing Tomography
Z Yu, Y Chang, S Zhai, N Deily, T Ju, XF Wang, U Jammalamadaka, ...
32nd USENIX Security Symposium (USENIX Security 23), 2815-2832, 2023
2023
A Capture The Flag (CTF) platform and exercises for an intro to computer security class
Z Kaplan, N Zhang, SV Cole
Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022
72022
A decentralized truth discovery approach to the blockchain oracle problem
Y Xiao, N Zhang, W Lou, YT Hou
IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023
32023
A Procrastinating Control-Flow Integrity Framework for Periodic Real-Time Systems
T Mishra, J Wang, T Chantem, R Gerdes, N Zhang
Proceedings of the 31st International Conference on Real-Time Networks and …, 2023
2023
A secure remote monitoring framework supporting efficient fine-grained access control and data processing in IoT
Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou
International Conference on Security and Privacy in Communication Systems, 3-21, 2018
102018
A survey of distributed consensus protocols for blockchain networks
Y Xiao, N Zhang, W Lou, YT Hou
IEEE Communications Surveys & Tutorials 22 (2), 1432-1465, 2020
8932020
Achieving Cyber-Resilience for Power Systems using a Learning, Model-Assisted Blockchain Framework
R Gerdes, H Wang, M Li, N Zhang, S Adams, T Erpek, A Giani, ...
Virginia Polytechnic Inst. and State Univ.(Virginia Tech), Blacksburg, VA …, 2024
2024
Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference
A Li, M Sudvarg, H Liu, Z Yu, C Gill, N Zhang
An empirical study of performance interference: Timing violation patterns and impacts
A Li, J Wang, S Baruah, B Sinopoli, N Zhang
Proceedings of the 30th IEEE Real-Time and Embedded Technology and …, 2024
32024
Antifake: Using adversarial audio to prevent unauthorized speech synthesis
Z Yu, S Zhai, N Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
52023
Attack and Defense with Hardware-Aided Security
N Zhang
Virginia Tech, 2016
2016
AugAuth: Shoulder-Surfing Resistant Authentication for Augmented Reality
R Zhang, N Zhang, C Du, W Lou, YT Hou, Y Kawamoto
International Conference on Communications (ICC), 2017
222017
Bd-sas: Enabling dynamic spectrum sharing in low-trust environment
Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed
IEEE Transactions on Cognitive Communications and Networking 9 (4), 842-856, 2023
52023
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory
W Yan, H Zhu, Z Yu, F Tehranipoor, J Chandy, N Zhang, X Zhang
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
22020
Black Penguin: On the Feasibility of Detecting Intrusion with Homogeneous Memory
N Zhang, R Zhang, Q Yan, W Lou, YT Hou, D Yao
Network Forensic Workshop (NFW), IEEE Conference on Communication and …, 2017
2017
CacheKit: Evading memory introspection using cache incoherence
N Zhang, H Sun, K Sun, W Lou, YT Hou
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 337-352, 2016
562016
Case: Cache-assisted Secure Execution on ARM Devices
N Zhang, K Sun, W Lou, YT Hou
Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016
126*2016
ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems
C Zhou, Q Yan, Z Yu, E Dixit, N Zhang, H Zeng, AS Ghanhdari
arXiv preprint arXiv:2305.08037, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20