Smart malware that uses leaked control data of robotic applications: The case of {Raven-II} surgical robots K Chung, X Li, P Tang, Z Zhu, ZT Kalbarczyk, RK Iyer, T Kesavadas 22nd International symposium on research in attacks, intrusions and defenses …, 2019 | 34 | 2019 |
Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality 1 K Chung, X Li, P Tang, Z Zhu, ZT Kalbarczyk, T Kesavadas, RK Iyer Game Theory and Machine Learning for Cyber Security, 289-316, 2021 | 5 | 2021 |
Having it all: Infusing parallel computational thinking in the lower-level computer engineering curriculum using extended learning modules Z Zhu, UK Bhowmik, Y Wang, Z Cheng, YW Chen 2021 ASEE Virtual Annual Conference Content Access, 2021 | 3 | 2021 |
Hardware implementation and evaluation of the Spandex cache coherence protocol Z Zhu University of Illinois at Urbana-Champaign, 2021 | 2 | 2021 |
Mozart: Taming taxes and composing accelerators with shared-memory V Suresh, B Mishra, Y Jing, Z Zhu, N Jin, C Block, P Mantovani, D Giri, ... Proceedings of the 2024 International Conference on Parallel Architectures …, 2024 | 1 | 2024 |
Smart Malware using Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots. K Chung, X Li, P Tang, Z Zhu, Z Kalbarczyk, R Iyer, T Kesavadas RAID, 2019 | 1 | 2019 |
ECE 445 Design Document Hawkeye Keyfinders K Zou, M Sha, Z Zhu | | 2018 |