Suivre
Zeran Zhu
Zeran Zhu
Affiliation inconnue
Adresse e-mail validée de illinois.edu
Titre
Citée par
Citée par
Année
Smart malware that uses leaked control data of robotic applications: The case of {Raven-II} surgical robots
K Chung, X Li, P Tang, Z Zhu, ZT Kalbarczyk, RK Iyer, T Kesavadas
22nd International symposium on research in attacks, intrusions and defenses …, 2019
342019
Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality 1
K Chung, X Li, P Tang, Z Zhu, ZT Kalbarczyk, T Kesavadas, RK Iyer
Game Theory and Machine Learning for Cyber Security, 289-316, 2021
52021
Having it all: Infusing parallel computational thinking in the lower-level computer engineering curriculum using extended learning modules
Z Zhu, UK Bhowmik, Y Wang, Z Cheng, YW Chen
2021 ASEE Virtual Annual Conference Content Access, 2021
32021
Hardware implementation and evaluation of the Spandex cache coherence protocol
Z Zhu
University of Illinois at Urbana-Champaign, 2021
22021
Mozart: Taming taxes and composing accelerators with shared-memory
V Suresh, B Mishra, Y Jing, Z Zhu, N Jin, C Block, P Mantovani, D Giri, ...
Proceedings of the 2024 International Conference on Parallel Architectures …, 2024
12024
Smart Malware using Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots.
K Chung, X Li, P Tang, Z Zhu, Z Kalbarczyk, R Iyer, T Kesavadas
RAID, 2019
12019
ECE 445 Design Document Hawkeye Keyfinders
K Zou, M Sha, Z Zhu
2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–7