עקוב אחר
Jiliang Zhang
Jiliang Zhang
Professor, Hunan University
כתובת אימייל מאומתת בדומיין hnu.edu.cn - דף הבית
כותרת
צוטט על ידי
צוטט על ידי
שנה
Adversarial Examples: Opportunities and Challenges
J Zhang, C Li
IEEE Transactions on Neural Networks and Learning Systems, 2020
3012020
Backdoor attacks and countermeasures on deep learning: A comprehensive review
Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim
arXiv preprint arXiv:2007.10760, 2020
2562020
A Survey of Hardware Trojan Threat and Defense
H Lia, Q Liua, J Zhang
Integration, the VLSI Journal, 2016
2032016
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-per-Device Licensing
J Zhang, Y Lin, Y Lyu, G Qu
IEEE Transactions on Information Forensics and Security, 2015
1962015
A Practical Logic Obfuscation Technique for Hardware Security
J Zhang
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24 (3 …, 2016
1842016
A survey on silicon PUFs and recent advances in ring oscillator PUFs
JL Zhang, G Qu, YQ Lv, Q Zhou
Journal of computer science and technology 29 (4), 664-678, 2014
1642014
Physical Unclonable Function-based Key Sharing via Machine Leaning for IoT Security
J Zhang, G Qu
IEEE Transactions on Industrial Electronics, 2020
1512020
Approximation Attacks on Strong PUFs
J Shi, Y Lu, J Zhang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
1392020
Artificial intelligence security: Threats and countermeasures
Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li
ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021
1192021
Set-based obfuscation for strong PUFs against machine learning attacks
J Zhang, C Shen
IEEE transactions on circuits and systems I: regular papers 68 (1), 288-300, 2021
1092021
Voltage over-scaling-based lightweight authentication for IoT security
J Zhang, C Shen, H Su, MT Arafin, G Qu
IEEE Transactions on Computers 71 (2), 323-336, 2022
972022
Recent attacks and defenses on FPGA-based systems
J Zhang, G Qu
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 12 (3), 1-24, 2019
862019
APMSA: Adversarial perturbation against model stealing attacks
J Zhang, S Peng, Y Gao, Z Zhang, Q Hong
IEEE Transactions on Information Forensics and Security 18, 1667-1679, 2023
832023
A novel method for malware detection on ML-based visualization technique
X Liu, Y Lin, H Li, J Zhang
Computers & Security 89, 101682, 2020
832020
CT PUF: Configurable tristate PUF against machine learning attacks for IoT security
J Zhang, C Shen, Z Guo, Q Wu, W Chang
IEEE Internet of Things Journal 9 (16), 14452-14462, 2021
732021
HCIC: Hardware-assisted Control-flow Integrity Checking
J Zhang, B Qi, Z Qin, G Qu
IEEE Internet of Things Journal 6 (1), 458-471, 2019
662019
T2FA: Transparent two-factor authentication
J Zhang, X Tan, X Wang, A Yan, Z Qin
IEEE Access 6, 32677-32686, 2018
652018
ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples
X Liu, J Zhang, Y Lin, H Li
Proceedings of the International Symposium on Quality of Service, 1-10, 2019
632019
A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network
X Tan, J Zhang, Y Zhang, Z Qin, Y Ding, X Wang
Tsinghua Science and Technology 26 (1), 36-47, 2020
572020
A double-node-upset self-recoverable latch design for high performance and low power application
A Yan, K Yang, Z Huang, J Zhang, J Cui, X Fang, M Yi, X Wen
IEEE Transactions on Circuits and Systems II: Express Briefs 66 (2), 287-291, 2018
572018
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20