default search action
Ning Zhang 0017
Person information
- affiliation: Washington University in St. Louis, St. Louis, MO, USA
- affiliation (PhD 2016): Virginia Polytechnic Institute and State University, Department of Computer Science, Blacksburg, VA, USA
Other persons with the same name
- Ning Zhang — disambiguation page
- Ning Zhang 0001 — The University of Manchester, UK
- Ning Zhang 0002 — Facebook
- Ning Zhang 0003 — Peking University, Beijing, China
- Ning Zhang 0004 — University of Electronic Science & Technology of China, Chengdu, China
- Ning Zhang 0005 — Tianjin University, Department of Biomedical Engineering, Tianjin, China
- Ning Zhang 0006 — Stowers Institute for Medical Research, Kansas City, MO, USA (and 1 more)
- Ning Zhang 0007 — University of Windsor, Canada (and 2 more)
- Ning Zhang 0008 — Tsinghua University, State Key Laboratory of Power Systems, Beijing, China (and 1 more)
- Ning Zhang 0009 — Nanjing Marine Radar Institute, China (and 1 more)
- Ning Zhang 0010 — National Huaqiao University, School of Computer Science and Technology, Xiamen, China
- Ning Zhang 0011 — Beijing Jiaotong University, School of Electrical Engineering, China
- Ning Zhang 0012 — Dalian University of Technology, School of Control Science and Engineering, China
- Ning Zhang 0013 — University of Wisconsin-Madison, Computer Sciences Department, USA
- Ning Zhang 0014 — Snapchat Inc., Venice, CA, USA (and 1 more)
- Ning Zhang 0015 — Chinese Academy of Sciences, Institute of Automation, Beijing, China
- Ning Zhang 0016 — Qingdao University, School of Business, China (and 1 more)
- Ning Zhang 0018 — National University of Singapore, Department of Mathematics, Singapore
- Ning Zhang 0019 — Minzu University of China, Beijing, China
- Ning Zhang 0020 — Yanshan University, School of Economics and Management, Qinhuangdao, China
- Ning Zhang 0021 — Rutgers University, New Brunswick, NJ, USA
- Ning Zhang 0022 — Central University of Finance and Economics, School of Information, Beijing, China
- Ning Zhang 0023 — Ryerson University, Department of Electrical and Computer Engineering, Toronto, ON, Canada (and 1 more)
- Ning Zhang 0024 — Zhejiang Lab, Research Center for Quantum Sensing, Intelligent Perception Research Institute, Hangzhou, China (and 1 more)
- Ning Zhang 0025 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Ning Zhang 0026 — Beijing Normal University, Faculty of Arts and Sciences, Research Center for Digital Publishing and Digital Humanities, Zhuhai, China (and 1 more)
- Ning Zhang 0027 — PLA Communication Network Technology Management Center, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j13]Marion Sudvarg, Zhuoran Sun, Ao Li, Chris Gill, Ning Zhang:
Priority-based concurrency and shared resource access mechanisms for nested intercomponent requests in CAmkES. Real Time Syst. 60(1): 76-107 (2024) - [j12]Haiyan Zhang, Xinghua Li, Jiawei Tang, Chunlei Peng, Yunwei Wang, Ning Zhang, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Hiding in Plain Sight: Adversarial Attack via Style Transfer on Image Borders. IEEE Trans. Computers 73(10): 2405-2419 (2024) - [j11]Xiaohan Zhang, Jinwen Wang, Yueqiang Cheng, Qi Li, Kun Sun, Yao Zheng, Ning Zhang, Xinghua Li:
Interface-Based Side Channel in TEE-Assisted Networked Services. IEEE/ACM Trans. Netw. 32(1): 613-626 (2024) - 2023
- [j10]Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, Jeffrey H. Reed:
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-Trust Environment. IEEE Trans. Cogn. Commun. Netw. 9(4): 842-856 (2023) - 2022
- [j9]Tao Yin, Chenzhengyi Liu, Fangyu Ding, Ziming Feng, Bo Yuan, Ning Zhang:
Graph-based stock correlation and prediction for high-frequency trading systems. Pattern Recognit. 122: 108209 (2022) - [j8]Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, Jeffrey H. Reed:
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution. IEEE Wirel. Commun. 29(1): 220-228 (2022) - 2021
- [j7]Zhiyuan Yu, Zack Kaplan, Qiben Yan, Ning Zhang:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. IEEE Commun. Surv. Tutorials 23(3): 1879-1919 (2021) - [j6]Xinghua Li, Yanbing Ren, Laurence T. Yang, Ning Zhang, Bin Luo, Jian Weng, Ximeng Liu:
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. IEEE Trans. Netw. Sci. Eng. 8(3): 2073-2086 (2021) - 2020
- [j5]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Commun. Surv. Tutorials 22(2): 1432-1465 (2020) - [j4]Wei Yan, Ning Zhang, Laurent L. Njilla, Xuan Zhang:
PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications. IEEE Trans. Very Large Scale Integr. Syst. 28(10): 2196-2209 (2020) - 2019
- [j3]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT. IEEE Trans. Inf. Forensics Secur. 14(7): 1830-1842 (2019) - 2018
- [j2]Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia:
Memory Forensic Challenges Under Misused Architectural Features. IEEE Trans. Inf. Forensics Secur. 13(9): 2345-2358 (2018) - 2017
- [j1]Ruide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y. Thomas Hou, Yuichi Kawamoto:
From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality. ACM Trans. Intell. Syst. Technol. 9(1): 13:1-13:20 (2017)
Conference and Workshop Papers
- 2024
- [c70]Ao Li, Ning Zhang:
Data-flow Availability: Achieving Timing Assurance in Autonomous Systems. OSDI 2024: 445-463 - [c69]Ao Li, Jinwen Wang, Sanjoy K. Baruah, Bruno Sinopoli, Ning Zhang:
An Empirical Study of Performance Interference: Timing Violation Patterns and Impacts. RTAS 2024: 320-333 - [c68]Marion Sudvarg, Ao Li, Daisy Wang, Sanjoy K. Baruah, Jeremy Buhler, Chris Gill, Ning Zhang, Pontus Ekberg:
Elastic Scheduling for Harmonic Task Systems. RTAS 2024: 334-347 - [c67]Yujie Wang, Cailani Lemieux Mack, Xi Tan, Ning Zhang, Ziming Zhao, Sanjoy K. Baruah, Bryan C. Ward:
InsectACIDE: Debugger-Based Holistic Asynchronous CFI for Embedded System. RTAS 2024: 360-372 - [c66]Han Liu, Yuhao Wu, Zhiyuan Yu, Ning Zhang:
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack. SP 2024: 4791-4809 - [c65]Yujie Wang, Ao Li, Jinwen Wang, Sanjoy K. Baruah, Ning Zhang:
Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation. USENIX Security Symposium 2024 - [c64]Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang:
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. USENIX Security Symposium 2024 - [c63]Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang:
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models. USENIX Security Symposium 2024 - [c62]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - 2023
- [c61]Zhiyuan Yu, Shixuan Zhai, Ning Zhang:
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis. CCS 2023: 460-474 - [c60]Jinwen Wang, Yujie Wang, Ning Zhang:
Secure and Timely GPU Execution in Cyber-physical Systems. CCS 2023: 2591-2605 - [c59]Ning Zhang, Qi Li:
MTD '23: 10th ACM Workshop on Moving Target Defense. CCS 2023: 3653-3654 - [c58]Han Liu, Yuhao Wu, Zhiyuan Yu, Yevgeniy Vorobeychik, Ning Zhang:
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples. CVPR 2023: 5146-5155 - [c57]Han Liu, Yuhao Wu, Shixuan Zhai, Bo Yuan, Ning Zhang:
RIATIG: Reliable and Imperceptible Adversarial Text-to-Image Generation with Natural Prompts. CVPR 2023: 20585-20594 - [c56]Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang, Hongxin Hu, Ziming Zhao:
Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense. DAC 2023: 1-6 - [c55]Jinwen Wang, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain, Ning Zhang:
IP Protection in TinyML. DAC 2023: 1-6 - [c54]Jiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan, Ning Zhang:
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems. DSN 2023: 28-41 - [c53]Zhiyuan Yu, Yuhao Wu, Ning Zhang, Chenguang Wang, Yevgeniy Vorobeychik, Chaowei Xiao:
CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models. ICML 2023: 40373-40389 - [c52]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem. INFOCOM 2023: 1-10 - [c51]Tanmaya Mishra, Jinwen Wang, Thidapat Chantem, Ryan M. Gerdes, Ning Zhang:
A Procrastinating Control-Flow Integrity Framework for Periodic Real-Time Systems. RTNS 2023: 132-142 - [c50]Sanjoy K. Baruah, Pontus Ekberg, Mehdi Hosseinzadeh, Ao Li, Bryan C. Ward, Ning Zhang:
Who's Afraid of Butterflies? A Close Examination of the Butterfly Attack. RTSS 2023: 53-63 - [c49]Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang:
ARI: Attestation of Real-time Mission Execution Integrity. USENIX Security Symposium 2023: 2761-2778 - [c48]Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang:
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography. USENIX Security Symposium 2023: 2815-2832 - [c47]Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao:
SMACK: Semantically Meaningful Adversarial Audio Attack. USENIX Security Symposium 2023: 3799-3816 - [c46]Shanghao Shi, Yang Xiao, Changlai Du, Md Hasan Shahriar, Ao Li, Ning Zhang, Y. Thomas Hou, Wenjing Lou:
MS-PTP: Protecting Network Timing from Byzantine Attacks. WISEC 2023: 61-71 - 2022
- [c45]Ning Wang, Yang Xiao, Yimin Chen, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning. ACSAC 2022: 647-657 - [c44]Han Liu, Zhiyuan Yu, Mingming Zha, XiaoFeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang:
When Evil Calls: Targeted Adversarial Voice over IP Network. CCS 2022: 2009-2023 - [c43]Zhiyuan Yu, Zhuohang Li, Yuanhaur Chang, Skylar Fong, Jian Liu, Ning Zhang:
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions. CCS 2022: 3107-3120 - [c42]Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang:
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers. EuroS&P 2022: 520-536 - [c41]Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang:
Reward Delay Attacks on Deep Reinforcement Learning. GameSec 2022: 212-230 - [c40]Huifeng Zhu, Zhiyuan Yu, Weidong Cao, Ning Zhang, Xuan Zhang:
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens. ICCAD 2022: 67:1-67:9 - [c39]Ao Li, Han Liu, Jinwen Wang, Ning Zhang:
From Timing Variations to Performance Degradation: Understanding and Mitigating the Impact of Software Execution Timing in SLAM. IROS 2022: 13308-13315 - [c38]Zack Kaplan, Ning Zhang, Stephen V. Cole:
A Capture The Flag (CTF) Platform and Exercises for an Intro to Computer Security Class. ITiCSE (2) 2022: 597-598 - [c37]Ao Li, Marion Sudvarg, Han Liu, Zhiyuan Yu, Chris Gill, Ning Zhang:
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference. RTSS 2022: 225-239 - [c36]Yuhao Wu, Yujie Wang, Shixuan Zhai, Zihan Li, Ao Li, Jinwen Wang, Ning Zhang:
Work-in-Progress: Measuring Security Protection in Real-time Embedded Firmware. RTSS 2022: 495-498 - [c35]Jinwen Wang, Ao Li, Haoran Li, Chenyang Lu, Ning Zhang:
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone. SP 2022: 352-369 - [c34]Mingyang Xie, Manav Kulshrestha, Shaojie Wang, Jinghan Yang, Ayan Chakrabarti, Ning Zhang, Yevgeniy Vorobeychik:
PROVES: Establishing Image Provenance using Semantic Signatures. WACV 2022: 3017-3026 - 2021
- [c33]Brian Tung, Zhiyuan Yu, Ning Zhang:
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations. CCS 2021: 2396-2398 - [c32]Ao Li, Jinwen Wang, Ning Zhang:
Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems. CCS 2021: 2426-2428 - [c31]Tarek F. Abdelzaher, Sanjoy K. Baruah, Chris Gill, Yevgeniy Vorobeychik, Ning Zhang, Xuan Zhang:
Research Challenges for Combined Autonomy, AI, and Real-Time Assurance. CogMI 2021: 163-167 - [c30]Jiadong Lou, Xu Yuan, Ning Zhang:
Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems. USENIX Security Symposium 2021: 3273-3289 - [c29]Shengye Wan, Kun Sun, Ning Zhang, Yue Li:
Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands. WISEC 2021: 204-215 - 2020
- [c28]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. AAAI 2020: 946-953 - [c27]Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, Xu He:
RusTEE: Developing Memory-Safe ARM TrustZone Applications. ACSAC 2020: 442-453 - [c26]Yang Xiao, Shanghao Shi, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication. ACSAC 2020: 681-693 - [c25]Yang Xiao, Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou:
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution. ESORICS (2) 2020: 610-629 - [c24]Wei Yan, Huifeng Zhu, Zhiyuan Yu, Fatemeh Tehranipoor, John A. Chandy, Ning Zhang, Xuan Zhang:
Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory. HOST 2020: 91-101 - [c23]Ruide Zhang, Ning Zhang, Assad Moini, Wenjing Lou, Y. Thomas Hou:
PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications. ICDCS 2020: 34-44 - [c22]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain. INFOCOM 2020: 1648-1657 - [c21]Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang:
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. NDSS 2020 - 2019
- [c20]Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, Qi Li:
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. DSN 2019: 289-301 - [c19]Ruide Zhang, Ning Wang, Ning Zhang, Zheng Yan, Wenjing Lou, Y. Thomas Hou:
PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks. DySPAN 2019: 1-10 - [c18]Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik:
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features. USENIX Security Symposium 2019: 285-302 - 2018
- [c17]Ning Zhang, Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Wade Trappe:
ROSTER: Radio Context Attestation in Cognitive Radio Network. CNS 2018: 1-9 - [c16]Mohannad Alhanahnah, Qicheng Lin, Qiben Yan, Ning Zhang, Zhenxiang Chen:
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. CNS 2018: 1-9 - [c15]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup. CNS 2018: 1-9 - [c14]Ning Zhang, Jin Li, Wenjing Lou, Y. Thomas Hou:
PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution. DPM/CBT@ESORICS 2018: 345-353 - [c13]Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou:
TruSense: Information Leakage from TrustZone. INFOCOM 2018: 1097-1105 - [c12]Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. RAID 2018: 380-400 - [c11]Yaxing Chen, Wenhai Sun, Ning Zhang, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou:
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT. SecureComm (1) 2018: 3-21 - 2017
- [c10]Ning Zhang, Ruide Zhang, Qiben Yan, Wenjing Lou, Y. Thomas Hou, Danfeng Yao:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. CNS 2017: 586-594 - [c9]Ruide Zhang, Ning Zhang, Changlai Du, Wenjing Lou, Y. Thomas Hou, Yuichi Kawamoto:
AugAuth: Shoulder-surfing resistant authentication for augmented reality. ICC 2017: 1-6 - [c8]Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. INFOCOM 2017: 1-9 - 2016
- [c7]Ethan Gaebel, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Looks Good To Me: Authentication for Augmented Reality. TrustED@CCS 2016: 57-67 - [c6]Ning Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou:
CacheKit: Evading Memory Introspection Using Cache Incoherence. EuroS&P 2016: 337-352 - [c5]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou:
CaSE: Cache-Assisted Secure Execution on ARM Processors. IEEE Symposium on Security and Privacy 2016: 72-90 - 2015
- [c4]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia:
Now You See Me: Hide and Seek in Physical Address Space. AsiaCCS 2015: 321-331 - 2014
- [c3]Ning Zhang, Wenjing Lou, Xuxian Jiang, Y. Thomas Hou:
Enabling Trusted Data-intensive execution in cloud computing. CNS 2014: 355-363 - 2012
- [c2]Ning Zhang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation. MILCOM 2012: 1-6 - 2011
- [c1]Ning Zhang, Ming Li, Wenjing Lou:
Distributed Data Mining with Differential Privacy. ICC 2011: 1-5
Editorship
- 2023
- [e1]Ning Zhang, Qi Li:
Proceedings of the 10th ACM Workshop on Moving Target Defense, MTD 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents]
Informal and Other Publications
- 2024
- [i15]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - [i14]Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik:
Preference Poisoning Attacks on Reward Model Learning. CoRR abs/2402.01920 (2024) - [i13]Yuhao Wu, Franziska Roesner, Tadayoshi Kohno, Ning Zhang, Umar Iqbal:
SecGPT: An Execution Isolation Architecture for LLM-Based Systems. CoRR abs/2403.04960 (2024) - [i12]Evin Jaff, Yuhao Wu, Ning Zhang, Umar Iqbal:
Data Exposure from LLM Apps: An In-depth Investigation of OpenAI's GPTs. CoRR abs/2408.13247 (2024) - [i11]Yuanhaur Chang, Han Liu, Evin Jaff, Chenyang Lu, Ning Zhang:
SoK: Security and Privacy Risks of Medical AI. CoRR abs/2409.07415 (2024) - 2022
- [i10]Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang:
Reward Delay Attacks on Deep Reinforcement Learning. CoRR abs/2209.03540 (2022) - 2021
- [i9]Zhiyuan Yu, Zack Kaplan, Qiben Yan, Ning Zhang:
Security and Privacy in the Emerging Cyber-Physical World: A Survey. CoRR abs/2105.13347 (2021) - [i8]Mingyang Xie, Manav Kulshrestha, Shaojie Wang, Jinghan Yang, Ayan Chakrabarti, Ning Zhang, Yevgeniy Vorobeychik:
PROVES: Establishing Image Provenance using Semantic Signatures. CoRR abs/2110.11411 (2021) - [i7]Yang Xiao, Shanghao Shi, Wenjing Lou, Chonggang Wang, Xu Li, Ning Zhang, Y. Thomas Hou, Jeffrey H. Reed:
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution. CoRR abs/2112.05612 (2021) - 2020
- [i6]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain. CoRR abs/2002.08912 (2020) - 2019
- [i5]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
A Survey of Distributed Consensus Protocols for Blockchain Networks. CoRR abs/1904.04098 (2019) - [i4]Yang Xiao, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution. CoRR abs/1904.07275 (2019) - [i3]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. CoRR abs/1906.08805 (2019) - [i2]Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data. CoRR abs/1912.08454 (2019) - 2016
- [i1]Ning Zhang, Kun Sun, Deborah Shands, Wenjing Lou, Y. Thomas Hou:
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices. IACR Cryptol. ePrint Arch. 2016: 980 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint