default search action
Lingchen Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j2]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang:
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers. Int. J. Inf. Comput. Secur. 16(1/2): 63-83 (2021) - 2020
- [j1]Chenyang Tu, Zeyi Liu, Neng Gao, Cunqing Ma, Jingquan Ge, Lingchen Zhang:
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. IEEE Trans. Inf. Forensics Secur. 15: 3079-3092 (2020)
2010 – 2019
- 2019
- [c18]Liang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang:
A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs. ACISP 2019: 475-493 - [c17]Xueyi Yang, Lingchen Zhang, Cunqing Ma, Zongbin Liu, Ping Peng:
Android Control Flow Obfuscation Based on Dynamic Entry Points Modification. CSCS 2019: 296-303 - [c16]Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan, Lingchen Zhang:
Secure Cryptography Infrastructures in the Cloud. GLOBECOM 2019: 1-7 - [c15]Pengcheng Zhang, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Donglei Han:
KPaM: A Key Protection Framework for Mobile Devices Based on Two-party Computation. ISCC 2019: 1-6 - 2018
- [c14]Xuexin Qu, Xin Wang, Zihan Wang, Lei Wang, Lingchen Zhang:
Perceptual-DualGAN: Perceptual Losses for Image to Image Translation with Generative Adversarial Nets. IJCNN 2018: 1-8 - [c13]Liang Zheng, Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma:
Implementation of High Throughput XTS-SM4 Module for Data Storage Devices. SecureComm (2) 2018: 271-290 - 2017
- [c12]Xueping Liang, Sachin Shetty, Lingchen Zhang, Charles A. Kamhoua, Kevin A. Kwiat:
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. CLOUD 2017: 302-309 - [c11]Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma:
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. ACNS 2017: 415-434 - [c10]Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A Plausibly Deniable Encryption Scheme Utilizing PUF's Thermo-Sensitivity. ICICS 2017: 105-117 - [c9]Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng:
A PUF and Software Collaborative Key Protection Scheme. ICICS 2017: 291-303 - [c8]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang:
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. ICICS 2017: 304-310 - [c7]Xueyi Yang, Limin Liu, Lingchen Zhang, Weiyu Jiang, Shiran Pan:
How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack. ISC 2017: 269-287 - 2016
- [c6]Xin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang:
Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study. ICICS 2016: 455-465 - [c5]Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang:
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. SecureComm 2016: 675-693 - 2014
- [c4]Lingchen Zhang, Sachin Shetty, Peng Liu, Jiwu Jing:
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. ESORICS (2) 2014: 475-493 - 2012
- [c3]Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang:
Towards Fine-Grained Access Control on Browser Extensions. ISPEC 2012: 158-169 - [c2]Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma:
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. TrustCom 2012: 436-442 - 2011
- [c1]Lei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan:
Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA. ICICS 2011: 202-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint