Search dblp for Publications

export results for "Yinqian Zhang"

 download as .bib file

@article{DBLP:journals/ral/LuZZQPFP24,
  author       = {Liang Lu and
                  Yinqiang Zhang and
                  Peng Zhou and
                  Jiaming Qi and
                  Yipeng Pan and
                  Changhong Fu and
                  Jia Pan},
  title        = {Semantics-Aware Receding Horizon Planner for Object-Centric Active
                  Mapping},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {9},
  number       = {4},
  pages        = {3838--3845},
  year         = {2024},
  url          = {https://doi.org/10.1109/lra.2024.3371873},
  doi          = {10.1109/LRA.2024.3371873},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ral/LuZZQPFP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/LiuWLQJLZQ24,
  author       = {Chang Liu and
                  Dongsheng Wang and
                  Yongqiang Lyu and
                  Pengfei Qiu and
                  Yu Jin and
                  Zhuoyuan Lu and
                  Yinqian Zhang and
                  Gang Qu},
  title        = {Uncovering and Exploiting {AMD} Speculative Memory Access Predictors
                  for Fun and Profit},
  booktitle    = {{IEEE} International Symposium on High-Performance Computer Architecture,
                  {HPCA} 2024, Edinburgh, United Kingdom, March 2-6, 2024},
  pages        = {31--45},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/HPCA57654.2024.00014},
  doi          = {10.1109/HPCA57654.2024.00014},
  timestamp    = {Wed, 17 Apr 2024 17:17:11 +0200},
  biburl       = {https://dblp.org/rec/conf/hpca/LiuWLQJLZQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-18784,
  author       = {Yi Zeng and
                  Feifei Zhao and
                  Yuxuan Zhao and
                  Dongcheng Zhao and
                  Enmeng Lu and
                  Qian Zhang and
                  Yuwei Wang and
                  Hui Feng and
                  Zhuoya Zhao and
                  Jihang Wang and
                  Qingqun Kong and
                  Yinqian Sun and
                  Yang Li and
                  Guobin Shen and
                  Bing Han and
                  Yiting Dong and
                  Wenxuan Pan and
                  Xiang He and
                  Aorigele Bao and
                  Jin Wang},
  title        = {Brain-inspired and Self-based Artificial Intelligence},
  journal      = {CoRR},
  volume       = {abs/2402.18784},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.18784},
  doi          = {10.48550/ARXIV.2402.18784},
  eprinttype    = {arXiv},
  eprint       = {2402.18784},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-18784.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ChungZP23,
  author       = {Wingyan Chung and
                  Yinqiang Zhang and
                  Jia Pan},
  title        = {A Theory-based Deep-Learning Approach to Detecting Disinformation
                  in Financial Social Media},
  journal      = {Inf. Syst. Frontiers},
  volume       = {25},
  number       = {2},
  pages        = {473--492},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10796-022-10327-9},
  doi          = {10.1007/S10796-022-10327-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/ChungZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/patterns/ZengZZSDLZSLZZFWLLDKRB23,
  author       = {Yi Zeng and
                  Dongcheng Zhao and
                  Feifei Zhao and
                  Guobin Shen and
                  Yiting Dong and
                  Enmeng Lu and
                  Qian Zhang and
                  Yinqian Sun and
                  Qian Liang and
                  Yuxuan Zhao and
                  Zhuoya Zhao and
                  Hongjian Fang and
                  Yuwei Wang and
                  Yang Li and
                  Xin Liu and
                  Chengcheng Du and
                  Qingqun Kong and
                  Zizhe Ruan and
                  Weida Bi},
  title        = {BrainCog: {A} spiking neural network based, brain-inspired cognitive
                  intelligence engine for brain-inspired {AI} and brain simulation},
  journal      = {Patterns},
  volume       = {4},
  number       = {8},
  pages        = {100789},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.patter.2023.100789},
  doi          = {10.1016/J.PATTER.2023.100789},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/patterns/ZengZZSDLZSLZZFWLLDKRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/XueZDSW23,
  author       = {Chao Xue and
                  Yinqiang Zhang and
                  Song Ding and
                  Cheng Song and
                  Yiqing Wang},
  title        = {Comparison Research on Characterization and Evaluation Approaches
                  for Paint Coated Corrosion Using Eddy Current Pulsed Thermography},
  journal      = {Sensors},
  volume       = {23},
  number       = {15},
  pages        = {6889},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23156889},
  doi          = {10.3390/S23156889},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/XueZDSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/TangWYZXLKWWW23,
  author       = {Bowen Tang and
                  Chenggang Wu and
                  Pen{-}Chung Yew and
                  Yinqian Zhang and
                  Mengyao Xie and
                  Yuanming Lai and
                  Yan Kang and
                  Wei Wang and
                  Qiang Wei and
                  Zhe Wang},
  title        = {SpecWands: An Efficient Priority-Based Scheduler Against Speculation
                  Contention Attacks},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {42},
  number       = {12},
  pages        = {4477--4490},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCAD.2023.3284290},
  doi          = {10.1109/TCAD.2023.3284290},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/TangWYZXLKWWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/WangWFYCZZYH23,
  author       = {Juan Wang and
                  Jie Wang and
                  Chengyang Fan and
                  Fei Yan and
                  Yueqiang Cheng and
                  Yinqian Zhang and
                  Wenhui Zhang and
                  Mengda Yang and
                  Hongxin Hu},
  title        = {SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {2936--2953},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3243891},
  doi          = {10.1109/TCC.2023.3243891},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/WangWFYCZZYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenZ23,
  author       = {Guoxing Chen and
                  Yinqian Zhang},
  title        = {Securing TEEs With Verifiable Execution Contracts},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {3222--3237},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3194871},
  doi          = {10.1109/TDSC.2022.3194871},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NiuGHZZF23,
  author       = {Jianyu Niu and
                  Fangyu Gai and
                  Runchao Han and
                  Ren Zhang and
                  Yinqian Zhang and
                  Chen Feng},
  title        = {Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {4154--4168},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3216749},
  doi          = {10.1109/TDSC.2022.3216749},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NiuGHZZF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangWWJYCZWX23,
  author       = {Bowen Tang and
                  Chenggang Wu and
                  Zhe Wang and
                  Lichen Jia and
                  Pen{-}Chung Yew and
                  Yueqiang Cheng and
                  Yinqian Zhang and
                  Chenxi Wang and
                  Guoqing Harry Xu},
  title        = {SpecBox: {A} Label-Based Transparent Speculation Scheme Against Transient
                  Execution Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {827--840},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3144287},
  doi          = {10.1109/TDSC.2022.3144287},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/TangWWJYCZWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuXWZLZLKYL23,
  author       = {Chenggang Wu and
                  Mengyao Xie and
                  Zhe Wang and
                  Yinqian Zhang and
                  Kangjie Lu and
                  Xiaofeng Zhang and
                  Yuanming Lai and
                  Yan Kang and
                  Min Yang and
                  Tao Li},
  title        = {Dancing With Wolves: An Intra-Process Isolation Technique With Privileged
                  Hardware},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {1959--1978},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3168089},
  doi          = {10.1109/TDSC.2022.3168089},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuXWZLZLKYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/GuoZ23,
  author       = {Yinqian Guo and
                  Hongtao Zhang},
  title        = {3D Boundary Modeling and Handover Analysis of Aerial Users in Heterogeneous
                  Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {10},
  pages        = {13523--13529},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3276890},
  doi          = {10.1109/TVT.2023.3276890},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/GuoZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caasafeproc/ZhangJZLZ23,
  author       = {Peng Zhang and
                  Wenhua Jiao and
                  Yinqiang Zhang and
                  Lijuan Li and
                  Dengfeng Zhang},
  title        = {Improved U-Net for Industrial Image Denoising},
  booktitle    = {{CAA} Symposium on Fault Detection, Supervision and Safety for Technical
                  Processes, {SAFEPROCESS} 2023, Yibin, China, September 22-24, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SAFEPROCESS58597.2023.10295854},
  doi          = {10.1109/SAFEPROCESS58597.2023.10295854},
  timestamp    = {Thu, 16 Nov 2023 16:58:41 +0100},
  biburl       = {https://dblp.org/rec/conf/caasafeproc/ZhangJZLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuX0ZLHLKWW023,
  author       = {Jiali Xu and
                  Mengyao Xie and
                  Chenggang Wu and
                  Yinqian Zhang and
                  Qijing Li and
                  Xuan Huang and
                  Yuanming Lai and
                  Yan Kang and
                  Wei Wang and
                  Qiang Wei and
                  Zhe Wang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {{PANIC:} PAN-assisted Intra-process Memory Isolation on {ARM}},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {919--933},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623206},
  doi          = {10.1145/3576915.3623206},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuX0ZLHLKWW023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/CaoMYWZZDLSTSLZSCMCZCXLBSHZAHWYZZLCRZW23,
  author       = {Mingdeng Cao and
                  Chong Mou and
                  Fanghua Yu and
                  Xintao Wang and
                  Yinqiang Zheng and
                  Jian Zhang and
                  Chao Dong and
                  Gen Li and
                  Ying Shan and
                  Radu Timofte and
                  Xiaopeng Sun and
                  Weiqi Li and
                  Zhenyu Zhang and
                  Xuhan Sheng and
                  Bin Chen and
                  Haoyu Ma and
                  Ming Cheng and
                  Shijie Zhao and
                  Wanwan Cui and
                  Tianyu Xu and
                  Chunyang Li and
                  Long Bao and
                  Heng Sun and
                  Huaibo Huang and
                  Xiaoqiang Zhou and
                  Yuang Ai and
                  Ran He and
                  Renlong Wu and
                  Yi Yang and
                  Zhilu Zhang and
                  Shuohao Zhang and
                  Junyi Li and
                  Yunjin Chen and
                  Dongwei Ren and
                  Wangmeng Zuo and
                  Qian Wang and
                  Hao{-}Hsiang Yang and
                  Yi{-}Chung Chen and
                  Zhi{-}Kai Huang and
                  Wei{-}Ting Chen and
                  Yuan{-}Chun Chiang and
                  Hua{-}En Chang and
                  I{-}Hsiang Chen and
                  Chia{-}Hsuan Hsieh and
                  Sy{-}Yen Kuo and
                  Zebin Zhang and
                  Jiaqi Zhang and
                  Yuhui Wang and
                  Shuhao Cui and
                  Junshi Huang and
                  Li Zhu and
                  Shuman Tian and
                  Wei Yu and
                  Bingchun Luo},
  title        = {{NTIRE} 2023 Challenge on 360{\textdegree} Omnidirectional Image and
                  Video Super-Resolution: Datasets, Methods and Results},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2023 - Workshops, Vancouver, BC, Canada, June 17-24, 2023},
  pages        = {1731--1745},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CVPRW59228.2023.00174},
  doi          = {10.1109/CVPRW59228.2023.00174},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/CaoMYWZZDLSTSLZSCMCZCXLBSHZAHWYZZLCRZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WangLZL23,
  author       = {Wubing Wang and
                  Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Daniel Gruss and
                  Federico Maggi and
                  Mathias Fischer and
                  Michele Carminati},
  title        = {PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks
                  on {AMD} {SEV}},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July
                  12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13959},
  pages        = {46--66},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35504-2\_3},
  doi          = {10.1007/978-3-031-35504-2\_3},
  timestamp    = {Tue, 20 Jun 2023 14:45:29 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WangLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GhaniyounB0ZT23,
  author       = {Moein Ghaniyoun and
                  Kristin Barber and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Radu Teodorescu},
  editor       = {Yan Solihin and
                  Mark A. Heinrich},
  title        = {TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution
                  Environments},
  booktitle    = {Proceedings of the 50th Annual International Symposium on Computer
                  Architecture, {ISCA} 2023, Orlando, FL, USA, June 17-21, 2023},
  pages        = {35:1--35:15},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579371.3589070},
  doi          = {10.1145/3579371.3589070},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/GhaniyounB0ZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0002XCZZL23,
  author       = {Shixuan Zhao and
                  Pinshen Xu and
                  Guoxing Chen and
                  Mengya Zhang and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Reusable Enclaves for Confidential Serverless Computing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4015--4032},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhao-shixuan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0002XCZZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLZ23,
  author       = {Sanchuan Chen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Controlled Data Races in Enclaves: Attacks and Detection},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4069--4086},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-sanchuan},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DengLTWYZ23,
  author       = {Sen Deng and
                  Mengyuan Li and
                  Yining Tang and
                  Shuai Wang and
                  Shoumeng Yan and
                  Yinqian Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities
                  in Cryptographic Implementations},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6843--6860},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/deng-sen},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DengLTWYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SunLZ23,
  author       = {Zhiyuan Sun and
                  Xiapu Luo and
                  Yinqian Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Panda: Security Analysis of Algorand Smart Contracts},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1811--1828},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/sun},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SunLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-00947,
  author       = {Bowen Tang and
                  Chenggang Wu and
                  Pen{-}Chung Yew and
                  Yinqian Zhang and
                  Mengyao Xie and
                  Yuanming Lai and
                  Yan Kang and
                  Wei Wang and
                  Qiang Wei and
                  Zhe Wang},
  title        = {{SPECWANDS:} An Efficient Priority-based Scheduler Against Speculation
                  Contention Attacks},
  journal      = {CoRR},
  volume       = {abs/2302.00947},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.00947},
  doi          = {10.48550/ARXIV.2302.00947},
  eprinttype    = {arXiv},
  eprint       = {2302.00947},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-00947.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-14356,
  author       = {Tingxiang Fan and
                  Bowen Shen and
                  Yinqiang Zhang and
                  Chuye Zhang and
                  Lei Yang and
                  Hua Chen and
                  Wei Zhang and
                  Jia Pan},
  title        = {{SMAT:} {A} Self-Reinforcing Framework for Simultaneous Mapping and
                  Tracking in Unbounded Urban Environments},
  journal      = {CoRR},
  volume       = {abs/2304.14356},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.14356},
  doi          = {10.48550/ARXIV.2304.14356},
  eprinttype    = {arXiv},
  eprint       = {2304.14356},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-14356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-13875,
  author       = {Zhiling Guo and
                  Yinqiang Zheng and
                  Haoran Zhang and
                  Xiaodan Shi and
                  Zekun Cai and
                  Ryosuke Shibasaki and
                  Jinyue Yan},
  title        = {Real-World Video for Zoom Enhancement based on Spatio-Temporal Coupling},
  journal      = {CoRR},
  volume       = {abs/2306.13875},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.13875},
  doi          = {10.48550/ARXIV.2306.13875},
  eprinttype    = {arXiv},
  eprint       = {2306.13875},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-13875.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00741,
  author       = {Jianyu Niu and
                  Fangyu Gai and
                  Runchao Han and
                  Ren Zhang and
                  Yinqian Zhang and
                  Chen Feng},
  title        = {Crystal: Enhancing Blockchain Mining Transparency with Quorum Certificate},
  journal      = {CoRR},
  volume       = {abs/2312.00741},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00741},
  doi          = {10.48550/ARXIV.2312.00741},
  eprinttype    = {arXiv},
  eprint       = {2312.00741},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-12573,
  author       = {Mengya Zhang and
                  Xiaokuan Zhang and
                  Josh Barbee and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and
                  Open Problems},
  journal      = {CoRR},
  volume       = {abs/2312.12573},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.12573},
  doi          = {10.48550/ARXIV.2312.12573},
  eprinttype    = {arXiv},
  eprint       = {2312.12573},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-12573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/BarberGZT22,
  author       = {Kristin Barber and
                  Moein Ghaniyoun and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities
                  in Security Critical Applications},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {21},
  number       = {1},
  pages        = {9--12},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCA.2022.3151256},
  doi          = {10.1109/LCA.2022.3151256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cal/BarberGZT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LouZJZ21,
  author       = {Xiaoxuan Lou and
                  Tianwei Zhang and
                  Jun Jiang and
                  Yinqian Zhang},
  title        = {A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks,
                  and Defenses in Cryptography},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {6},
  pages        = {122:1--122:37},
  year         = {2022},
  url          = {https://doi.org/10.1145/3456629},
  doi          = {10.1145/3456629},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/LouZJZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/ChakrabortiCKNS22,
  author       = {Anrin Chakraborti and
                  Reza Curtmola and
                  Jonathan Katz and
                  Jason Nieh and
                  Ahmad{-}Reza Sadeghi and
                  Radu Sion and
                  Yinqian Zhang},
  title        = {Cloud Computing Security: Foundations and Research Directions},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {103--213},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000028},
  doi          = {10.1561/3300000028},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/ChakrabortiCKNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhangHRZ22,
  author       = {Xiaokuan Zhang and
                  Jihun Hamm and
                  Michael K. Reiter and
                  Yinqian Zhang},
  title        = {Defeating traffic analysis via differential privacy: a case study
                  on streaming traffic},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {3},
  pages        = {689--706},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-021-00574-3},
  doi          = {10.1007/S10207-021-00574-3},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhangHRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/FuZZZH22,
  author       = {Ying Fu and
                  Tao Zhang and
                  Yinqiang Zheng and
                  Debing Zhang and
                  Hua Huang},
  title        = {Joint Camera Spectral Response Selection and Hyperspectral Image Recovery},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {44},
  number       = {1},
  pages        = {256--272},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPAMI.2020.3009999},
  doi          = {10.1109/TPAMI.2020.3009999},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pami/FuZZZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/ZhangZL22,
  author       = {Mingfang Zhang and
                  Yinqiang Zheng and
                  Feng Lu},
  title        = {Optical Flow in the Dark},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {44},
  number       = {12},
  pages        = {9464--9476},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPAMI.2021.3130302},
  doi          = {10.1109/TPAMI.2021.3130302},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pami/ZhangZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/ZhangZHZP22,
  author       = {Zeqing Zhang and
                  Yinqiang Zhang and
                  Ruihua Han and
                  Liangjun Zhang and
                  Jia Pan},
  title        = {A Generalized Continuous Collision Detection Framework of Polynomial
                  Trajectory for Mobile Robots in Cluttered Environments},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {7},
  number       = {4},
  pages        = {9810--9817},
  year         = {2022},
  url          = {https://doi.org/10.1109/LRA.2022.3191934},
  doi          = {10.1109/LRA.2022.3191934},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ral/ZhangZHZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/00170ZTYXLKC022,
  author       = {Zhe Wang and
                  Chenggang Wu and
                  Yinqian Zhang and
                  Bowen Tang and
                  Pen{-}Chung Yew and
                  Mengyao Xie and
                  Yuanming Lai and
                  Yan Kang and
                  Yueqiang Cheng and
                  Zhiping Shi},
  title        = {Making Information Hiding Effective Again},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2576--2594},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3064086},
  doi          = {10.1109/TDSC.2021.3064086},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/00170ZTYXLKC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/ZhangBZ22,
  author       = {Rui Zhang and
                  Michael D. Bond and
                  Yinqian Zhang},
  editor       = {Bernhard Egger and
                  Aaron Smith},
  title        = {Cape: compiler-aided program transformation for HTM-based cache side-channel
                  defense},
  booktitle    = {{CC} '22: 31st {ACM} {SIGPLAN} International Conference on Compiler
                  Construction, Seoul, South Korea, April 2 - 3, 2022},
  pages        = {181--193},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3497776.3517778},
  doi          = {10.1145/3497776.3517778},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cc/ZhangBZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0005DNRZ22,
  author       = {Weili Wang and
                  Sen Deng and
                  Jianyu Niu and
                  Michael K. Reiter and
                  Yinqian Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{ENGRAFT:} Enclave-guarded Raft on Byzantine Faulty Nodes},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2841--2855},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560639},
  doi          = {10.1145/3548606.3560639},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0005DNRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NiuPZZ22,
  author       = {Jianyu Niu and
                  Wei Peng and
                  Xiaokuan Zhang and
                  Yinqian Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{NARRATOR:} Secure and Practical State Continuity for Trusted Execution
                  in the Cloud},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2385--2399},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560620},
  doi          = {10.1145/3548606.3560620},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NiuPZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Xie0ZXLKW022,
  author       = {Mengyao Xie and
                  Chenggang Wu and
                  Yinqian Zhang and
                  Jiali Xu and
                  Yuanming Lai and
                  Yan Kang and
                  Wei Wang and
                  Zhe Wang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{CETIS:} Retrofitting Intel {CET} for Generic and Efficient Intra-process
                  Memory Isolation},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2989--3002},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559344},
  doi          = {10.1145/3548606.3559344},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Xie0ZXLKW022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/LinZYZLP22,
  author       = {Shijie Lin and
                  Yinqiang Zhang and
                  Lei Yu and
                  Bin Zhou and
                  Xiaowei Luo and
                  Jia Pan},
  title        = {Autofocus for Event Cameras},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {16323--16332},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01586},
  doi          = {10.1109/CVPR52688.2022.01586},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/LinZYZLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/CaoZFWZWYZ22,
  author       = {Mingdeng Cao and
                  Zhihang Zhong and
                  Yanbo Fan and
                  Jiahao Wang and
                  Yong Zhang and
                  Jue Wang and
                  Yujiu Yang and
                  Yinqiang Zheng},
  editor       = {Leonid Karlinsky and
                  Tomer Michaeli and
                  Ko Nishino},
  title        = {Towards Real-World Video Deblurring by Exploring Blur Formation Process},
  booktitle    = {Computer Vision - {ECCV} 2022 Workshops - Tel Aviv, Israel, October
                  23-27, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13802},
  pages        = {327--343},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25063-7\_20},
  doi          = {10.1007/978-3-031-25063-7\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eccv/CaoZFWZWYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itsc/KrasowskiZA22,
  author       = {Hanna Krasowski and
                  Yinqiang Zhang and
                  Matthias Althoff},
  title        = {Safe Reinforcement Learning for Urban Driving using Invariably Safe
                  Braking Sets},
  booktitle    = {25th {IEEE} International Conference on Intelligent Transportation
                  Systems, {ITSC} 2022, Macau, China, October 8-12, 2022},
  pages        = {2407--2414},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ITSC55140.2022.9922166},
  doi          = {10.1109/ITSC55140.2022.9922166},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itsc/KrasowskiZA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangCZL22,
  author       = {Huibo Wang and
                  Guoxing Chen and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their
                  Countermeasures},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-253/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/WangCZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seed/ZhouXTZ22,
  author       = {Jiuqin Zhou and
                  Yuan Xiao and
                  Radu Teodorescu and
                  Yinqian Zhang},
  title        = {{ENCLYZER:} Automated Analysis of Transient Data Leaks on Intel {SGX}},
  booktitle    = {2022 {IEEE} International Symposium on Secure and Private Execution
                  Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022},
  pages        = {145--156},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SEED55351.2022.00020},
  doi          = {10.1109/SEED55351.2022.00020},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seed/ZhouXTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiWW0TZ22,
  author       = {Mengyuan Li and
                  Luca Wilke and
                  Jan Wichelmann and
                  Thomas Eisenbarth and
                  Radu Teodorescu and
                  Yinqian Zhang},
  title        = {A Systematic Look at Ciphertext Side Channels on {AMD} {SEV-SNP}},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {337--351},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833768},
  doi          = {10.1109/SP46214.2022.9833768},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiWW0TZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhaoLZL22,
  author       = {Shixuan Zhao and
                  Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {vSGX: Virtualizing {SGX} Enclaves on {AMD} {SEV}},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {321--336},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833694},
  doi          = {10.1109/SP46214.2022.9833694},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhaoLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenZ22,
  author       = {Guoxing Chen and
                  Yinqian Zhang},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{MAGE:} Mutual Attestation for a Group of Enclaves without Trusted
                  Third Parties},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4095--4110},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-guoxing},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ChenZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-12321,
  author       = {Shijie Lin and
                  Yinqiang Zhang and
                  Lei Yu and
                  Bin Zhou and
                  Xiaowei Luo and
                  Jia Pan},
  title        = {Autofocus for Event Cameras},
  journal      = {CoRR},
  volume       = {abs/2203.12321},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.12321},
  doi          = {10.48550/ARXIV.2203.12321},
  eprinttype    = {arXiv},
  eprint       = {2203.12321},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-12321.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-13175,
  author       = {Zeqing Zhang and
                  Yinqiang Zhang and
                  Ruihua Han and
                  Liangjun Zhang and
                  Jia Pan},
  title        = {A Generalized Continuous Collision Detection Framework of Polynomial
                  Trajectory for Mobile Robots in Cluttered Environments},
  journal      = {CoRR},
  volume       = {abs/2206.13175},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.13175},
  doi          = {10.48550/ARXIV.2206.13175},
  eprinttype    = {arXiv},
  eprint       = {2206.13175},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-13175.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-08533,
  author       = {Yi Zeng and
                  Dongcheng Zhao and
                  Feifei Zhao and
                  Guobin Shen and
                  Yiting Dong and
                  Enmeng Lu and
                  Qian Zhang and
                  Yinqian Sun and
                  Qian Liang and
                  Yuxuan Zhao and
                  Zhuoya Zhao and
                  Hongjian Fang and
                  Yuwei Wang and
                  Yang Li and
                  Xin Liu and
                  Chengcheng Du and
                  Qingqun Kong and
                  Zizhe Ruan and
                  Weida Bi},
  title        = {BrainCog: {A} Spiking Neural Network based Brain-inspired Cognitive
                  Intelligence Engine for Brain-inspired {AI} and Brain Simulation},
  journal      = {CoRR},
  volume       = {abs/2207.08533},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.08533},
  doi          = {10.48550/ARXIV.2207.08533},
  eprinttype    = {arXiv},
  eprint       = {2207.08533},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-08533.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-02858,
  author       = {Xingyu Lyu and
                  Mengya Zhang and
                  Xiaokuan Zhang and
                  Jianyu Niu and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {An Empirical Study on Ethereum Private Transactions and the Security
                  Implications},
  journal      = {CoRR},
  volume       = {abs/2208.02858},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.02858},
  doi          = {10.48550/ARXIV.2208.02858},
  eprinttype    = {arXiv},
  eprint       = {2208.02858},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-02858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-13184,
  author       = {Mingdeng Cao and
                  Zhihang Zhong and
                  Yanbo Fan and
                  Jiahao Wang and
                  Yong Zhang and
                  Jue Wang and
                  Yujiu Yang and
                  Yinqiang Zheng},
  title        = {Towards Real-World Video Deblurring by Exploring Blur Formation Process},
  journal      = {CoRR},
  volume       = {abs/2208.13184},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.13184},
  doi          = {10.48550/ARXIV.2208.13184},
  eprinttype    = {arXiv},
  eprint       = {2208.13184},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-13184.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/SuLXZZ21,
  author       = {Yinqiang Su and
                  Jinghong Liu and
                  Fang Xu and
                  Xueming Zhang and
                  Yujia Zuo},
  title        = {A Novel Anti-Drift Visual Object Tracking Algorithm Based on Sparse
                  Response and Adaptive Spatial-Temporal Context-Aware},
  journal      = {Remote. Sens.},
  volume       = {13},
  number       = {22},
  pages        = {4672},
  year         = {2021},
  url          = {https://doi.org/10.3390/rs13224672},
  doi          = {10.3390/RS13224672},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/SuLXZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/LiFHZP21,
  author       = {Yiming Li and
                  Changhong Fu and
                  Ziyuan Huang and
                  Yinqiang Zhang and
                  Jia Pan},
  title        = {Intermittent Contextual Learning for Keyfilter-Aware {UAV} Object
                  Tracking Using Deep Convolutional Feature},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {23},
  pages        = {810--822},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMM.2020.2990064},
  doi          = {10.1109/TMM.2020.2990064},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/LiFHZP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiZWLC21,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Huibo Wang and
                  Kang Li and
                  Yueqiang Cheng},
  title        = {{TLB} Poisoning Attacks on {AMD} Secure Encrypted Virtualization},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {609--619},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485876},
  doi          = {10.1145/3485832.3485876},
  timestamp    = {Tue, 07 Dec 2021 18:41:40 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiZWLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/ZhangZ00ZLLL21,
  author       = {Zeyu Zhang and
                  Xiaoli Zhang and
                  Qi Li and
                  Kun Sun and
                  Yinqian Zhang and
                  Songsong Liu and
                  Yukun Liu and
                  Xiaoning Li},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {See through Walls: Detecting Malware in {SGX} Enclaves with SGX-Bouncer},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {931--943},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437531},
  doi          = {10.1145/3433210.3437531},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/ZhangZ00ZLLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiZL21,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {CrossLine: Breaking "Security-by-Crash" based Memory Isolation in
                  {AMD} {SEV}},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2937--2950},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485253},
  doi          = {10.1145/3460120.3485253},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/BiZLHZHL21,
  author       = {Qunchao Bi and
                  Taibin Zhou and
                  Huanhuan Lai and
                  Jiajia Huang and
                  Duxi Zhang and
                  Yinqiang Huang and
                  Bo Li},
  title        = {A Smart and Safe Robot System for Electric Monitoring},
  booktitle    = {8th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2021/7th {IEEE} International Conference on Edge Computing
                  and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28,
                  2021},
  pages        = {121--126},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00031},
  doi          = {10.1109/CSCLOUD-EDGECOM52276.2021.00031},
  timestamp    = {Thu, 05 Aug 2021 09:37:29 +0200},
  biburl       = {https://dblp.org/rec/conf/cscloud/BiZLHZHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WangCCZL21,
  author       = {Wubing Wang and
                  Guoxing Chen and
                  Yueqiang Cheng and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {Specularizer : Detecting Speculative Execution Attacks via Performance
                  Tracing},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {151--172},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_8},
  doi          = {10.1007/978-3-030-80825-9\_8},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WangCCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/GhaniyounBZT21,
  author       = {Moein Ghaniyoun and
                  Kristin Barber and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {{INTROSPECTRE:} {A} Pre-Silicon Framework for Discovery and Analysis
                  of Transient Execution Vulnerabilities},
  booktitle    = {48th {ACM/IEEE} Annual International Symposium on Computer Architecture,
                  {ISCA} 2021, Virtual Event / Valencia, Spain, June 14-18, 2021},
  pages        = {874--887},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCA52012.2021.00073},
  doi          = {10.1109/ISCA52012.2021.00073},
  timestamp    = {Mon, 19 Feb 2024 07:32:07 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/GhaniyounBZT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChenLZ21,
  author       = {Sanchuan Chen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1665--1682},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-sanchuan},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChenLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JangidCZL21,
  author       = {Mohit Kumar Jangid and
                  Guoxing Chen and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Towards Formal Verification of State Continuity for Enclave Programs},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {573--590},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/jangid},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/JangidCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiZWLC21,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Huibo Wang and
                  Kang Li and
                  Yueqiang Cheng},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{CIPHERLEAKS:} Breaking Constant-time Cryptography on {AMD} {SEV}
                  via the Ciphertext Side Channel},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {717--732},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-mengyuan},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LiZWLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccsw-ws/2021,
  editor       = {Yinqian Zhang and
                  Marten van Dijk},
  title        = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security
                  Workshop, Virtual Event, Republic of Korea, 15 November 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474123},
  doi          = {10.1145/3474123},
  isbn         = {978-1-4503-8653-1},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-03523,
  author       = {Xiaoxuan Lou and
                  Shangwei Guo and
                  Tianwei Zhang and
                  Yinqian Zhang and
                  Yang Liu},
  title        = {When {NAS} Meets Watermarking: Ownership Verification of {DNN} Models
                  via Cache Side Channels},
  journal      = {CoRR},
  volume       = {abs/2102.03523},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.03523},
  eprinttype    = {arXiv},
  eprint       = {2102.03523},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-03523.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14244,
  author       = {Xiaoxuan Lou and
                  Tianwei Zhang and
                  Jun Jiang and
                  Yinqian Zhang},
  title        = {A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks
                  and Defenses in Cryptography},
  journal      = {CoRR},
  volume       = {abs/2103.14244},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14244},
  eprinttype    = {arXiv},
  eprint       = {2103.14244},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14244.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-08367,
  author       = {Bowen Tang and
                  Chenggang Wu and
                  Zhe Wang and
                  Lichen Jia and
                  Pen{-}Chung Yew and
                  Yueqiang Cheng and
                  Yinqian Zhang and
                  Chenxi Wang and
                  Guoqing Harry Xu},
  title        = {SpecBox: {A} Label-Based Transparent Speculation Scheme Against Transient
                  Execution Attacks},
  journal      = {CoRR},
  volume       = {abs/2107.08367},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.08367},
  eprinttype    = {arXiv},
  eprint       = {2107.08367},
  timestamp    = {Wed, 17 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-08367.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcmi/JiangYZXYKLJZ20,
  author       = {Shu{-}Qin Jiang and
                  Ting Yang and
                  Qiong Zou and
                  Lei Xu and
                  Ting Ye and
                  Yin{-}Qian Kang and
                  Wan{-}Ru Li and
                  Ju Jiao and
                  Yong Zhang},
  title        = {The role of \({}^{\mbox{99m}}\)Tc-MIBI {SPECT/CT} in patients with
                  secondary hyperparathyroidism: comparison with \({}^{\mbox{99m}}\)Tc-MIBI
                  planar scintigraphy and ultrasonography},
  journal      = {{BMC} Medical Imaging},
  volume       = {20},
  number       = {1},
  pages        = {115},
  year         = {2020},
  url          = {https://doi.org/10.1186/s12880-020-00517-9},
  doi          = {10.1186/S12880-020-00517-9},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcmi/JiangYZXYKLJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ChenCXZLL20,
  author       = {Guoxing Chen and
                  Sanchuan Chen and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Ten{-}Hwang Lai},
  title        = {SgxPectre: Stealing Intel Secrets From {SGX} Enclaves via Speculative
                  Execution},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {3},
  pages        = {28--37},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2019.2963021},
  doi          = {10.1109/MSEC.2019.2963021},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ChenCXZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/FuZZZH20,
  author       = {Ying Fu and
                  Yongrong Zheng and
                  Lin Zhang and
                  Yinqiang Zheng and
                  Hua Huang},
  title        = {Simultaneous hyperspectral image super-resolution and geometric alignment
                  with a hybrid camera system},
  journal      = {Neurocomputing},
  volume       = {384},
  pages        = {282--294},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.neucom.2019.12.024},
  doi          = {10.1016/J.NEUCOM.2019.12.024},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/FuZZZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MiCZPWR20,
  author       = {Zeyu Mi and
                  Haibo Chen and
                  Yinqian Zhang and
                  ShuangHe Peng and
                  Xiaofeng Wang and
                  Michael K. Reiter},
  title        = {{CPU} Elasticity to Mitigate Cross-VM Runtime Monitoring},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {5},
  pages        = {1094--1108},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2846742},
  doi          = {10.1109/TDSC.2018.2846742},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MiCZPWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SionZ20,
  author       = {Radu Sion and
                  Yinqian Zhang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {CCSW'20: 2020 Cloud Computing Security Workshop},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2133--2134},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3416242},
  doi          = {10.1145/3372297.3416242},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SionZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WenLZ20,
  author       = {Haohuang Wen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal
                  Firmware},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {167--180},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423344},
  doi          = {10.1145/3372297.3423344},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WenLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ZhengZL20,
  author       = {Yinqiang Zheng and
                  Mingfang Zhang and
                  Feng Lu},
  title        = {Optical Flow in the Dark},
  booktitle    = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020},
  pages        = {6748--6756},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2020},
  url          = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Zheng\_Optical\_Flow\_in\_the\_Dark\_CVPR\_2020\_paper.html},
  doi          = {10.1109/CVPR42600.2020.00678},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/ZhengZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/Li0HZP20,
  author       = {Yiming Li and
                  Changhong Fu and
                  Ziyuan Huang and
                  Yinqiang Zhang and
                  Jia Pan},
  title        = {Keyfilter-Aware Real-Time {UAV} Object Tracking},
  booktitle    = {2020 {IEEE} International Conference on Robotics and Automation, {ICRA}
                  2020, Paris, France, May 31 - August 31, 2020},
  pages        = {193--199},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICRA40945.2020.9196943},
  doi          = {10.1109/ICRA40945.2020.9196943},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/Li0HZP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/XiaoZT20,
  author       = {Yuan Xiao and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {{SPEECHMINER:} {A} Framework for Investigating and Measuring Speculative
                  Execution Vulnerabilities},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/speechminer-a-framework-for-investigating-and-measuring-speculative-execution-vulnerabilities/},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/XiaoZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Wang0XZLZLKY20,
  author       = {Zhe Wang and
                  Chenggang Wu and
                  Mengyao Xie and
                  Yinqian Zhang and
                  Kangjie Lu and
                  Xiaofeng Zhang and
                  Yuanming Lai and
                  Yan Kang and
                  Min Yang},
  title        = {{SEIMI:} Efficient and Secure SMAP-Enabled Intra-process Memory Isolation},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {592--607},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00087},
  doi          = {10.1109/SP40000.2020.00087},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/Wang0XZLZLKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangZZL20,
  author       = {Mengya Zhang and
                  Xiaokuan Zhang and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{TXSPECTOR:} Uncovering Attacks in Ethereum from Transactions},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2775--2792},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-mengya},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccsw-ws/2020,
  editor       = {Yinqian Zhang and
                  Radu Sion},
  title        = {CCSW'20, Proceedings of the 2020 {ACM} {SIGSAC} Conference on Cloud
                  Computing Security Workshop, Virtual Event, USA, November 9, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411495},
  doi          = {10.1145/3411495},
  isbn         = {978-1-4503-8084-3},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-00524,
  author       = {Zhi Zhang and
                  Yueqiang Cheng and
                  Yinqian Zhang and
                  Surya Nepal},
  title        = {GhostKnight: Breaching Data Integrity via Speculative Execution},
  journal      = {CoRR},
  volume       = {abs/2002.00524},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.00524},
  eprinttype    = {arXiv},
  eprint       = {2002.00524},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-00524.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-05218,
  author       = {Yiming Li and
                  Changhong Fu and
                  Ziyuan Huang and
                  Yinqiang Zhang and
                  Jia Pan},
  title        = {Keyfilter-Aware Real-Time {UAV} Object Tracking},
  journal      = {CoRR},
  volume       = {abs/2003.05218},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.05218},
  eprinttype    = {arXiv},
  eprint       = {2003.05218},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-05218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-00146,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {{CROSSLINE:} Breaking "Security-by-Crash" based Memory Isolation in
                  {AMD} {SEV}},
  journal      = {CoRR},
  volume       = {abs/2008.00146},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.00146},
  eprinttype    = {arXiv},
  eprint       = {2008.00146},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-00146.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-09501,
  author       = {Guoxing Chen and
                  Yinqian Zhang},
  title        = {{MAGE:} Mutual Attestation for a Group of Enclaves without Trusted
                  Third Parties},
  journal      = {CoRR},
  volume       = {abs/2008.09501},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.09501},
  eprinttype    = {arXiv},
  eprint       = {2008.09501},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-09501.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12197,
  author       = {Yinqian Sun and
                  Yi Zeng and
                  Tielin Zhang},
  title        = {Quantum Superposition Spiking Neural Network},
  journal      = {CoRR},
  volume       = {abs/2010.12197},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12197},
  eprinttype    = {arXiv},
  eprint       = {2010.12197},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12197.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FuZHDX19,
  author       = {Changhong Fu and
                  Yinqiang Zhang and
                  Ziyuan Huang and
                  Ran Duan and
                  Zongwu Xie},
  title        = {Part-Based Background-Aware Tracking for {UAV} With Convolutional
                  Features},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {79997--80010},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2922703},
  doi          = {10.1109/ACCESS.2019.2922703},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FuZHDX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cal/BarberBZZT19,
  author       = {Kristin Barber and
                  Anys Bacha and
                  Li Zhou and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {Isolating Speculative Data to Prevent Transient Execution Attacks},
  journal      = {{IEEE} Comput. Archit. Lett.},
  volume       = {18},
  number       = {2},
  pages        = {178--181},
  year         = {2019},
  url          = {https://doi.org/10.1109/LCA.2019.2916328},
  doi          = {10.1109/LCA.2019.2916328},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cal/BarberBZZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEpact/BarberBZZT19,
  author       = {Kristin Barber and
                  Anys Bacha and
                  Li Zhou and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {SpecShield: Shielding Speculative Data from Microarchitectural Covert
                  Channels},
  booktitle    = {28th International Conference on Parallel Architectures and Compilation
                  Techniques, {PACT} 2019, Seattle, WA, USA, September 23-26, 2019},
  pages        = {151--164},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PACT.2019.00020},
  doi          = {10.1109/PACT.2019.00020},
  timestamp    = {Wed, 13 Nov 2019 18:02:12 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEpact/BarberBZZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenZL19,
  author       = {Guoxing Chen and
                  Yinqian Zhang and
                  Ten{-}Hwang Lai},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{OPERA:} Open Remote Attestation for Intel's Secure Enclaves},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2317--2331},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354220},
  doi          = {10.1145/3319535.3354220},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangBKLCZ19,
  author       = {Huibo Wang and
                  Erick Bauman and
                  Vishal Karande and
                  Zhiqiang Lin and
                  Yueqiang Cheng and
                  Yinqian Zhang},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible
                  Script Code Hardening Approach},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {114--121},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329848},
  doi          = {10.1145/3321705.3329848},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangS19,
  author       = {Yinqian Zhang and
                  Radu Sion},
  editor       = {Radu Sion and
                  Charalampos Papamanthou},
  title        = {Speculative Execution Attacks and Cloud Security},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing
                  Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019},
  pages        = {201},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338466.3360287},
  doi          = {10.1145/3338466.3360287},
  timestamp    = {Thu, 12 Oct 2023 12:32:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZuoWLZ19,
  author       = {Chaoshun Zuo and
                  Haohuang Wen and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Automatic Fingerprinting of Vulnerable {BLE} IoT Devices with Static
                  UUIDs from Mobile Apps},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1469--1483},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354240},
  doi          = {10.1145/3319535.3354240},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZuoWLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/FuZZZ019,
  author       = {Ying Fu and
                  Tao Zhang and
                  Yinqiang Zheng and
                  Debing Zhang and
                  Hua Huang},
  title        = {Hyperspectral Image Super-Resolution With Optimized {RGB} Guidance},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2019, Long Beach, CA, USA, June 16-20, 2019},
  pages        = {11661--11670},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2019},
  url          = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Fu\_Hyperspectral\_Image\_Super-Resolution\_With\_Optimized\_RGB\_Guidance\_CVPR\_2019\_paper.html},
  doi          = {10.1109/CVPR.2019.01193},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/FuZZZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/LvZZ019,
  author       = {Feifan Lv and
                  Yinqiang Zheng and
                  Bohan Zhang and
                  Feng Lu},
  title        = {Turn a Silicon Camera Into an InGaAs Camera},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2019, Long Beach, CA, USA, June 16-20, 2019},
  pages        = {5987--5995},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2019},
  url          = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Lv\_Turn\_a\_Silicon\_Camera\_Into\_an\_InGaAs\_Camera\_CVPR\_2019\_paper.html},
  doi          = {10.1109/CVPR.2019.00614},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/LvZZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/ChenLZZ19,
  author       = {Guoxing Chen and
                  Mengyuan Li and
                  Fengwei Zhang and
                  Yinqian Zhang},
  title        = {Defeating Speculative-Execution Attacks on {SGX} with HyperRace},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937682},
  doi          = {10.1109/DSC47296.2019.8937682},
  timestamp    = {Mon, 16 Mar 2020 18:03:41 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/ChenLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19,
  author       = {Jiongyi Chen and
                  Chaoshun Zuo and
                  Wenrui Diao and
                  Shuaike Dong and
                  Qingchuan Zhao and
                  Menghan Sun and
                  Zhiqiang Lin and
                  Yinqian Zhang and
                  Kehuan Zhang},
  title        = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices
                  and Users},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {222--233},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00034},
  doi          = {10.1109/DSN.2019.00034},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChenCXZLL19,
  author       = {Guoxing Chen and
                  Sanchuan Chen and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Ten{-}Hwang Lai},
  title        = {SgxPectre: Stealing Intel Secrets from {SGX} Enclaves Via Speculative
                  Execution},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {142--157},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00020},
  doi          = {10.1109/EUROSP.2019.00020},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChenCXZLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AhmadJXZSL19,
  author       = {Adil Ahmad and
                  Byunggill Joe and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Insik Shin and
                  Byoungyoung Lee},
  title        = {{OBFUSCURO:} {A} Commodity Obfuscation Engine on Intel {SGX}},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/obfuscuro-a-commodity-obfuscation-engine-on-intel-sgx/},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AhmadJXZSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangHRZ19,
  author       = {Xiaokuan Zhang and
                  Jihun Hamm and
                  Michael K. Reiter and
                  Yinqian Zhang},
  title        = {Statistical Privacy for Streaming Traffic},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/statistical-privacy-for-streaming-traffic/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangHRZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ps/LeiZLZYZ19,
  author       = {Chao Lei and
                  Jie Zhang and
                  Yajie Li and
                  Yongli Zhao and
                  Hao Yu and
                  Yinqiang Zhang},
  title        = {Key Distribution Based on Survival Life Time with {Y-00} Protocol
                  in Optical Fiber Link},
  booktitle    = {2019 24th OptoElectronics and Communications Conference {(OECC)} and
                  2019 International Conference on Photonics in Switching and Computing
                  (PSC), Fukuoka, Japan, July 7-11, 2019},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/PS.2019.8817649},
  doi          = {10.23919/PS.2019.8817649},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ps/LeiZLZYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangZL19,
  author       = {Wubing Wang and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities
                  in Enclave Binaries},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {443--457},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/wang-wubing},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZuoLZ19,
  author       = {Chaoshun Zuo and
                  Zhiqiang Lin and
                  Yinqian Zhang},
  title        = {Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from
                  Mobile Apps},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1296--1310},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00009},
  doi          = {10.1109/SP.2019.00009},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZuoLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiZLS19,
  author       = {Mengyuan Li and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Yan Solihin},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Exploiting Unprotected {I/O} Operations in AMD's Secure Encrypted
                  Virtualization},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1257--1272},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/li-mengyuan},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiZLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangWZTYXLKCS19,
  author       = {Zhe Wang and
                  Chenggang Wu and
                  Yinqian Zhang and
                  Bowen Tang and
                  Pen{-}Chung Yew and
                  Mengyao Xie and
                  Yuanming Lai and
                  Yan Kang and
                  Yueqiang Cheng and
                  Zhiping Shi},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {SafeHidden: An Efficient and Secure Information Hiding Technique Using
                  Re-randomization},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1239--1256},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/wang},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangWZTYXLKCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-08493,
  author       = {Juan Wang and
                  Chengyang Fan and
                  Jie Wang and
                  Yueqiang Cheng and
                  Yinqian Zhang and
                  Wenhui Zhang and
                  Peng Liu and
                  Hongxin Hu},
  title        = {SvTPM: {A} Secure and Efficient vTPM in the Cloud},
  journal      = {CoRR},
  volume       = {abs/1905.08493},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.08493},
  eprinttype    = {arXiv},
  eprint       = {1905.08493},
  timestamp    = {Sat, 18 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-08493.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09312,
  author       = {Tianwei Zhang and
                  Jun Jiang and
                  Yinqian Zhang},
  title        = {Revisiting and Evaluating Software Side-channel Vulnerabilities and
                  Countermeasures in Cryptographic Applications},
  journal      = {CoRR},
  volume       = {abs/1911.09312},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09312},
  eprinttype    = {arXiv},
  eprint       = {1911.09312},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09312.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-00329,
  author       = {Yuan Xiao and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {{SPEECHMINER:} {A} Framework for Investigating and Measuring Speculative
                  Execution Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/1912.00329},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.00329},
  eprinttype    = {arXiv},
  eprint       = {1912.00329},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-00329.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuZLZL18,
  author       = {Bo Lu and
                  Xiaokuan Zhang and
                  Ziman Ling and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {A Measurement Study of Authentication Rate-Limiting Mechanisms of
                  Modern Websites},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274714},
  doi          = {10.1145/3274694.3274714},
  timestamp    = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LuZLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangZL18,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  title        = {Analyzing Cache Side Channels Using Deep Neural Networks},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {174--186},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274715},
  doi          = {10.1145/3274694.3274715},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenLMZLCW18,
  author       = {Sanchuan Chen and
                  Fangfei Liu and
                  Zeyu Mi and
                  Yinqian Zhang and
                  Ruby B. Lee and
                  Haibo Chen and
                  XiaoFeng Wang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {601--608},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196501},
  doi          = {10.1145/3196494.3196501},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenLMZLCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangMLZZZ18,
  author       = {Wei Zhang and
                  Yan Meng and
                  Yugeng Liu and
                  Xiaokuan Zhang and
                  Yinqian Zhang and
                  Haojin Zhu},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {HoMonit: Monitoring Smart Home Apps from Encrypted Traffic},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1074--1088},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243820},
  doi          = {10.1145/3243734.3243820},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangMLZZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/FuZZZH18,
  author       = {Ying Fu and
                  Tao Zhang and
                  Yinqiang Zheng and
                  Debing Zhang and
                  Hua Huang},
  editor       = {Vittorio Ferrari and
                  Martial Hebert and
                  Cristian Sminchisescu and
                  Yair Weiss},
  title        = {Joint Camera Spectral Sensitivity Selection and Hyperspectral Image
                  Recovery},
  booktitle    = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich,
                  Germany, September 8-14, 2018, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11207},
  pages        = {812--828},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01219-9\_48},
  doi          = {10.1007/978-3-030-01219-9\_48},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eccv/FuZZZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/PanBRZZT18,
  author       = {Xiang Pan and
                  Anys Bacha and
                  Spencer Rudolph and
                  Li Zhou and
                  Yinqian Zhang and
                  Radu Teodorescu},
  title        = {NVCool: When Non-Volatile Caches Meet Cold Boot Attacks},
  booktitle    = {36th {IEEE} International Conference on Computer Design, {ICCD} 2018,
                  Orlando, FL, USA, October 7-10, 2018},
  pages        = {439--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCD.2018.00072},
  doi          = {10.1109/ICCD.2018.00072},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/PanBRZZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChenLRZ18,
  author       = {Guoxing Chen and
                  Ten{-}Hwang Lai and
                  Michael K. Reiter and
                  Yinqian Zhang},
  title        = {Differentially Private Access Patterns for Searchable Symmetric Encryption},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {810--818},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486381},
  doi          = {10.1109/INFOCOM.2018.8486381},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ChenLRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TangZZZ18,
  author       = {Di Tang and
                  Zhe Zhou and
                  Yinqian Zhang and
                  Kehuan Zhang},
  title        = {Face Flashing: a Secure Liveness Detection Protocol based on Light
                  Reflections},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2018\_03B-5\_Tang\_paper-updated.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/TangZZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZhangWBZW18,
  author       = {Xiaokuan Zhang and
                  Xueqiang Wang and
                  Xiaolong Bai and
                  Yinqian Zhang and
                  XiaoFeng Wang},
  title        = {OS-level Side Channels without Procfs: Exploring Cross-App Information
                  Leakage on iOS},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05B-4\_Zhang\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZhangWBZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/FuZDX18,
  author       = {Changhong Fu and
                  Yinqiang Zhang and
                  Ran Duan and
                  Zongwu Xie},
  title        = {Robust Scalable Part-Based Visual Tracking for {UAV} with Background-Aware
                  Correlation Filter},
  booktitle    = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO}
                  2018, Kuala Lumpur, Malaysia, December 12-15, 2018},
  pages        = {2245--2252},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ROBIO.2018.8665251},
  doi          = {10.1109/ROBIO.2018.8665251},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/robio/FuZDX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenWCCZWLL18,
  author       = {Guoxing Chen and
                  Wenhao Wang and
                  Tianyu Chen and
                  Sanchuan Chen and
                  Yinqian Zhang and
                  XiaoFeng Wang and
                  Ten{-}Hwang Lai and
                  Dongdai Lin},
  title        = {Racing in Hyperspace: Closing Hyper-Threading Side Channels on {SGX}
                  with Contrived Data Races},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {178--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00024},
  doi          = {10.1109/SP.2018.00024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenWCCZWLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhouQRZ18,
  author       = {Ziqiao Zhou and
                  Zhiyun Qian and
                  Michael K. Reiter and
                  Yinqian Zhang},
  title        = {Static Evaluation of Noninterference Using Approximate Model Counting},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {514--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00052},
  doi          = {10.1109/SP.2018.00052},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhouQRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/WangLZRS18,
  author       = {Liang Wang and
                  Mengyuan Li and
                  Yinqian Zhang and
                  Thomas Ristenpart and
                  Michael M. Swift},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {Peeking Behind the Curtains of Serverless Platforms},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {133--146},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/wang-liang},
  timestamp    = {Sat, 25 Feb 2023 23:39:37 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/WangLZRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-01949,
  author       = {Di Tang and
                  Zhe Zhou and
                  Yinqian Zhang and
                  Kehuan Zhang},
  title        = {Face Flashing: a Secure Liveness Detection Protocol based on Light
                  Reflections},
  journal      = {CoRR},
  volume       = {abs/1801.01949},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.01949},
  eprinttype    = {arXiv},
  eprint       = {1801.01949},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-01949.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-09085,
  author       = {Guoxing Chen and
                  Sanchuan Chen and
                  Yuan Xiao and
                  Yinqian Zhang and
                  Zhiqiang Lin and
                  Ten{-}Hwang Lai},
  title        = {SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution},
  journal      = {CoRR},
  volume       = {abs/1802.09085},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.09085},
  eprinttype    = {arXiv},
  eprint       = {1802.09085},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-09085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/XiaoRZ17,
  author       = {Qiuyu Xiao and
                  Michael K. Reiter and
                  Yinqian Zhang},
  title        = {Personalized Pseudonyms for Servers in the Cloud},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {271--289},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0049},
  doi          = {10.1515/POPETS-2017-0049},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/XiaoRZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenZRZ17,
  author       = {Sanchuan Chen and
                  Xiaokuan Zhang and
                  Michael K. Reiter and
                  Yinqian Zhang},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Detecting Privileged Side-Channel Attacks in Shielded Execution with
                  D{\'{e}}j{\`{a}} Vu},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {7--18},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053007},
  doi          = {10.1145/3052973.3053007},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenZRZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangCPZWBTG17,
  author       = {Wenhao Wang and
                  Guoxing Chen and
                  Xiaorui Pan and
                  Yinqian Zhang and
                  XiaoFeng Wang and
                  Vincent Bindschaedler and
                  Haixu Tang and
                  Carl A. Gunter},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
                  Hazards in {SGX}},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2421--2434},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134038},
  doi          = {10.1145/3133956.3134038},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangCPZWBTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiaoLCZ17,
  author       = {Yuan Xiao and
                  Mengyuan Li and
                  Sanchuan Chen and
                  Yinqian Zhang},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{STACCO:} Differentially Analyzing Side-Channel Traces for Detecting
                  {SSL/TLS} Vulnerabilities in Secure Enclaves},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {859--874},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134016},
  doi          = {10.1145/3133956.3134016},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XiaoLCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Zhang17,
  author       = {Yinqian Zhang},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Cache Side Channels: State of the Art and Research Opportunities},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2617--2619},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3136064},
  doi          = {10.1145/3133956.3136064},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Zhang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZL17,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {DoS Attacks on Your Memory in Cloud},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {253--265},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052978},
  doi          = {10.1145/3052973.3052978},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GuZZL17,
  author       = {Yufei Gu and
                  Qingchuan Zhao and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {{PT-CFI:} Transparent Backward-Edge Control Flow Violation Detection
                  Using Intel Processor Trace},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {173--184},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029830},
  doi          = {10.1145/3029806.3029830},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GuZZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/ZhangFZH17,
  author       = {Lin Zhang and
                  Ying Fu and
                  Yinqiang Zheng and
                  Hua Huang},
  title        = {Camera spectral sensitivity, illumination and spectral reflectance
                  estimation for a hybrid hyperspectral image capture system},
  booktitle    = {2017 {IEEE} International Conference on Image Processing, {ICIP} 2017,
                  Beijing, China, September 17-20, 2017},
  pages        = {545},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICIP.2017.8296340},
  doi          = {10.1109/ICIP.2017.8296340},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/ZhangFZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangCPZWBTG17,
  author       = {Wenhao Wang and
                  Guoxing Chen and
                  Xiaorui Pan and
                  Yinqian Zhang and
                  XiaoFeng Wang and
                  Vincent Bindschaedler and
                  Haixu Tang and
                  Carl A. Gunter},
  title        = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
                  Hazards in {SGX}},
  journal      = {CoRR},
  volume       = {abs/1705.07289},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.07289},
  eprinttype    = {arXiv},
  eprint       = {1705.07289},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangCPZWBTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/XiaoLCZ17,
  author       = {Yuan Xiao and
                  Mengyuan Li and
                  Sanchuan Chen and
                  Yinqian Zhang},
  title        = {Stacco: Differentially Analyzing Side-Channel Traces for Detecting
                  {SSL/TLS} Vulnerabilities in Secure Enclaves},
  journal      = {CoRR},
  volume       = {abs/1707.03473},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.03473},
  eprinttype    = {arXiv},
  eprint       = {1707.03473},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/XiaoLCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangXZ16,
  author       = {Xiaokuan Zhang and
                  Yuan Xiao and
                  Yinqian Zhang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Return-Oriented Flush-Reload Side Channels on {ARM} and Their Implications
                  for Android Devices},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {858--870},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978360},
  doi          = {10.1145/2976749.2978360},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangXZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouRZ16,
  author       = {Ziqiao Zhou and
                  Michael K. Reiter and
                  Yinqian Zhang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {A Software Approach to Defeating Side Channels in Last-Level Caches},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {871--882},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978324},
  doi          = {10.1145/2976749.2978324},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouRZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangZL16,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {CloudRadar: {A} Real-Time Side-Channel Attack Detection System in
                  Clouds},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {118--140},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_6},
  doi          = {10.1007/978-3-319-45719-2\_6},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XiaoZZT16,
  author       = {Yuan Xiao and
                  Xiaokuan Zhang and
                  Yinqian Zhang and
                  Radu Teodorescu},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege
                  Escalation},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {19--35},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xiao},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/XiaoZZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangZL16,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  title        = {Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation},
  journal      = {CoRR},
  volume       = {abs/1603.03404},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.03404},
  eprinttype    = {arXiv},
  eprint       = {1603.03404},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhouRZ16,
  author       = {Ziqiao Zhou and
                  Michael K. Reiter and
                  Yinqian Zhang},
  title        = {A software approach to defeating side channels in last-level caches},
  journal      = {CoRR},
  volume       = {abs/1603.05615},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.05615},
  eprinttype    = {arXiv},
  eprint       = {1603.05615},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhouRZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiaoRZ15,
  author       = {Qiuyu Xiao and
                  Michael K. Reiter and
                  Yinqian Zhang},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Mitigating Storage Side Channels Using Statistical Privacy Mechanisms},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1582--1594},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813645},
  doi          = {10.1145/2810103.2813645},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XiaoRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/VaradarajanZRS15,
  author       = {Venkatanathan Varadarajan and
                  Yinqian Zhang and
                  Thomas Ristenpart and
                  Michael M. Swift},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {A Placement Vulnerability Study in Multi-Tenant Public Clouds},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {913--928},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/varadarajan},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/VaradarajanZRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VaradarajanZRS15,
  author       = {Venkatanathan Varadarajan and
                  Yinqian Zhang and
                  Thomas Ristenpart and
                  Michael M. Swift},
  title        = {A Placement Vulnerability Study in Multi-tenant Public Clouds},
  journal      = {CoRR},
  volume       = {abs/1507.03114},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.03114},
  eprinttype    = {arXiv},
  eprint       = {1507.03114},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VaradarajanZRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJRR14,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Cross-Tenant Side-Channel Attacks in PaaS Clouds},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {990--1003},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660356},
  doi          = {10.1145/2660267.2660356},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangJRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangR13,
  author       = {Yinqian Zhang and
                  Michael K. Reiter},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {D{\"{u}}ppel: retrofitting commodity operating systems to mitigate
                  cache side channels in the cloud},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {827--838},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516741},
  doi          = {10.1145/2508859.2516741},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJRR12,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Cross-VM side channels and their use to extract private keys},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {305--316},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382230},
  doi          = {10.1145/2382196.2382230},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangJRR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfce/CuiZWZ11,
  author       = {Tingting Cui and
                  XinBin Zhao and
                  Zhe Wang and
                  Yinqian Zhang},
  editor       = {Sabo Sambath and
                  Egui Zhu},
  title        = {Weight in Competitive K-Means Algorithm},
  booktitle    = {Frontiers in Computer Education [International Conference on Frontiers
                  in Computer Education, {ICFCE} 2011, Macao, China, December 1-2, 2011]},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {133},
  pages        = {1077--1084},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27552-4\_140},
  doi          = {10.1007/978-3-642-27552-4\_140},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfce/CuiZWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangJOR11,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Alina Oprea and
                  Michael K. Reiter},
  title        = {HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {313--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.31},
  doi          = {10.1109/SP.2011.31},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangJOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangMR10,
  author       = {Yinqian Zhang and
                  Fabian Monrose and
                  Michael K. Reiter},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {The security of modern password expiration: an algorithmic framework
                  and empirical analysis},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {176--186},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866328},
  doi          = {10.1145/1866307.1866328},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nems/ZhangWX10,
  author       = {Yinqiang Zhang and
                  Shourong Wang and
                  Dunzhu Xia},
  title        = {EMD-based denoising methods in the {MEMS} gyroscope de-drift},
  booktitle    = {5th {IEEE} International Conference on Nano/Micro Engineered and Molecular
                  Systems, {NEMS} 2010, Xiamen, China, January 20-23, 2010},
  pages        = {591--594},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/NEMS.2010.5592471},
  doi          = {10.1109/NEMS.2010.5592471},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/nems/ZhangWX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/ZhangZL09,
  author       = {Ming Zhang and
                  Yinqiang Zheng and
                  Yuncai Liu},
  title        = {Using silhouette for pose estimation of object with surface of revolution},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2009, 7-10 November 2009, Cairo, Egypt},
  pages        = {333--336},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICIP.2009.5413643},
  doi          = {10.1109/ICIP.2009.5413643},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/ZhangZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhangFWX08,
  author       = {Yinqian Zhang and
                  Xun Fan and
                  Yijun Wang and
                  Zhi Xue},
  title        = {Attack Grammar: {A} New Approach to Modeling and Analyzing Network
                  Attack Sequences},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.34},
  doi          = {10.1109/ACSAC.2008.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhangFWX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/DuanZG08,
  author       = {Bing Duan and
                  Yinqian Zhang and
                  Dawu Gu},
  title        = {An Easy-to-Deploy Penetration Testing Platform},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {2314--2318},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.335},
  doi          = {10.1109/ICYCS.2008.335},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/DuanZG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/ZhangFXX08,
  author       = {Yinqian Zhang and
                  Xun Fan and
                  Zhi Xue and
                  Hao Xu},
  title        = {Two Stochastic Models for Security Evaluation Based on Attack Graph},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {2198--2203},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.406},
  doi          = {10.1109/ICYCS.2008.406},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/ZhangFXX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics