Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Yinqian Zhang"
@article{DBLP:journals/ral/LuZZQPFP24, author = {Liang Lu and Yinqiang Zhang and Peng Zhou and Jiaming Qi and Yipeng Pan and Changhong Fu and Jia Pan}, title = {Semantics-Aware Receding Horizon Planner for Object-Centric Active Mapping}, journal = {{IEEE} Robotics Autom. Lett.}, volume = {9}, number = {4}, pages = {3838--3845}, year = {2024}, url = {https://doi.org/10.1109/lra.2024.3371873}, doi = {10.1109/LRA.2024.3371873}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ral/LuZZQPFP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/LiuWLQJLZQ24, author = {Chang Liu and Dongsheng Wang and Yongqiang Lyu and Pengfei Qiu and Yu Jin and Zhuoyuan Lu and Yinqian Zhang and Gang Qu}, title = {Uncovering and Exploiting {AMD} Speculative Memory Access Predictors for Fun and Profit}, booktitle = {{IEEE} International Symposium on High-Performance Computer Architecture, {HPCA} 2024, Edinburgh, United Kingdom, March 2-6, 2024}, pages = {31--45}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/HPCA57654.2024.00014}, doi = {10.1109/HPCA57654.2024.00014}, timestamp = {Wed, 17 Apr 2024 17:17:11 +0200}, biburl = {https://dblp.org/rec/conf/hpca/LiuWLQJLZQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-18784, author = {Yi Zeng and Feifei Zhao and Yuxuan Zhao and Dongcheng Zhao and Enmeng Lu and Qian Zhang and Yuwei Wang and Hui Feng and Zhuoya Zhao and Jihang Wang and Qingqun Kong and Yinqian Sun and Yang Li and Guobin Shen and Bing Han and Yiting Dong and Wenxuan Pan and Xiang He and Aorigele Bao and Jin Wang}, title = {Brain-inspired and Self-based Artificial Intelligence}, journal = {CoRR}, volume = {abs/2402.18784}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.18784}, doi = {10.48550/ARXIV.2402.18784}, eprinttype = {arXiv}, eprint = {2402.18784}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-18784.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChungZP23, author = {Wingyan Chung and Yinqiang Zhang and Jia Pan}, title = {A Theory-based Deep-Learning Approach to Detecting Disinformation in Financial Social Media}, journal = {Inf. Syst. Frontiers}, volume = {25}, number = {2}, pages = {473--492}, year = {2023}, url = {https://doi.org/10.1007/s10796-022-10327-9}, doi = {10.1007/S10796-022-10327-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/ChungZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/patterns/ZengZZSDLZSLZZFWLLDKRB23, author = {Yi Zeng and Dongcheng Zhao and Feifei Zhao and Guobin Shen and Yiting Dong and Enmeng Lu and Qian Zhang and Yinqian Sun and Qian Liang and Yuxuan Zhao and Zhuoya Zhao and Hongjian Fang and Yuwei Wang and Yang Li and Xin Liu and Chengcheng Du and Qingqun Kong and Zizhe Ruan and Weida Bi}, title = {BrainCog: {A} spiking neural network based, brain-inspired cognitive intelligence engine for brain-inspired {AI} and brain simulation}, journal = {Patterns}, volume = {4}, number = {8}, pages = {100789}, year = {2023}, url = {https://doi.org/10.1016/j.patter.2023.100789}, doi = {10.1016/J.PATTER.2023.100789}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/patterns/ZengZZSDLZSLZZFWLLDKRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/XueZDSW23, author = {Chao Xue and Yinqiang Zhang and Song Ding and Cheng Song and Yiqing Wang}, title = {Comparison Research on Characterization and Evaluation Approaches for Paint Coated Corrosion Using Eddy Current Pulsed Thermography}, journal = {Sensors}, volume = {23}, number = {15}, pages = {6889}, year = {2023}, url = {https://doi.org/10.3390/s23156889}, doi = {10.3390/S23156889}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/XueZDSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/TangWYZXLKWWW23, author = {Bowen Tang and Chenggang Wu and Pen{-}Chung Yew and Yinqian Zhang and Mengyao Xie and Yuanming Lai and Yan Kang and Wei Wang and Qiang Wei and Zhe Wang}, title = {SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {42}, number = {12}, pages = {4477--4490}, year = {2023}, url = {https://doi.org/10.1109/TCAD.2023.3284290}, doi = {10.1109/TCAD.2023.3284290}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/TangWYZXLKWWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/WangWFYCZZYH23, author = {Juan Wang and Jie Wang and Chengyang Fan and Fei Yan and Yueqiang Cheng and Yinqian Zhang and Wenhui Zhang and Mengda Yang and Hongxin Hu}, title = {SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {2936--2953}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3243891}, doi = {10.1109/TCC.2023.3243891}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/WangWFYCZZYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenZ23, author = {Guoxing Chen and Yinqian Zhang}, title = {Securing TEEs With Verifiable Execution Contracts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3222--3237}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3194871}, doi = {10.1109/TDSC.2022.3194871}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NiuGHZZF23, author = {Jianyu Niu and Fangyu Gai and Runchao Han and Ren Zhang and Yinqian Zhang and Chen Feng}, title = {Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {4154--4168}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3216749}, doi = {10.1109/TDSC.2022.3216749}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NiuGHZZF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangWWJYCZWX23, author = {Bowen Tang and Chenggang Wu and Zhe Wang and Lichen Jia and Pen{-}Chung Yew and Yueqiang Cheng and Yinqian Zhang and Chenxi Wang and Guoqing Harry Xu}, title = {SpecBox: {A} Label-Based Transparent Speculation Scheme Against Transient Execution Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {827--840}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3144287}, doi = {10.1109/TDSC.2022.3144287}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/TangWWJYCZWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuXWZLZLKYL23, author = {Chenggang Wu and Mengyao Xie and Zhe Wang and Yinqian Zhang and Kangjie Lu and Xiaofeng Zhang and Yuanming Lai and Yan Kang and Min Yang and Tao Li}, title = {Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {1959--1978}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3168089}, doi = {10.1109/TDSC.2022.3168089}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WuXWZLZLKYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/GuoZ23, author = {Yinqian Guo and Hongtao Zhang}, title = {3D Boundary Modeling and Handover Analysis of Aerial Users in Heterogeneous Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {10}, pages = {13523--13529}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3276890}, doi = {10.1109/TVT.2023.3276890}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/GuoZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caasafeproc/ZhangJZLZ23, author = {Peng Zhang and Wenhua Jiao and Yinqiang Zhang and Lijuan Li and Dengfeng Zhang}, title = {Improved U-Net for Industrial Image Denoising}, booktitle = {{CAA} Symposium on Fault Detection, Supervision and Safety for Technical Processes, {SAFEPROCESS} 2023, Yibin, China, September 22-24, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SAFEPROCESS58597.2023.10295854}, doi = {10.1109/SAFEPROCESS58597.2023.10295854}, timestamp = {Thu, 16 Nov 2023 16:58:41 +0100}, biburl = {https://dblp.org/rec/conf/caasafeproc/ZhangJZLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuX0ZLHLKWW023, author = {Jiali Xu and Mengyao Xie and Chenggang Wu and Yinqian Zhang and Qijing Li and Xuan Huang and Yuanming Lai and Yan Kang and Wei Wang and Qiang Wei and Zhe Wang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {{PANIC:} PAN-assisted Intra-process Memory Isolation on {ARM}}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {919--933}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623206}, doi = {10.1145/3576915.3623206}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuX0ZLHLKWW023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/CaoMYWZZDLSTSLZSCMCZCXLBSHZAHWYZZLCRZW23, author = {Mingdeng Cao and Chong Mou and Fanghua Yu and Xintao Wang and Yinqiang Zheng and Jian Zhang and Chao Dong and Gen Li and Ying Shan and Radu Timofte and Xiaopeng Sun and Weiqi Li and Zhenyu Zhang and Xuhan Sheng and Bin Chen and Haoyu Ma and Ming Cheng and Shijie Zhao and Wanwan Cui and Tianyu Xu and Chunyang Li and Long Bao and Heng Sun and Huaibo Huang and Xiaoqiang Zhou and Yuang Ai and Ran He and Renlong Wu and Yi Yang and Zhilu Zhang and Shuohao Zhang and Junyi Li and Yunjin Chen and Dongwei Ren and Wangmeng Zuo and Qian Wang and Hao{-}Hsiang Yang and Yi{-}Chung Chen and Zhi{-}Kai Huang and Wei{-}Ting Chen and Yuan{-}Chun Chiang and Hua{-}En Chang and I{-}Hsiang Chen and Chia{-}Hsuan Hsieh and Sy{-}Yen Kuo and Zebin Zhang and Jiaqi Zhang and Yuhui Wang and Shuhao Cui and Junshi Huang and Li Zhu and Shuman Tian and Wei Yu and Bingchun Luo}, title = {{NTIRE} 2023 Challenge on 360{\textdegree} Omnidirectional Image and Video Super-Resolution: Datasets, Methods and Results}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023 - Workshops, Vancouver, BC, Canada, June 17-24, 2023}, pages = {1731--1745}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPRW59228.2023.00174}, doi = {10.1109/CVPRW59228.2023.00174}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/CaoMYWZZDLSTSLZSCMCZCXLBSHZAHWYZZLCRZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WangLZL23, author = {Wubing Wang and Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, editor = {Daniel Gruss and Federico Maggi and Mathias Fischer and Michele Carminati}, title = {PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on {AMD} {SEV}}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, {DIMVA} 2023, Hamburg, Germany, July 12-14, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13959}, pages = {46--66}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35504-2\_3}, doi = {10.1007/978-3-031-35504-2\_3}, timestamp = {Tue, 20 Jun 2023 14:45:29 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WangLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GhaniyounB0ZT23, author = {Moein Ghaniyoun and Kristin Barber and Yuan Xiao and Yinqian Zhang and Radu Teodorescu}, editor = {Yan Solihin and Mark A. Heinrich}, title = {TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments}, booktitle = {Proceedings of the 50th Annual International Symposium on Computer Architecture, {ISCA} 2023, Orlando, FL, USA, June 17-21, 2023}, pages = {35:1--35:15}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579371.3589070}, doi = {10.1145/3579371.3589070}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/GhaniyounB0ZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0002XCZZL23, author = {Shixuan Zhao and Pinshen Xu and Guoxing Chen and Mengya Zhang and Yinqian Zhang and Zhiqiang Lin}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Reusable Enclaves for Confidential Serverless Computing}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4015--4032}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhao-shixuan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002XCZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLZ23, author = {Sanchuan Chen and Zhiqiang Lin and Yinqian Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Controlled Data Races in Enclaves: Attacks and Detection}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4069--4086}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-sanchuan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DengLTWYZ23, author = {Sen Deng and Mengyuan Li and Yining Tang and Shuai Wang and Shoumeng Yan and Yinqian Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6843--6860}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/deng-sen}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DengLTWYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunLZ23, author = {Zhiyuan Sun and Xiapu Luo and Yinqian Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Panda: Security Analysis of Algorand Smart Contracts}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1811--1828}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/sun}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SunLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-00947, author = {Bowen Tang and Chenggang Wu and Pen{-}Chung Yew and Yinqian Zhang and Mengyao Xie and Yuanming Lai and Yan Kang and Wei Wang and Qiang Wei and Zhe Wang}, title = {{SPECWANDS:} An Efficient Priority-based Scheduler Against Speculation Contention Attacks}, journal = {CoRR}, volume = {abs/2302.00947}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.00947}, doi = {10.48550/ARXIV.2302.00947}, eprinttype = {arXiv}, eprint = {2302.00947}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-00947.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-14356, author = {Tingxiang Fan and Bowen Shen and Yinqiang Zhang and Chuye Zhang and Lei Yang and Hua Chen and Wei Zhang and Jia Pan}, title = {{SMAT:} {A} Self-Reinforcing Framework for Simultaneous Mapping and Tracking in Unbounded Urban Environments}, journal = {CoRR}, volume = {abs/2304.14356}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.14356}, doi = {10.48550/ARXIV.2304.14356}, eprinttype = {arXiv}, eprint = {2304.14356}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-14356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-13875, author = {Zhiling Guo and Yinqiang Zheng and Haoran Zhang and Xiaodan Shi and Zekun Cai and Ryosuke Shibasaki and Jinyue Yan}, title = {Real-World Video for Zoom Enhancement based on Spatio-Temporal Coupling}, journal = {CoRR}, volume = {abs/2306.13875}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.13875}, doi = {10.48550/ARXIV.2306.13875}, eprinttype = {arXiv}, eprint = {2306.13875}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-13875.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00741, author = {Jianyu Niu and Fangyu Gai and Runchao Han and Ren Zhang and Yinqian Zhang and Chen Feng}, title = {Crystal: Enhancing Blockchain Mining Transparency with Quorum Certificate}, journal = {CoRR}, volume = {abs/2312.00741}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00741}, doi = {10.48550/ARXIV.2312.00741}, eprinttype = {arXiv}, eprint = {2312.00741}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-12573, author = {Mengya Zhang and Xiaokuan Zhang and Josh Barbee and Yinqian Zhang and Zhiqiang Lin}, title = {SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems}, journal = {CoRR}, volume = {abs/2312.12573}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.12573}, doi = {10.48550/ARXIV.2312.12573}, eprinttype = {arXiv}, eprint = {2312.12573}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-12573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cal/BarberGZT22, author = {Kristin Barber and Moein Ghaniyoun and Yinqian Zhang and Radu Teodorescu}, title = {A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities in Security Critical Applications}, journal = {{IEEE} Comput. Archit. Lett.}, volume = {21}, number = {1}, pages = {9--12}, year = {2022}, url = {https://doi.org/10.1109/LCA.2022.3151256}, doi = {10.1109/LCA.2022.3151256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cal/BarberGZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LouZJZ21, author = {Xiaoxuan Lou and Tianwei Zhang and Jun Jiang and Yinqian Zhang}, title = {A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {6}, pages = {122:1--122:37}, year = {2022}, url = {https://doi.org/10.1145/3456629}, doi = {10.1145/3456629}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/LouZJZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/ChakrabortiCKNS22, author = {Anrin Chakraborti and Reza Curtmola and Jonathan Katz and Jason Nieh and Ahmad{-}Reza Sadeghi and Radu Sion and Yinqian Zhang}, title = {Cloud Computing Security: Foundations and Research Directions}, journal = {Found. Trends Priv. Secur.}, volume = {3}, number = {2}, pages = {103--213}, year = {2022}, url = {https://doi.org/10.1561/3300000028}, doi = {10.1561/3300000028}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/ChakrabortiCKNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhangHRZ22, author = {Xiaokuan Zhang and Jihun Hamm and Michael K. Reiter and Yinqian Zhang}, title = {Defeating traffic analysis via differential privacy: a case study on streaming traffic}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {3}, pages = {689--706}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00574-3}, doi = {10.1007/S10207-021-00574-3}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ZhangHRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/FuZZZH22, author = {Ying Fu and Tao Zhang and Yinqiang Zheng and Debing Zhang and Hua Huang}, title = {Joint Camera Spectral Response Selection and Hyperspectral Image Recovery}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {44}, number = {1}, pages = {256--272}, year = {2022}, url = {https://doi.org/10.1109/TPAMI.2020.3009999}, doi = {10.1109/TPAMI.2020.3009999}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/FuZZZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/ZhangZL22, author = {Mingfang Zhang and Yinqiang Zheng and Feng Lu}, title = {Optical Flow in the Dark}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {44}, number = {12}, pages = {9464--9476}, year = {2022}, url = {https://doi.org/10.1109/TPAMI.2021.3130302}, doi = {10.1109/TPAMI.2021.3130302}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/ZhangZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ral/ZhangZHZP22, author = {Zeqing Zhang and Yinqiang Zhang and Ruihua Han and Liangjun Zhang and Jia Pan}, title = {A Generalized Continuous Collision Detection Framework of Polynomial Trajectory for Mobile Robots in Cluttered Environments}, journal = {{IEEE} Robotics Autom. Lett.}, volume = {7}, number = {4}, pages = {9810--9817}, year = {2022}, url = {https://doi.org/10.1109/LRA.2022.3191934}, doi = {10.1109/LRA.2022.3191934}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ral/ZhangZHZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/00170ZTYXLKC022, author = {Zhe Wang and Chenggang Wu and Yinqian Zhang and Bowen Tang and Pen{-}Chung Yew and Mengyao Xie and Yuanming Lai and Yan Kang and Yueqiang Cheng and Zhiping Shi}, title = {Making Information Hiding Effective Again}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2576--2594}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3064086}, doi = {10.1109/TDSC.2021.3064086}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/00170ZTYXLKC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cc/ZhangBZ22, author = {Rui Zhang and Michael D. Bond and Yinqian Zhang}, editor = {Bernhard Egger and Aaron Smith}, title = {Cape: compiler-aided program transformation for HTM-based cache side-channel defense}, booktitle = {{CC} '22: 31st {ACM} {SIGPLAN} International Conference on Compiler Construction, Seoul, South Korea, April 2 - 3, 2022}, pages = {181--193}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3497776.3517778}, doi = {10.1145/3497776.3517778}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cc/ZhangBZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0005DNRZ22, author = {Weili Wang and Sen Deng and Jianyu Niu and Michael K. Reiter and Yinqian Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{ENGRAFT:} Enclave-guarded Raft on Byzantine Faulty Nodes}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2841--2855}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560639}, doi = {10.1145/3548606.3560639}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0005DNRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NiuPZZ22, author = {Jianyu Niu and Wei Peng and Xiaokuan Zhang and Yinqian Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{NARRATOR:} Secure and Practical State Continuity for Trusted Execution in the Cloud}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2385--2399}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560620}, doi = {10.1145/3548606.3560620}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NiuPZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Xie0ZXLKW022, author = {Mengyao Xie and Chenggang Wu and Yinqian Zhang and Jiali Xu and Yuanming Lai and Yan Kang and Wei Wang and Zhe Wang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{CETIS:} Retrofitting Intel {CET} for Generic and Efficient Intra-process Memory Isolation}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2989--3002}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559344}, doi = {10.1145/3548606.3559344}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Xie0ZXLKW022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LinZYZLP22, author = {Shijie Lin and Yinqiang Zhang and Lei Yu and Bin Zhou and Xiaowei Luo and Jia Pan}, title = {Autofocus for Event Cameras}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {16323--16332}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01586}, doi = {10.1109/CVPR52688.2022.01586}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LinZYZLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/CaoZFWZWYZ22, author = {Mingdeng Cao and Zhihang Zhong and Yanbo Fan and Jiahao Wang and Yong Zhang and Jue Wang and Yujiu Yang and Yinqiang Zheng}, editor = {Leonid Karlinsky and Tomer Michaeli and Ko Nishino}, title = {Towards Real-World Video Deblurring by Exploring Blur Formation Process}, booktitle = {Computer Vision - {ECCV} 2022 Workshops - Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13802}, pages = {327--343}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25063-7\_20}, doi = {10.1007/978-3-031-25063-7\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eccv/CaoZFWZWYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itsc/KrasowskiZA22, author = {Hanna Krasowski and Yinqiang Zhang and Matthias Althoff}, title = {Safe Reinforcement Learning for Urban Driving using Invariably Safe Braking Sets}, booktitle = {25th {IEEE} International Conference on Intelligent Transportation Systems, {ITSC} 2022, Macau, China, October 8-12, 2022}, pages = {2407--2414}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ITSC55140.2022.9922166}, doi = {10.1109/ITSC55140.2022.9922166}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itsc/KrasowskiZA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangCZL22, author = {Huibo Wang and Guoxing Chen and Yinqian Zhang and Zhiqiang Lin}, title = {Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-253/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/WangCZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seed/ZhouXTZ22, author = {Jiuqin Zhou and Yuan Xiao and Radu Teodorescu and Yinqian Zhang}, title = {{ENCLYZER:} Automated Analysis of Transient Data Leaks on Intel {SGX}}, booktitle = {2022 {IEEE} International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, September 26-27, 2022}, pages = {145--156}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SEED55351.2022.00020}, doi = {10.1109/SEED55351.2022.00020}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seed/ZhouXTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiWW0TZ22, author = {Mengyuan Li and Luca Wilke and Jan Wichelmann and Thomas Eisenbarth and Radu Teodorescu and Yinqian Zhang}, title = {A Systematic Look at Ciphertext Side Channels on {AMD} {SEV-SNP}}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {337--351}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833768}, doi = {10.1109/SP46214.2022.9833768}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiWW0TZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhaoLZL22, author = {Shixuan Zhao and Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, title = {vSGX: Virtualizing {SGX} Enclaves on {AMD} {SEV}}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {321--336}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833694}, doi = {10.1109/SP46214.2022.9833694}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhaoLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenZ22, author = {Guoxing Chen and Yinqian Zhang}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{MAGE:} Mutual Attestation for a Group of Enclaves without Trusted Third Parties}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4095--4110}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chen-guoxing}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-12321, author = {Shijie Lin and Yinqiang Zhang and Lei Yu and Bin Zhou and Xiaowei Luo and Jia Pan}, title = {Autofocus for Event Cameras}, journal = {CoRR}, volume = {abs/2203.12321}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.12321}, doi = {10.48550/ARXIV.2203.12321}, eprinttype = {arXiv}, eprint = {2203.12321}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-12321.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-13175, author = {Zeqing Zhang and Yinqiang Zhang and Ruihua Han and Liangjun Zhang and Jia Pan}, title = {A Generalized Continuous Collision Detection Framework of Polynomial Trajectory for Mobile Robots in Cluttered Environments}, journal = {CoRR}, volume = {abs/2206.13175}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.13175}, doi = {10.48550/ARXIV.2206.13175}, eprinttype = {arXiv}, eprint = {2206.13175}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-13175.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-08533, author = {Yi Zeng and Dongcheng Zhao and Feifei Zhao and Guobin Shen and Yiting Dong and Enmeng Lu and Qian Zhang and Yinqian Sun and Qian Liang and Yuxuan Zhao and Zhuoya Zhao and Hongjian Fang and Yuwei Wang and Yang Li and Xin Liu and Chengcheng Du and Qingqun Kong and Zizhe Ruan and Weida Bi}, title = {BrainCog: {A} Spiking Neural Network based Brain-inspired Cognitive Intelligence Engine for Brain-inspired {AI} and Brain Simulation}, journal = {CoRR}, volume = {abs/2207.08533}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.08533}, doi = {10.48550/ARXIV.2207.08533}, eprinttype = {arXiv}, eprint = {2207.08533}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-08533.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-02858, author = {Xingyu Lyu and Mengya Zhang and Xiaokuan Zhang and Jianyu Niu and Yinqian Zhang and Zhiqiang Lin}, title = {An Empirical Study on Ethereum Private Transactions and the Security Implications}, journal = {CoRR}, volume = {abs/2208.02858}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.02858}, doi = {10.48550/ARXIV.2208.02858}, eprinttype = {arXiv}, eprint = {2208.02858}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-02858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-13184, author = {Mingdeng Cao and Zhihang Zhong and Yanbo Fan and Jiahao Wang and Yong Zhang and Jue Wang and Yujiu Yang and Yinqiang Zheng}, title = {Towards Real-World Video Deblurring by Exploring Blur Formation Process}, journal = {CoRR}, volume = {abs/2208.13184}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.13184}, doi = {10.48550/ARXIV.2208.13184}, eprinttype = {arXiv}, eprint = {2208.13184}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-13184.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/SuLXZZ21, author = {Yinqiang Su and Jinghong Liu and Fang Xu and Xueming Zhang and Yujia Zuo}, title = {A Novel Anti-Drift Visual Object Tracking Algorithm Based on Sparse Response and Adaptive Spatial-Temporal Context-Aware}, journal = {Remote. Sens.}, volume = {13}, number = {22}, pages = {4672}, year = {2021}, url = {https://doi.org/10.3390/rs13224672}, doi = {10.3390/RS13224672}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/SuLXZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/LiFHZP21, author = {Yiming Li and Changhong Fu and Ziyuan Huang and Yinqiang Zhang and Jia Pan}, title = {Intermittent Contextual Learning for Keyfilter-Aware {UAV} Object Tracking Using Deep Convolutional Feature}, journal = {{IEEE} Trans. Multim.}, volume = {23}, pages = {810--822}, year = {2021}, url = {https://doi.org/10.1109/TMM.2020.2990064}, doi = {10.1109/TMM.2020.2990064}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/LiFHZP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiZWLC21, author = {Mengyuan Li and Yinqian Zhang and Huibo Wang and Kang Li and Yueqiang Cheng}, title = {{TLB} Poisoning Attacks on {AMD} Secure Encrypted Virtualization}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {609--619}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485876}, doi = {10.1145/3485832.3485876}, timestamp = {Tue, 07 Dec 2021 18:41:40 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiZWLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/ZhangZ00ZLLL21, author = {Zeyu Zhang and Xiaoli Zhang and Qi Li and Kun Sun and Yinqian Zhang and Songsong Liu and Yukun Liu and Xiaoning Li}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {See through Walls: Detecting Malware in {SGX} Enclaves with SGX-Bouncer}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {931--943}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437531}, doi = {10.1145/3433210.3437531}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/ZhangZ00ZLLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZL21, author = {Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {CrossLine: Breaking "Security-by-Crash" based Memory Isolation in {AMD} {SEV}}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2937--2950}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485253}, doi = {10.1145/3460120.3485253}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/BiZLHZHL21, author = {Qunchao Bi and Taibin Zhou and Huanhuan Lai and Jiajia Huang and Duxi Zhang and Yinqiang Huang and Bo Li}, title = {A Smart and Safe Robot System for Electric Monitoring}, booktitle = {8th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2021/7th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28, 2021}, pages = {121--126}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00031}, doi = {10.1109/CSCLOUD-EDGECOM52276.2021.00031}, timestamp = {Thu, 05 Aug 2021 09:37:29 +0200}, biburl = {https://dblp.org/rec/conf/cscloud/BiZLHZHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WangCCZL21, author = {Wubing Wang and Guoxing Chen and Yueqiang Cheng and Yinqian Zhang and Zhiqiang Lin}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {Specularizer : Detecting Speculative Execution Attacks via Performance Tracing}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {151--172}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_8}, doi = {10.1007/978-3-030-80825-9\_8}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WangCCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/GhaniyounBZT21, author = {Moein Ghaniyoun and Kristin Barber and Yinqian Zhang and Radu Teodorescu}, title = {{INTROSPECTRE:} {A} Pre-Silicon Framework for Discovery and Analysis of Transient Execution Vulnerabilities}, booktitle = {48th {ACM/IEEE} Annual International Symposium on Computer Architecture, {ISCA} 2021, Virtual Event / Valencia, Spain, June 14-18, 2021}, pages = {874--887}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCA52012.2021.00073}, doi = {10.1109/ISCA52012.2021.00073}, timestamp = {Mon, 19 Feb 2024 07:32:07 +0100}, biburl = {https://dblp.org/rec/conf/isca/GhaniyounBZT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenLZ21, author = {Sanchuan Chen and Zhiqiang Lin and Yinqian Zhang}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1665--1682}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/chen-sanchuan}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChenLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JangidCZL21, author = {Mohit Kumar Jangid and Guoxing Chen and Yinqian Zhang and Zhiqiang Lin}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Towards Formal Verification of State Continuity for Enclave Programs}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {573--590}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/jangid}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/JangidCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiZWLC21, author = {Mengyuan Li and Yinqian Zhang and Huibo Wang and Kang Li and Yueqiang Cheng}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{CIPHERLEAKS:} Breaking Constant-time Cryptography on {AMD} {SEV} via the Ciphertext Side Channel}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {717--732}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/li-mengyuan}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiZWLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccsw-ws/2021, editor = {Yinqian Zhang and Marten van Dijk}, title = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474123}, doi = {10.1145/3474123}, isbn = {978-1-4503-8653-1}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-03523, author = {Xiaoxuan Lou and Shangwei Guo and Tianwei Zhang and Yinqian Zhang and Yang Liu}, title = {When {NAS} Meets Watermarking: Ownership Verification of {DNN} Models via Cache Side Channels}, journal = {CoRR}, volume = {abs/2102.03523}, year = {2021}, url = {https://arxiv.org/abs/2102.03523}, eprinttype = {arXiv}, eprint = {2102.03523}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-03523.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14244, author = {Xiaoxuan Lou and Tianwei Zhang and Jun Jiang and Yinqian Zhang}, title = {A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography}, journal = {CoRR}, volume = {abs/2103.14244}, year = {2021}, url = {https://arxiv.org/abs/2103.14244}, eprinttype = {arXiv}, eprint = {2103.14244}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14244.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-08367, author = {Bowen Tang and Chenggang Wu and Zhe Wang and Lichen Jia and Pen{-}Chung Yew and Yueqiang Cheng and Yinqian Zhang and Chenxi Wang and Guoqing Harry Xu}, title = {SpecBox: {A} Label-Based Transparent Speculation Scheme Against Transient Execution Attacks}, journal = {CoRR}, volume = {abs/2107.08367}, year = {2021}, url = {https://arxiv.org/abs/2107.08367}, eprinttype = {arXiv}, eprint = {2107.08367}, timestamp = {Wed, 17 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-08367.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcmi/JiangYZXYKLJZ20, author = {Shu{-}Qin Jiang and Ting Yang and Qiong Zou and Lei Xu and Ting Ye and Yin{-}Qian Kang and Wan{-}Ru Li and Ju Jiao and Yong Zhang}, title = {The role of \({}^{\mbox{99m}}\)Tc-MIBI {SPECT/CT} in patients with secondary hyperparathyroidism: comparison with \({}^{\mbox{99m}}\)Tc-MIBI planar scintigraphy and ultrasonography}, journal = {{BMC} Medical Imaging}, volume = {20}, number = {1}, pages = {115}, year = {2020}, url = {https://doi.org/10.1186/s12880-020-00517-9}, doi = {10.1186/S12880-020-00517-9}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcmi/JiangYZXYKLJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ChenCXZLL20, author = {Guoxing Chen and Sanchuan Chen and Yuan Xiao and Yinqian Zhang and Zhiqiang Lin and Ten{-}Hwang Lai}, title = {SgxPectre: Stealing Intel Secrets From {SGX} Enclaves via Speculative Execution}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {3}, pages = {28--37}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2019.2963021}, doi = {10.1109/MSEC.2019.2963021}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ChenCXZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/FuZZZH20, author = {Ying Fu and Yongrong Zheng and Lin Zhang and Yinqiang Zheng and Hua Huang}, title = {Simultaneous hyperspectral image super-resolution and geometric alignment with a hybrid camera system}, journal = {Neurocomputing}, volume = {384}, pages = {282--294}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2019.12.024}, doi = {10.1016/J.NEUCOM.2019.12.024}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/FuZZZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MiCZPWR20, author = {Zeyu Mi and Haibo Chen and Yinqian Zhang and ShuangHe Peng and Xiaofeng Wang and Michael K. Reiter}, title = {{CPU} Elasticity to Mitigate Cross-VM Runtime Monitoring}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {5}, pages = {1094--1108}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2846742}, doi = {10.1109/TDSC.2018.2846742}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MiCZPWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SionZ20, author = {Radu Sion and Yinqian Zhang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {CCSW'20: 2020 Cloud Computing Security Workshop}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2133--2134}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3416242}, doi = {10.1145/3372297.3416242}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SionZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WenLZ20, author = {Haohuang Wen and Zhiqiang Lin and Yinqian Zhang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {167--180}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423344}, doi = {10.1145/3372297.3423344}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WenLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZhengZL20, author = {Yinqiang Zheng and Mingfang Zhang and Feng Lu}, title = {Optical Flow in the Dark}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {6748--6756}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Zheng\_Optical\_Flow\_in\_the\_Dark\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.00678}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ZhengZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/Li0HZP20, author = {Yiming Li and Changhong Fu and Ziyuan Huang and Yinqiang Zhang and Jia Pan}, title = {Keyfilter-Aware Real-Time {UAV} Object Tracking}, booktitle = {2020 {IEEE} International Conference on Robotics and Automation, {ICRA} 2020, Paris, France, May 31 - August 31, 2020}, pages = {193--199}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICRA40945.2020.9196943}, doi = {10.1109/ICRA40945.2020.9196943}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icra/Li0HZP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/XiaoZT20, author = {Yuan Xiao and Yinqian Zhang and Radu Teodorescu}, title = {{SPEECHMINER:} {A} Framework for Investigating and Measuring Speculative Execution Vulnerabilities}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/speechminer-a-framework-for-investigating-and-measuring-speculative-execution-vulnerabilities/}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/XiaoZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Wang0XZLZLKY20, author = {Zhe Wang and Chenggang Wu and Mengyao Xie and Yinqian Zhang and Kangjie Lu and Xiaofeng Zhang and Yuanming Lai and Yan Kang and Min Yang}, title = {{SEIMI:} Efficient and Secure SMAP-Enabled Intra-process Memory Isolation}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {592--607}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00087}, doi = {10.1109/SP40000.2020.00087}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/Wang0XZLZLKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangZZL20, author = {Mengya Zhang and Xiaokuan Zhang and Yinqian Zhang and Zhiqiang Lin}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{TXSPECTOR:} Uncovering Attacks in Ethereum from Transactions}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2775--2792}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-mengya}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccsw-ws/2020, editor = {Yinqian Zhang and Radu Sion}, title = {CCSW'20, Proceedings of the 2020 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, Virtual Event, USA, November 9, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411495}, doi = {10.1145/3411495}, isbn = {978-1-4503-8084-3}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-00524, author = {Zhi Zhang and Yueqiang Cheng and Yinqian Zhang and Surya Nepal}, title = {GhostKnight: Breaching Data Integrity via Speculative Execution}, journal = {CoRR}, volume = {abs/2002.00524}, year = {2020}, url = {https://arxiv.org/abs/2002.00524}, eprinttype = {arXiv}, eprint = {2002.00524}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-00524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-05218, author = {Yiming Li and Changhong Fu and Ziyuan Huang and Yinqiang Zhang and Jia Pan}, title = {Keyfilter-Aware Real-Time {UAV} Object Tracking}, journal = {CoRR}, volume = {abs/2003.05218}, year = {2020}, url = {https://arxiv.org/abs/2003.05218}, eprinttype = {arXiv}, eprint = {2003.05218}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-05218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-00146, author = {Mengyuan Li and Yinqian Zhang and Zhiqiang Lin}, title = {{CROSSLINE:} Breaking "Security-by-Crash" based Memory Isolation in {AMD} {SEV}}, journal = {CoRR}, volume = {abs/2008.00146}, year = {2020}, url = {https://arxiv.org/abs/2008.00146}, eprinttype = {arXiv}, eprint = {2008.00146}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-00146.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-09501, author = {Guoxing Chen and Yinqian Zhang}, title = {{MAGE:} Mutual Attestation for a Group of Enclaves without Trusted Third Parties}, journal = {CoRR}, volume = {abs/2008.09501}, year = {2020}, url = {https://arxiv.org/abs/2008.09501}, eprinttype = {arXiv}, eprint = {2008.09501}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-09501.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12197, author = {Yinqian Sun and Yi Zeng and Tielin Zhang}, title = {Quantum Superposition Spiking Neural Network}, journal = {CoRR}, volume = {abs/2010.12197}, year = {2020}, url = {https://arxiv.org/abs/2010.12197}, eprinttype = {arXiv}, eprint = {2010.12197}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12197.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FuZHDX19, author = {Changhong Fu and Yinqiang Zhang and Ziyuan Huang and Ran Duan and Zongwu Xie}, title = {Part-Based Background-Aware Tracking for {UAV} With Convolutional Features}, journal = {{IEEE} Access}, volume = {7}, pages = {79997--80010}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2922703}, doi = {10.1109/ACCESS.2019.2922703}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FuZHDX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cal/BarberBZZT19, author = {Kristin Barber and Anys Bacha and Li Zhou and Yinqian Zhang and Radu Teodorescu}, title = {Isolating Speculative Data to Prevent Transient Execution Attacks}, journal = {{IEEE} Comput. Archit. Lett.}, volume = {18}, number = {2}, pages = {178--181}, year = {2019}, url = {https://doi.org/10.1109/LCA.2019.2916328}, doi = {10.1109/LCA.2019.2916328}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cal/BarberBZZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEpact/BarberBZZT19, author = {Kristin Barber and Anys Bacha and Li Zhou and Yinqian Zhang and Radu Teodorescu}, title = {SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels}, booktitle = {28th International Conference on Parallel Architectures and Compilation Techniques, {PACT} 2019, Seattle, WA, USA, September 23-26, 2019}, pages = {151--164}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PACT.2019.00020}, doi = {10.1109/PACT.2019.00020}, timestamp = {Wed, 13 Nov 2019 18:02:12 +0100}, biburl = {https://dblp.org/rec/conf/IEEEpact/BarberBZZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenZL19, author = {Guoxing Chen and Yinqian Zhang and Ten{-}Hwang Lai}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{OPERA:} Open Remote Attestation for Intel's Secure Enclaves}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2317--2331}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354220}, doi = {10.1145/3319535.3354220}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangBKLCZ19, author = {Huibo Wang and Erick Bauman and Vishal Karande and Zhiqiang Lin and Yueqiang Cheng and Yinqian Zhang}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible Script Code Hardening Approach}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {114--121}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329848}, doi = {10.1145/3321705.3329848}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangS19, author = {Yinqian Zhang and Radu Sion}, editor = {Radu Sion and Charalampos Papamanthou}, title = {Speculative Execution Attacks and Cloud Security}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019}, pages = {201}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338466.3360287}, doi = {10.1145/3338466.3360287}, timestamp = {Thu, 12 Oct 2023 12:32:09 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZuoWLZ19, author = {Chaoshun Zuo and Haohuang Wen and Zhiqiang Lin and Yinqian Zhang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Automatic Fingerprinting of Vulnerable {BLE} IoT Devices with Static UUIDs from Mobile Apps}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1469--1483}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354240}, doi = {10.1145/3319535.3354240}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZuoWLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/FuZZZ019, author = {Ying Fu and Tao Zhang and Yinqiang Zheng and Debing Zhang and Hua Huang}, title = {Hyperspectral Image Super-Resolution With Optimized {RGB} Guidance}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2019, Long Beach, CA, USA, June 16-20, 2019}, pages = {11661--11670}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2019}, url = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Fu\_Hyperspectral\_Image\_Super-Resolution\_With\_Optimized\_RGB\_Guidance\_CVPR\_2019\_paper.html}, doi = {10.1109/CVPR.2019.01193}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/FuZZZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LvZZ019, author = {Feifan Lv and Yinqiang Zheng and Bohan Zhang and Feng Lu}, title = {Turn a Silicon Camera Into an InGaAs Camera}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2019, Long Beach, CA, USA, June 16-20, 2019}, pages = {5987--5995}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2019}, url = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Lv\_Turn\_a\_Silicon\_Camera\_Into\_an\_InGaAs\_Camera\_CVPR\_2019\_paper.html}, doi = {10.1109/CVPR.2019.00614}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LvZZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenLZZ19, author = {Guoxing Chen and Mengyuan Li and Fengwei Zhang and Yinqian Zhang}, title = {Defeating Speculative-Execution Attacks on {SGX} with HyperRace}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937682}, doi = {10.1109/DSC47296.2019.8937682}, timestamp = {Mon, 16 Mar 2020 18:03:41 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19, author = {Jiongyi Chen and Chaoshun Zuo and Wenrui Diao and Shuaike Dong and Qingchuan Zhao and Menghan Sun and Zhiqiang Lin and Yinqian Zhang and Kehuan Zhang}, title = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019}, pages = {222--233}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN.2019.00034}, doi = {10.1109/DSN.2019.00034}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChenCXZLL19, author = {Guoxing Chen and Sanchuan Chen and Yuan Xiao and Yinqian Zhang and Zhiqiang Lin and Ten{-}Hwang Lai}, title = {SgxPectre: Stealing Intel Secrets from {SGX} Enclaves Via Speculative Execution}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {142--157}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00020}, doi = {10.1109/EUROSP.2019.00020}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ChenCXZLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AhmadJXZSL19, author = {Adil Ahmad and Byunggill Joe and Yuan Xiao and Yinqian Zhang and Insik Shin and Byoungyoung Lee}, title = {{OBFUSCURO:} {A} Commodity Obfuscation Engine on Intel {SGX}}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/obfuscuro-a-commodity-obfuscation-engine-on-intel-sgx/}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AhmadJXZSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangHRZ19, author = {Xiaokuan Zhang and Jihun Hamm and Michael K. Reiter and Yinqian Zhang}, title = {Statistical Privacy for Streaming Traffic}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/statistical-privacy-for-streaming-traffic/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangHRZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ps/LeiZLZYZ19, author = {Chao Lei and Jie Zhang and Yajie Li and Yongli Zhao and Hao Yu and Yinqiang Zhang}, title = {Key Distribution Based on Survival Life Time with {Y-00} Protocol in Optical Fiber Link}, booktitle = {2019 24th OptoElectronics and Communications Conference {(OECC)} and 2019 International Conference on Photonics in Switching and Computing (PSC), Fukuoka, Japan, July 7-11, 2019}, pages = {1--3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/PS.2019.8817649}, doi = {10.23919/PS.2019.8817649}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/ps/LeiZLZYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangZL19, author = {Wubing Wang and Yinqian Zhang and Zhiqiang Lin}, title = {Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {443--457}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/wang-wubing}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZuoLZ19, author = {Chaoshun Zuo and Zhiqiang Lin and Yinqian Zhang}, title = {Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1296--1310}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00009}, doi = {10.1109/SP.2019.00009}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZuoLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiZLS19, author = {Mengyuan Li and Yinqian Zhang and Zhiqiang Lin and Yan Solihin}, editor = {Nadia Heninger and Patrick Traynor}, title = {Exploiting Unprotected {I/O} Operations in AMD's Secure Encrypted Virtualization}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1257--1272}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/li-mengyuan}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiZLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangWZTYXLKCS19, author = {Zhe Wang and Chenggang Wu and Yinqian Zhang and Bowen Tang and Pen{-}Chung Yew and Mengyao Xie and Yuanming Lai and Yan Kang and Yueqiang Cheng and Zhiping Shi}, editor = {Nadia Heninger and Patrick Traynor}, title = {SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1239--1256}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/wang}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangWZTYXLKCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-08493, author = {Juan Wang and Chengyang Fan and Jie Wang and Yueqiang Cheng and Yinqian Zhang and Wenhui Zhang and Peng Liu and Hongxin Hu}, title = {SvTPM: {A} Secure and Efficient vTPM in the Cloud}, journal = {CoRR}, volume = {abs/1905.08493}, year = {2019}, url = {http://arxiv.org/abs/1905.08493}, eprinttype = {arXiv}, eprint = {1905.08493}, timestamp = {Sat, 18 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-08493.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09312, author = {Tianwei Zhang and Jun Jiang and Yinqian Zhang}, title = {Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications}, journal = {CoRR}, volume = {abs/1911.09312}, year = {2019}, url = {http://arxiv.org/abs/1911.09312}, eprinttype = {arXiv}, eprint = {1911.09312}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09312.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-00329, author = {Yuan Xiao and Yinqian Zhang and Radu Teodorescu}, title = {{SPEECHMINER:} {A} Framework for Investigating and Measuring Speculative Execution Vulnerabilities}, journal = {CoRR}, volume = {abs/1912.00329}, year = {2019}, url = {http://arxiv.org/abs/1912.00329}, eprinttype = {arXiv}, eprint = {1912.00329}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-00329.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LuZLZL18, author = {Bo Lu and Xiaokuan Zhang and Ziman Ling and Yinqian Zhang and Zhiqiang Lin}, title = {A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {89--100}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274714}, doi = {10.1145/3274694.3274714}, timestamp = {Wed, 05 Dec 2018 09:44:25 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LuZLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangZL18, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, title = {Analyzing Cache Side Channels Using Deep Neural Networks}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {174--186}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274715}, doi = {10.1145/3274694.3274715}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ZhangZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenLMZLCW18, author = {Sanchuan Chen and Fangfei Liu and Zeyu Mi and Yinqian Zhang and Ruby B. Lee and Haibo Chen and XiaoFeng Wang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {601--608}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196501}, doi = {10.1145/3196494.3196501}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenLMZLCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangMLZZZ18, author = {Wei Zhang and Yan Meng and Yugeng Liu and Xiaokuan Zhang and Yinqian Zhang and Haojin Zhu}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {HoMonit: Monitoring Smart Home Apps from Encrypted Traffic}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1074--1088}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243820}, doi = {10.1145/3243734.3243820}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangMLZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/FuZZZH18, author = {Ying Fu and Tao Zhang and Yinqiang Zheng and Debing Zhang and Hua Huang}, editor = {Vittorio Ferrari and Martial Hebert and Cristian Sminchisescu and Yair Weiss}, title = {Joint Camera Spectral Sensitivity Selection and Hyperspectral Image Recovery}, booktitle = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11207}, pages = {812--828}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01219-9\_48}, doi = {10.1007/978-3-030-01219-9\_48}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eccv/FuZZZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/PanBRZZT18, author = {Xiang Pan and Anys Bacha and Spencer Rudolph and Li Zhou and Yinqian Zhang and Radu Teodorescu}, title = {NVCool: When Non-Volatile Caches Meet Cold Boot Attacks}, booktitle = {36th {IEEE} International Conference on Computer Design, {ICCD} 2018, Orlando, FL, USA, October 7-10, 2018}, pages = {439--448}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICCD.2018.00072}, doi = {10.1109/ICCD.2018.00072}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/PanBRZZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenLRZ18, author = {Guoxing Chen and Ten{-}Hwang Lai and Michael K. Reiter and Yinqian Zhang}, title = {Differentially Private Access Patterns for Searchable Symmetric Encryption}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {810--818}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486381}, doi = {10.1109/INFOCOM.2018.8486381}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenLRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TangZZZ18, author = {Di Tang and Zhe Zhou and Yinqian Zhang and Kehuan Zhang}, title = {Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2018\_03B-5\_Tang\_paper-updated.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/TangZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangWBZW18, author = {Xiaokuan Zhang and Xueqiang Wang and Xiaolong Bai and Yinqian Zhang and XiaoFeng Wang}, title = {OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_05B-4\_Zhang\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZhangWBZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/FuZDX18, author = {Changhong Fu and Yinqiang Zhang and Ran Duan and Zongwu Xie}, title = {Robust Scalable Part-Based Visual Tracking for {UAV} with Background-Aware Correlation Filter}, booktitle = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2018, Kuala Lumpur, Malaysia, December 12-15, 2018}, pages = {2245--2252}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ROBIO.2018.8665251}, doi = {10.1109/ROBIO.2018.8665251}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/robio/FuZDX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenWCCZWLL18, author = {Guoxing Chen and Wenhao Wang and Tianyu Chen and Sanchuan Chen and Yinqian Zhang and XiaoFeng Wang and Ten{-}Hwang Lai and Dongdai Lin}, title = {Racing in Hyperspace: Closing Hyper-Threading Side Channels on {SGX} with Contrived Data Races}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {178--194}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00024}, doi = {10.1109/SP.2018.00024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenWCCZWLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhouQRZ18, author = {Ziqiao Zhou and Zhiyun Qian and Michael K. Reiter and Yinqian Zhang}, title = {Static Evaluation of Noninterference Using Approximate Model Counting}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {514--528}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00052}, doi = {10.1109/SP.2018.00052}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhouQRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/WangLZRS18, author = {Liang Wang and Mengyuan Li and Yinqian Zhang and Thomas Ristenpart and Michael M. Swift}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {Peeking Behind the Curtains of Serverless Platforms}, booktitle = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {133--146}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/wang-liang}, timestamp = {Sat, 25 Feb 2023 23:39:37 +0100}, biburl = {https://dblp.org/rec/conf/usenix/WangLZRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01949, author = {Di Tang and Zhe Zhou and Yinqian Zhang and Kehuan Zhang}, title = {Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections}, journal = {CoRR}, volume = {abs/1801.01949}, year = {2018}, url = {http://arxiv.org/abs/1801.01949}, eprinttype = {arXiv}, eprint = {1801.01949}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01949.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-09085, author = {Guoxing Chen and Sanchuan Chen and Yuan Xiao and Yinqian Zhang and Zhiqiang Lin and Ten{-}Hwang Lai}, title = {SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution}, journal = {CoRR}, volume = {abs/1802.09085}, year = {2018}, url = {http://arxiv.org/abs/1802.09085}, eprinttype = {arXiv}, eprint = {1802.09085}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-09085.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/XiaoRZ17, author = {Qiuyu Xiao and Michael K. Reiter and Yinqian Zhang}, title = {Personalized Pseudonyms for Servers in the Cloud}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {271--289}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0049}, doi = {10.1515/POPETS-2017-0049}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/XiaoRZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenZRZ17, author = {Sanchuan Chen and Xiaokuan Zhang and Michael K. Reiter and Yinqian Zhang}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Detecting Privileged Side-Channel Attacks in Shielded Execution with D{\'{e}}j{\`{a}} Vu}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {7--18}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053007}, doi = {10.1145/3052973.3053007}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenZRZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangCPZWBTG17, author = {Wenhao Wang and Guoxing Chen and Xiaorui Pan and Yinqian Zhang and XiaoFeng Wang and Vincent Bindschaedler and Haixu Tang and Carl A. Gunter}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in {SGX}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2421--2434}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134038}, doi = {10.1145/3133956.3134038}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangCPZWBTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoLCZ17, author = {Yuan Xiao and Mengyuan Li and Sanchuan Chen and Yinqian Zhang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{STACCO:} Differentially Analyzing Side-Channel Traces for Detecting {SSL/TLS} Vulnerabilities in Secure Enclaves}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {859--874}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134016}, doi = {10.1145/3133956.3134016}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XiaoLCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Zhang17, author = {Yinqian Zhang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Cache Side Channels: State of the Art and Research Opportunities}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2617--2619}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136064}, doi = {10.1145/3133956.3136064}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Zhang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZL17, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {DoS Attacks on Your Memory in Cloud}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {253--265}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052978}, doi = {10.1145/3052973.3052978}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GuZZL17, author = {Yufei Gu and Qingchuan Zhao and Yinqian Zhang and Zhiqiang Lin}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {{PT-CFI:} Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {173--184}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029830}, doi = {10.1145/3029806.3029830}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GuZZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhangFZH17, author = {Lin Zhang and Ying Fu and Yinqiang Zheng and Hua Huang}, title = {Camera spectral sensitivity, illumination and spectral reflectance estimation for a hybrid hyperspectral image capture system}, booktitle = {2017 {IEEE} International Conference on Image Processing, {ICIP} 2017, Beijing, China, September 17-20, 2017}, pages = {545}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICIP.2017.8296340}, doi = {10.1109/ICIP.2017.8296340}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/ZhangFZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangCPZWBTG17, author = {Wenhao Wang and Guoxing Chen and Xiaorui Pan and Yinqian Zhang and XiaoFeng Wang and Vincent Bindschaedler and Haixu Tang and Carl A. Gunter}, title = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in {SGX}}, journal = {CoRR}, volume = {abs/1705.07289}, year = {2017}, url = {http://arxiv.org/abs/1705.07289}, eprinttype = {arXiv}, eprint = {1705.07289}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangCPZWBTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XiaoLCZ17, author = {Yuan Xiao and Mengyuan Li and Sanchuan Chen and Yinqian Zhang}, title = {Stacco: Differentially Analyzing Side-Channel Traces for Detecting {SSL/TLS} Vulnerabilities in Secure Enclaves}, journal = {CoRR}, volume = {abs/1707.03473}, year = {2017}, url = {http://arxiv.org/abs/1707.03473}, eprinttype = {arXiv}, eprint = {1707.03473}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/XiaoLCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangXZ16, author = {Xiaokuan Zhang and Yuan Xiao and Yinqian Zhang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Return-Oriented Flush-Reload Side Channels on {ARM} and Their Implications for Android Devices}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {858--870}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978360}, doi = {10.1145/2976749.2978360}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangXZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouRZ16, author = {Ziqiao Zhou and Michael K. Reiter and Yinqian Zhang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {A Software Approach to Defeating Side Channels in Last-Level Caches}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {871--882}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978324}, doi = {10.1145/2976749.2978324}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouRZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangZL16, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, editor = {Fabian Monrose and Marc Dacier and Gregory Blanc and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {CloudRadar: {A} Real-Time Side-Channel Attack Detection System in Clouds}, booktitle = {Research in Attacks, Intrusions, and Defenses - 19th International Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9854}, pages = {118--140}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45719-2\_6}, doi = {10.1007/978-3-319-45719-2\_6}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZhangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/XiaoZZT16, author = {Yuan Xiao and Xiaokuan Zhang and Yinqian Zhang and Radu Teodorescu}, editor = {Thorsten Holz and Stefan Savage}, title = {One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {19--35}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/xiao}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/XiaoZZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangZL16, author = {Tianwei Zhang and Yinqian Zhang and Ruby B. Lee}, title = {Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation}, journal = {CoRR}, volume = {abs/1603.03404}, year = {2016}, url = {http://arxiv.org/abs/1603.03404}, eprinttype = {arXiv}, eprint = {1603.03404}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhouRZ16, author = {Ziqiao Zhou and Michael K. Reiter and Yinqian Zhang}, title = {A software approach to defeating side channels in last-level caches}, journal = {CoRR}, volume = {abs/1603.05615}, year = {2016}, url = {http://arxiv.org/abs/1603.05615}, eprinttype = {arXiv}, eprint = {1603.05615}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhouRZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoRZ15, author = {Qiuyu Xiao and Michael K. Reiter and Yinqian Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Mitigating Storage Side Channels Using Statistical Privacy Mechanisms}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1582--1594}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813645}, doi = {10.1145/2810103.2813645}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XiaoRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VaradarajanZRS15, author = {Venkatanathan Varadarajan and Yinqian Zhang and Thomas Ristenpart and Michael M. Swift}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {A Placement Vulnerability Study in Multi-Tenant Public Clouds}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {913--928}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/varadarajan}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/VaradarajanZRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VaradarajanZRS15, author = {Venkatanathan Varadarajan and Yinqian Zhang and Thomas Ristenpart and Michael M. Swift}, title = {A Placement Vulnerability Study in Multi-tenant Public Clouds}, journal = {CoRR}, volume = {abs/1507.03114}, year = {2015}, url = {http://arxiv.org/abs/1507.03114}, eprinttype = {arXiv}, eprint = {1507.03114}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VaradarajanZRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJRR14, author = {Yinqian Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Cross-Tenant Side-Channel Attacks in PaaS Clouds}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {990--1003}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660356}, doi = {10.1145/2660267.2660356}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangR13, author = {Yinqian Zhang and Michael K. Reiter}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {D{\"{u}}ppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {827--838}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516741}, doi = {10.1145/2508859.2516741}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJRR12, author = {Yinqian Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Cross-VM side channels and their use to extract private keys}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {305--316}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382230}, doi = {10.1145/2382196.2382230}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJRR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfce/CuiZWZ11, author = {Tingting Cui and XinBin Zhao and Zhe Wang and Yinqian Zhang}, editor = {Sabo Sambath and Egui Zhu}, title = {Weight in Competitive K-Means Algorithm}, booktitle = {Frontiers in Computer Education [International Conference on Frontiers in Computer Education, {ICFCE} 2011, Macao, China, December 1-2, 2011]}, series = {Advances in Intelligent and Soft Computing}, volume = {133}, pages = {1077--1084}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27552-4\_140}, doi = {10.1007/978-3-642-27552-4\_140}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfce/CuiZWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangJOR11, author = {Yinqian Zhang and Ari Juels and Alina Oprea and Michael K. Reiter}, title = {HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {313--328}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.31}, doi = {10.1109/SP.2011.31}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhangJOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangMR10, author = {Yinqian Zhang and Fabian Monrose and Michael K. Reiter}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {The security of modern password expiration: an algorithmic framework and empirical analysis}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {176--186}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866328}, doi = {10.1145/1866307.1866328}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nems/ZhangWX10, author = {Yinqiang Zhang and Shourong Wang and Dunzhu Xia}, title = {EMD-based denoising methods in the {MEMS} gyroscope de-drift}, booktitle = {5th {IEEE} International Conference on Nano/Micro Engineered and Molecular Systems, {NEMS} 2010, Xiamen, China, January 20-23, 2010}, pages = {591--594}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/NEMS.2010.5592471}, doi = {10.1109/NEMS.2010.5592471}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/nems/ZhangWX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhangZL09, author = {Ming Zhang and Yinqiang Zheng and Yuncai Liu}, title = {Using silhouette for pose estimation of object with surface of revolution}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2009, 7-10 November 2009, Cairo, Egypt}, pages = {333--336}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICIP.2009.5413643}, doi = {10.1109/ICIP.2009.5413643}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/ZhangZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhangFWX08, author = {Yinqian Zhang and Xun Fan and Yijun Wang and Zhi Xue}, title = {Attack Grammar: {A} New Approach to Modeling and Analyzing Network Attack Sequences}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.34}, doi = {10.1109/ACSAC.2008.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhangFWX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/DuanZG08, author = {Bing Duan and Yinqian Zhang and Dawu Gu}, title = {An Easy-to-Deploy Penetration Testing Platform}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {2314--2318}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.335}, doi = {10.1109/ICYCS.2008.335}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/DuanZG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/ZhangFXX08, author = {Yinqian Zhang and Xun Fan and Zhi Xue and Hao Xu}, title = {Two Stochastic Models for Security Evaluation Based on Attack Graph}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {2198--2203}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.406}, doi = {10.1109/ICYCS.2008.406}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/ZhangFXX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.