Ning Zhang
Cited by
Cited by
A survey of distributed consensus protocols for blockchain networks
Y Xiao, N Zhang, W Lou, YT Hou
IEEE Communications Surveys & Tutorials 22 (2), 1432-1465, 2020
Truspy: Cache Side-channel Information Leakage from the Secure World on ARM Devices
N Zhang, K Sun, D Shands, W Lou, YT Hou
Cryptology ePrint Archive, 2016
Case: Cache-assisted Secure Execution on ARM Devices
N Zhang, K Sun, W Lou, YT Hou
Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016
Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided waves
Q Yan, K Liu, Q Zhou, H Guo, N Zhang
Network and Distributed Systems Security (NDSS) Symposium, 2020
Improving Robustness of {ML} Classifiers against Realizable Evasion Attacks Using Conserved Features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th {USENIX} Security Symposium ({USENIX} Security 19), 285-302, 2019
Privacyguard: Enforcing private data usage control with blockchain and attested off-chain contract execution
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Efficient signature generation for classifying cross-architecture IoT malware
M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
Distributed data mining with differential privacy
N Zhang, M Li, W Lou
2011 IEEE international conference on Communications (ICC), 1-5, 2011
Distributed consensus protocols and algorithms
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Blockchain for Distributed Systems Security 25, 40, 2019
CacheKit: Evading memory introspection using cache incoherence
N Zhang, H Sun, K Sun, W Lou, YT Hou
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 337-352, 2016
Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT
Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou
IEEE Transactions on Information Forensics and Security 14 (7), 1830-1842, 2018
Modeling the impact of network connectivity on consensus security of proof-of-work blockchain
Y Xiao, N Zhang, W Lou, YT Hou
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1648-1657, 2020
RusTEE: developing memory-safe ARM TrustZone applications
S Wan, M Sun, K Sun, N Zhang, X He
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
Looks good to me: Authentication for augmented reality
E Gaebel, N Zhang, W Lou, YT Hou
Proceedings of the 6th international workshop on trustworthy embedded …, 2016
Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone
J Wang, A Li, H Li, C Lu, N Zhang
2022 IEEE Symposium on Security and Privacy (SP), 352-369, 2022
Decentralized spectrum access system: Vision, challenges, and a blockchain solution
Y Xiao, S Shi, W Lou, C Wang, X Li, N Zhang, YT Hou, JH Reed
IEEE Wireless Communications 29 (1), 220-228, 2022
Security and privacy in the emerging cyber-physical world: A survey
Z Yu, Z Kaplan, Q Yan, N Zhang
IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021
When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
W Sun, N Zhang, W Lou, YT Hou
International Conference on Computer Communications (INFOCOM), 2017
PCBChain: Lightweight reconfigurable blockchain primitives for secure IoT applications
W Yan, N Zhang, LL Njilla, X Zhang
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (10 …, 2020
Memory forensic challenges under misused architectural features
N Zhang, R Zhang, K Sun, W Lou, YT Hou, S Jajodia
IEEE Transactions on Information Forensics and Security 13 (9), 2345-2358, 2018
The system can't perform the operation now. Try again later.
Articles 1–20