Ning Zhang
Ning Zhang
Verified email at - Homepage
Cited by
Cited by
A survey of distributed consensus protocols for blockchain networks
Y Xiao, N Zhang, W Lou, YT Hou
IEEE Communications Surveys & Tutorials 22 (2), 1432-1465, 2020
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
N Zhang, K Sun, D Shands, W Lou, YT Hou
IACR Cryptology ePrint Archive 2016, 980, 2016
Case: Cache-assisted Secure Execution on ARM Devices
N Zhang, K Sun, W Lou, YT Hou
Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016
Distributed data mining with differential privacy
N Zhang, M Li, W Lou
2011 IEEE international conference on Communications (ICC), 1-5, 2011
Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided waves
Q Yan, K Liu, Q Zhou, H Guo, N Zhang
Network and Distributed Systems Security (NDSS) Symposium, 2020
Improving Robustness of {ML} Classifiers against Realizable Evasion Attacks Using Conserved Features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th {USENIX} Security Symposium ({USENIX} Security 19), 285-302, 2019
Efficient signature generation for classifying cross-architecture IoT malware
M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
Privacyguard: Enforcing private data usage control with blockchain and attested off-chain contract execution
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Distributed consensus protocols and algorithms
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Blockchain for Distributed Systems Security 25, 40, 2019
CacheKit: Evading memory introspection using cache incoherence
N Zhang, H Sun, K Sun, W Lou, YT Hou
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 337-352, 2016
Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT
Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou
IEEE Transactions on Information Forensics and Security 14 (7), 1830-1842, 2018
Modeling the impact of network connectivity on consensus security of proof-of-work blockchain
Y Xiao, N Zhang, W Lou, YT Hou
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1648-1657, 2020
Looks good to me: Authentication for augmented reality
E Gaebel, N Zhang, W Lou, YT Hou
Proceedings of the 6th international workshop on trustworthy embedded …, 2016
RusTEE: developing memory-safe ARM TrustZone applications
S Wan, M Sun, K Sun, N Zhang, X He
Annual Computer Security Applications Conference, 442-453, 2020
When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
W Sun, N Zhang, W Lou, YT Hou
International Conference on Computer Communications (INFOCOM), 2017
Memory forensic challenges under misused architectural features
N Zhang, R Zhang, K Sun, W Lou, YT Hou, S Jajodia
IEEE Transactions on Information Forensics and Security 13 (9), 2345-2358, 2018
AugAuth: Shoulder-Surfing Resistant Authentication for Augmented Reality
R Zhang, N Zhang, C Du, W Lou, YT Hou, Y Kawamoto
International Conference on Communications (ICC), 2017
Pcbchain: Lightweight reconfigurable blockchain primitives for secure iot applications
W Yan, N Zhang, LL Njilla, X Zhang
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28 (10 …, 2020
Mushi: Toward multiple level security cloud with strong hardware level isolation
N Zhang, M Li, W Lou, YT Hou
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
Security and privacy in the emerging cyber-physical world: A survey
Z Yu, Z Kaplan, Q Yan, N Zhang
IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021
The system can't perform the operation now. Try again later.
Articles 1–20