default search action
Ziyuan Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Yuting Zhao:
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training. Comput. Secur. 143: 103899 (2024) - [c44]William Kosasih, Yusi Feng, Chitchanok Chuengsatiansup, Yuval Yarom, Ziyuan Zhu:
SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters? AsiaCCS 2024 - [c43]Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
KSM: Killer of Spectre and Meltdown Attacks. CSCWD 2024: 157-162 - [c42]Yusha Zhang, Ziyuan Zhu, Yuxin Liu, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties. CSCWD 2024: 772-777 - [c41]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Module Level Security Evaluation Method Based on Model Checking. CSCWD 2024: 1165-1170 - [c40]Wenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng:
Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution Environments. CSCWD 2024: 1740-1745 - [c39]Ruicheng Niu, Ziyuan Zhu, Chaofei Li, Dan Meng:
Search Robust and Adaptable Architecture. ICASSP 2024: 5155-5159 - [c38]Zhongkai Tong, Ziyuan Zhu, Zhangyu Sha, Yuxin Liu, Dan Meng:
Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning. ICIC (LNAI 1) 2024: 62-74 - [c37]Chaofei Li, Ziyuan Zhu, Yuedong Pan, Ruicheng Niu, Yuting Zhao:
Enhancing Adversarial Robustness for Deep Metric Learning via Attention-Aware Knowledge Guidance. ICIC (12) 2024: 103-117 - [c36]Tao Leng, Lixin Zhao, Yuedong Pan, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dan Meng:
Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors. ISCC 2024: 1-7 - [c35]Ziyuan Zhu, Paul H. Siegel:
Outer Code Designs for Augmented and Local-Global Polar Code Architectures. ISIT 2024: 2418-2423 - [i4]Ziyuan Zhu, Paul H. Siegel:
Outer Code Designs for Augmented and Local-Global Polar Code Architectures. CoRR abs/2402.04486 (2024) - 2023
- [j8]Guang Wang, Ziyuan Zhu, Xu Cheng, Dan Meng:
A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors. IEEE Trans. Computers 72(11): 3203-3217 (2023) - [c34]Ruicheng Niu, Ziyuan Zhu, Tao Leng, Chaofei Li, Yuxin Liu, Dan Meng:
Improving Adversarial Robustness via Channel and Depth Compatibility. ADMA (5) 2023: 137-149 - [c33]Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:
Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy. CSCWD 2023: 29-34 - [c32]Wenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng:
Detecting and Mitigating Cache Side Channel Threats on Intel SGX. CSCWD 2023: 972-977 - [c31]Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:
SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling. CSCWD 2023: 1914-1919 - [c30]Huozhu Wang, Ziyuan Zhu, Dan Meng:
Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors. ISCC 2023: 970-976 - [c29]Danping Li, Ziyuan Zhu, Jiao Shen, Yusha Zhang, Gang Shi, Dan Meng:
Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors. TrustCom 2023: 920-928 - [c28]Tao Leng, Yuedong Pan, Lixin Zhao, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dang Meng:
MemInspect: Memory Forensics for investigating Fileless Attacks. TrustCom 2023: 946-955 - [i3]Ziyuan Zhu, Wei Wu, Paul H. Siegel:
Polar Codes with Local-Global Decoding. CoRR abs/2301.02294 (2023) - 2022
- [c27]Ziyuan Zhu, Wei Wu, Paul H. Siegel:
Polar Codes with Local-Global Decoding. IEEECONF 2022: 392-396 - [c26]Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
Analysis of DRAM Vulnerability Using Computation Tree Logic. ICC 2022: 986-991 - [c25]Fan Liu, Weilin Zhu, Weimin Mu, Yun Zhang, Mingyang Li, Ziyuan Zhu, Weiping Wang:
Elastic Resource Allocation Based on Dynamic Perception of Operator Influence Domain in Distributed Stream Processing. ICCS (1) 2022: 734-748 - [c24]Guang Wang, Ziyuan Zhu, Xu Cheng, Dan Meng:
In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm. ICCD 2022: 463-470 - [i2]Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations. CoRR abs/2208.14062 (2022) - 2021
- [j7]Qing Liu, Ziyuan Zhu, Jianliang Xu, Yunjun Gao:
MaxiZone: Maximizing Influence Zone Over Geo-Textual Data. IEEE Trans. Knowl. Data Eng. 33(10): 3381-3393 (2021) - [c23]Sheng-Hung Lee, Ziyuan Zhu, Chaiwoo Lee, Fabio Duarte, Joseph F. Coughlin:
An Expert Interview Study of IoT Wearable Technologies for an Aging Population from Product, Data, and Society Dimensions. HCI (26) 2021: 428-437 - [c22]Guang Wang, Ziyuan Zhu, Shuan Li, Xu Cheng, Dan Meng:
Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm. ICCD 2021: 196-203 - [c21]Qing Liu, Ziyuan Zhu, Jianliang Xu, Yunjun Gao:
MaxiZone: Maximizing Influence Zone over Geo-Textual Data (Extended Abstract). ICDE 2021: 2334-2335 - [c20]Huozhu Wang, Ziyuan Zhu, Zhongkai Tong, Xiang Yin, Yusi Feng, Gang Shi, Dan Meng:
An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis. IJCNN 2021: 1-10 - [c19]Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng:
Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. TrustCom 2021: 1132-1140 - 2020
- [j6]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [c18]Limin Wang, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Analyzing The Security of The Cache Side Channel Defences With Attack Graphs. ASP-DAC 2020: 50-55 - [c17]Weimin Mu, Zongze Jin, Weilin Zhu, Fan Liu, Zhenzhen Li, Ziyuan Zhu, Weiping Wang:
QEScalor: Quantitative Elastic Scaling Framework in Distributed Streaming Processing. ICCS (1) 2020: 147-160 - [c16]Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. TrustCom 2020: 194-201 - [c15]Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu:
Cache side-channel attacks detection based on machine learning. TrustCom 2020: 919-926 - [c14]Zhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan:
SCPORAM: a hardware support scheme for protecting memory access patterns. TrustCom 2020: 983-990 - [c13]Xiaoyang Liu, Ziyuan Zhu:
pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention. TrustCom 2020: 1813-1819
2010 – 2019
- 2019
- [j5]Limin Wang, Ziyuan Zhu, Zhanpeng Wang, Dan Meng:
Colored Petri Net Based Cache Side Channel Vulnerability Evaluation. IEEE Access 7: 169825-169843 (2019) - [j4]Congcong Ge, Yunjun Gao, Xiaoye Miao, Lu Chen, Christian S. Jensen, Ziyuan Zhu:
IHCS: An Integrated Hybrid Cleaning System. Proc. VLDB Endow. 12(12): 1874-1877 (2019) - [c12]Fang Li, Chao Yan, Ziyuan Zhu, Dan Meng:
A Deep Malware Detection Method Based on General-Purpose Register Features. ICCS (3) 2019: 221-235 - [c11]Fang Li, Jinrong Han, Ziyuan Zhu, Dan Meng:
Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features. IJCNN 2019: 1-8 - [c10]Yue Zhang, Ziyuan Zhu, Dan Meng:
DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels. ISPA/BDCloud/SocialCom/SustainCom 2019: 614-621 - [i1]Yue Zhang, Ziyuan Zhu, Dan Meng:
DDM: A Demand-based Dynamic Mitigation for SMT Transient Channels. CoRR abs/1910.12021 (2019) - 2018
- [j3]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - 2016
- [c9]Hongwei Wang, Jinglin Shi, Ziyuan Zhu:
An expected hypervolume improvement algorithm for architectural exploration of embedded processors. DAC 2016: 161:1-161:6 - [c8]Yanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi:
TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment. SecureComm 2016: 538-556 - 2015
- [c7]Hongwei Wang, Ziyuan Zhu, Jinglin Shi, Yongtao Su:
An accurate ACOSSO metamodeling technique for processor architecture design space exploration. ASP-DAC 2015: 689-694 - [c6]Zhiguo Liu, Ziyuan Zhu, Jinglin Shi, Jinbao Liu, Shiqiang Li:
A low power buffer-aided vector register file for LTE baseband signal processing. ICCD 2015: 403-406 - [c5]Hongwei Wang, Ziyuan Zhu, Jinglin Shi, Yongtao Su:
Sensitivity Analysis Based Predictive Modeling for MPSoC Performance and Energy Estimation. VLSID 2015: 511-516 - 2014
- [c4]Shan Tang, Ziyuan Zhu, Yongtao Su:
System-level design methodology enabling fast development of baseband MP-SoC for 4G small cell base station. DATE 2014: 1-6 - [c3]Shan Huang, Ziyuan Zhu, Yongtao Su, Jinglin Shi:
A system-level design approach for SDR-based MPSoC in LTE baseband processing. MWSCAS 2014: 623-626 - 2013
- [j2]Juan Han, Chao Tang, Qiuju Wang, Ziyuan Zhu, Shan Tang:
Simplified MMSE Detectors for Turbo Receiver in BICM MIMO Systems. J. Comput. Sci. Technol. 28(3): 445-453 (2013) - [c2]Ziyuan Zhu, Shan Tang, Yongtao Su, Juan Han, Gang Sun, Jinglin Shi:
A 100 GOPS ASP based baseband processor for wireless communication. DATE 2013: 121-124 - 2010
- [j1]Ziyuan Zhu, Tao Lin:
Idempotent H.264 intraframe compression. Multim. Tools Appl. 46(1): 25-45 (2010)
2000 – 2009
- 2009
- [c1]Ziyuan Zhu, Tao Lin:
Idempotent H.264 intraframe multi-generation coding. ICASSP 2009: 1033-1036
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint