Quantcast
Channel: dblp: Fan Zhang
Browsing latest articles
Browse All 91 View Live

Image may be NSFW.
Clik here to view.

Passive Attacks Against Searchable Encryption.

Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang: Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019)

View Article



Image may be NSFW.
Clik here to view.

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem.

Liang Dong, Hongxin Zhang, Lei Zhu, Shaofei Sun, Han Gan, Fan Zhang: Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem. IEEE Access 7: 31656-31662 (2019)

View Article

Image may be NSFW.
Clik here to view.

A Framework of Private Set Intersection Protocols.

Ziyuan Liang, Weiran Liu, Fan Zhang, Bingsheng Zhang, Jian Liu, Lei Zhang, Kui Ren: A Framework of Private Set Intersection Protocols. IACR Cryptol. ePrint Arch. 2020: 1541 (2020)

View Article

Image may be NSFW.
Clik here to view.

Towards Understanding and Demystifying Bitcoin Mixing Services.

Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren: Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020)

View Article

Image may be NSFW.
Clik here to view.

Active Fuzzing for Testing and Securing Cyber-Physical Systems.

Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang: Active Fuzzing for Testing and Securing Cyber-Physical Systems. CoRR abs/2005.14124 (2020)

View Article


Image may be NSFW.
Clik here to view.

Defending Model Inversion and Membership Inference Attacks via Prediction...

Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, Fan Zhang: Defending Model Inversion and Membership Inference Attacks via Prediction Purification. CoRR abs/2005.03915 (2020)

View Article

Image may be NSFW.
Clik here to view.

Active fuzzing for testing and securing cyber-physical systems.

Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang: Active fuzzing for testing and securing cyber-physical systems. ISSTA 2020: 14-26

View Article

Image may be NSFW.
Clik here to view.

From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power...

Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang, Zhan Qin, Kui Ren: From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices. DAC 2020: 1-6

View Article


Image may be NSFW.
Clik here to view.

Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch...

Wenye Liu, Chip-Hong Chang, Fan Zhang, Xiaoxuan Lou: Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection. DAC 2020: 1-6

View Article


Image may be NSFW.
Clik here to view.

A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay...

Fan Zhang, Xiaofei Dong, Bolin Yang, Yajin Zhou, Kui Ren: A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. IEEE Trans. Inf. Forensics Secur. 15: 1407-1422 (2020)

View Article

Image may be NSFW.
Clik here to view.

Persistent Fault Attack in Practice.

Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren: Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195...

View Article

Image may be NSFW.
Clik here to view.

A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer...

Changhai Ou, Siew-Kei Lam, Chengju Zhou, Guiyuan Jiang, Fan Zhang: A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks. IEEE Trans. Computers 69(11): 1694-1706 (2020)

View Article

Image may be NSFW.
Clik here to view.

Side-Channel Analysis and Countermeasure Design on ARM-Based...

Fan Zhang, Bolin Yang, Xiaofei Dong, Sylvain Guilley, Zhe Liu, Wei He, Fangguo Zhang, Kui Ren: Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers...

View Article


Image may be NSFW.
Clik here to view.

Theoretical analysis of persistent fault attack.

Fan Zhang, Guorui Xu, Bolin Yang, Ziyuan Liang, Kui Ren: Theoretical analysis of persistent fault attack. Sci. China Inf. Sci. 63(3) (2020)

View Article

Image may be NSFW.
Clik here to view.

Towards Understanding and Demystifying Bitcoin Mixing Services.

Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren: Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44

View Article


Image may be NSFW.
Clik here to view.

Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for...

Wenye Liu, Chip-Hong Chang, Fan Zhang: Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint. IEEE Trans. Inf. Forensics Secur. 16: 1928-1942...

View Article

Image may be NSFW.
Clik here to view.

hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.

Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning, Jun Sun, Joseph K. Liu, Yibao Bao: hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave. IEEE Trans. Comput. Aided...

View Article


Image may be NSFW.
Clik here to view.

Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers.

Guorui Xu, Fan Zhang, Bolin Yang, Xinjie Zhao, Wei He, Kui Ren: Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst....

View Article

Image may be NSFW.
Clik here to view.

Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis...

Fan Zhang, Bolin Yang, Bojie Yang, Yiran Zhang, Xuanle Ren, Shivam Bhasin, Kui Ren: Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level. IEEE Trans. Comput....

View Article

Image may be NSFW.
Clik here to view.

G2F: A Secure User Authentication for Rapid Smart Home IoT Management.

Hongwei Luo, Chao Wang, Hao Luo, Fan Zhang, Feng Lin, Guoai Xu: G2F: A Secure User Authentication for Rapid Smart Home IoT Management. IEEE Internet Things J. 8(13): 10884-10895 (2021)

View Article

Image may be NSFW.
Clik here to view.

Fiddling the Twiddle Constants - Fault Injection Analysis of the Number...

Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay: Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. IACR Cryptol. ePrint Arch. 2022:...

View Article


Image may be NSFW.
Clik here to view.

Snowball: Another View on Side-Channel Key Recovery Tools.

Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam: Snowball: Another View on Side-Channel Key Recovery Tools. IACR Cryptol. ePrint Arch. 2022: 728 (2022)

View Article


Image may be NSFW.
Clik here to view.

Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.

Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren: Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022)

View Article

Image may be NSFW.
Clik here to view.

FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in...

Aditya Singh Rathore, Yijie Shen, Chenhan Xu, Jacob Snyderman, Jinsong Han, Fan Zhang, Zhengxiong Li, Feng Lin, Wenyao Xu, Kui Ren: FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in...

View Article

Image may be NSFW.
Clik here to view.

Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV...

Junge Xu, Bohan Xuan, Anlin Liu, Mo Sun, Fan Zhang, Zeke Wang, Kui Ren: Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection. DAC 2022: 685-690

View Article


Image may be NSFW.
Clik here to view.

DARPT: defense against remote physical attack based on TDC in multi-tenant...

Fan Zhang, Zhiyong Wang, Haoting Shen, Bolin Yang, Qianmei Wu, Kui Ren: DARPT: defense against remote physical attack based on TDC in multi-tenant scenario. DAC 2022: 559-564

View Article

Image may be NSFW.
Clik here to view.

On Efficient and Secure Code-based Masking: A Pragmatic Evaluation.

Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu: On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 192-222 (2022)

View Article

Image may be NSFW.
Clik here to view.

Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault...

Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao: Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. IACR Trans. Cryptogr. Hardw....

View Article

Image may be NSFW.
Clik here to view.

Wavesdropper: Through-wall Word Detection of Human Speech via Commercial...

Chao Wang, Feng Lin, Zhongjie Ba, Fan Zhang, Wenyao Xu, Kui Ren: Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous...

View Article



Image may be NSFW.
Clik here to view.

AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation.

Xuechao Du, Andong Chen, Boyuan He, Hao Chen, Fan Zhang, Yan Chen: AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation. Comput. Secur. 122: 102889 (2022)

View Article

Image may be NSFW.
Clik here to view.

STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber.

Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, Shivam Bhasin: STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber. IACR Cryptol. ePrint Arch. 2023: 1184 (2023)

View Article

Image may be NSFW.
Clik here to view.

DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers.

Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng: DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 21 (2023)

View Article

Image may be NSFW.
Clik here to view.

Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches...

Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Fan Zhang: Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach. RTSS 2023: 431-434

View Article


Image may be NSFW.
Clik here to view.

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.

Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren: InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise. NDSS 2023

View Article

Image may be NSFW.
Clik here to view.

GameRTS: A Regression Testing Framework for Video Games.

Jiongchi Yu, Yuechen Wu, Xiaofei Xie, Wei Le, Lei Ma, Yingfeng Chen, Jingyu Hu, Fan Zhang: GameRTS: A Regression Testing Framework for Video Games. ICSE 2023: 1393-1404

View Article

Image may be NSFW.
Clik here to view.

Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under...

Guorui Xu, Fan Zhang, Xinjie Zhao, Yuan Chen, Shize Guo, Kui Ren: Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models. DAC 2023: 1-6

View Article


Image may be NSFW.
Clik here to view.

Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation...

Ziming Zhao, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang: Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory. CCS 2023: 3636-3638

View Article


Image may be NSFW.
Clik here to view.

Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.

Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren: Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. AAAI 2023: 10871-10879

View Article

Image may be NSFW.
Clik here to view.

VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via...

Zhaoxuan Li, Siqi Lu, Rui Zhang, Ziming Zhao, Rujin Liang, Rui Xue, Wenhao Li, Fan Zhang, Sheng Gao: VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning....

View Article

Image may be NSFW.
Clik here to view.

Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing.

Fan Zhang, Qianmei Wu, Bohan Xuan, Yuqi Chen, Wei Lin, Christopher M. Poskitt, Jun Sun, Binbin Chen: Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing. IEEE Trans. Software...

View Article

Image may be NSFW.
Clik here to view.

SAGE: Steering the Adversarial Generation of Examples With Accelerations.

Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren: SAGE: Steering the Adversarial Generation of Examples With Accelerations. IEEE Trans. Inf. Forensics Secur....

View Article


Image may be NSFW.
Clik here to view.

RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation...

Zehong (Zephyr) Qiu, Fan Zhang: RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 570-596 (2023)

View Article

Image may be NSFW.
Clik here to view.

Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts.

Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo: Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Trans. Cryptogr. Hardw....

View Article


Image may be NSFW.
Clik here to view.

Fiddling the Twiddle Constants - Fault Injection Analysis of the Number...

Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay: Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. IACR Trans. Cryptogr. Hardw....

View Article

Image may be NSFW.
Clik here to view.

CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.

Changhai Ou, Debiao He, Kexin Qiao, Shihui Zheng, Siew-Kei Lam, Fan Zhang: CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space. IEEE Trans. Comput. Aided Des. Integr. Circuits...

View Article


Image may be NSFW.
Clik here to view.

Extending the classical side-channel analysis framework to access-driven...

Pengfei Guo, Yingjian Yan, Fan Zhang, Chunsheng Zhu, Lichao Zhang, Zibin Dai: Extending the classical side-channel analysis framework to access-driven cache attacks. Comput. Secur. 129: 103255 (2023)

View Article

Image may be NSFW.
Clik here to view.

FaultMorse: An automated controlled-channel attack via longest recurring...

Lifeng Hu, Fan Zhang, Ziyuan Liang, Ruyi Ding, Xingyu Cai, Zonghui Wang, Wenguang Jin: FaultMorse: An automated controlled-channel attack via longest recurring sequence. Comput. Secur. 124: 103003 (2023)

View Article

Image may be NSFW.
Clik here to view.

DDoS family: A novel perspective for massive types of DDoS attacks.

Ziming Zhao, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang, Rui Zhang: DDoS family: A novel perspective for massive types of DDoS attacks. Comput. Secur. 138: 103663 (2024)

View Article

Image may be NSFW.
Clik here to view.

CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware...

Ziming Zhao, Zhaoxuan Li, Jiongchi Yu, Fan Zhang, Xiaofei Xie, Haitao Xu, Binbin Chen: CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains. IEEE Trans. Mob. Comput....

View Article


SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure...

Ziyuan Liang, Qi'ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanheng Lu, Fan Zhang: SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning. IACR Trans. Cryptogr....

View Article

Browsing latest articles
Browse All 91 View Live




Latest Images