default search action
Jiliang Zhang 0002
Person information
- affiliation: Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
- affiliation (2015 - 2017): Northeastern University, Software College, Shenyang, China
- affiliation (PhD 2015): Hunan University, Changsha, China
- affiliation (2013 - 2014): University of Maryland at College Park, MD, USA
Other persons with the same name
- Jiliang Zhang
- Jiliang Zhang 0001 — Northeastern University, College of Information Science and Engineering, Shenyang, China (and 6 more)
- Jiliang Zhang 0003 — Southwest University, School of Electronic and Information Engineering, Chongqing, China (and 1 more)
- Jiliang Zhang 0004 — Southampton University, School of Engineering and Computer Science, UK
- Jiliang Zhang 0005 — Jiangxi University of Finance and Economics, School of Economics, Nanchang, China
- Jiliang Zhang 0006 — University of Portsmouth, UK (and 1 more)
- Jiliang Zhang 0007 — Tsinghua University, Department of Engineering Physics, Beijing, China
- Jiliang Zhang 0008 — Shandong University of Science and Technology, Intelligent Equipment College, Tai'an, China
- Jiliang Zhang 0009 — Shanghai Jiao Tong University, Biocircuits and Systems Laboratory, China
- Jiliang Zhang 0010 — Henan University of Technology, College of Information Science and Engineering, Zhengzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Dan Tang, Hongbo Cao, Jiliang Zhang, Zheng Qin, Wei Liang, Xiaopu Ma:
EXCLF: A LDoS attack detection & mitigation model based on programmable data plane. Comput. Networks 252: 110666 (2024) - [j61]Jiliang Zhang, Congcong Chen, Jinhua Cui, Keqin Li:
Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures. ACM Comput. Surv. 56(7): 178:1-178:40 (2024) - [j60]Yupeng Hu, Wenxin Kuang, Zhe Jin, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu:
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android. J. Comput. Secur. 32(3): 291-317 (2024) - [j59]Zhe Liu, Zukun Lu, Long Huang, Zhiwei Yao, Zhaojun Lu, Jiliang Zhang:
Recent advances on reliability of FPGAs in a radiation environment. Microelectron. J. 148: 106176 (2024) - [j58]Xiaosong Li, Jingru Sun, Yichuang Sun, Chunhua Wang, Qinghui Hong, Sichun Du, Jiliang Zhang:
Design of Artificial Neurons of Memristive Neuromorphic Networks Based on Biological Neural Dynamics and Structures. IEEE Trans. Circuits Syst. I Regul. Pap. 71(5): 2320-2333 (2024) - [j57]Jiliang Zhang, Xinjie Li, Pingdan Xiao, Zhengmiao Wei, Qinghui Hong:
Design of Optoelectronic In-Sensor Computing Circuit Based on Memristive Crossbar Array for In Situ Edge Extraction. IEEE Trans. Circuits Syst. I Regul. Pap. 71(7): 3228-3241 (2024) - [j56]Li Ni, Pengjun Wang, Yuejun Zhang, Xiangyu Li, Gang Li, Lin Ding, Jiliang Zhang:
SI PUF: An SRAM and Inverter-Based PUF With a Bit Error Rate of 0.0053% and 0.073/0.042 pJ/bit. IEEE Trans. Circuits Syst. II Express Briefs 71(4): 2339-2343 (2024) - [j55]Xiaosong Li, Jingru Sun, Wenjing Ma, Yichuang Sun, Chunhua Wang, Jiliang Zhang:
Adaptive Biomimetic Neuronal Circuit System Based on Myelin Sheath Function. IEEE Trans. Consumer Electron. 70(1): 3669-3679 (2024) - [j54]Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Jiliang Zhang, Said F. Al-Sarawi, Derek Abbott:
Quantization Backdoors to Deep Learning Commercial Frameworks. IEEE Trans. Dependable Secur. Comput. 21(3): 1155-1172 (2024) - [j53]Sichun Du, Jun Li, Chen Sun, Pingdan Xiao, Qinghui Hong, Jiliang Zhang:
Analog In-memory Circuit Design of Polynomial Multiplication for Lattice Cipher Acceleration Application. ACM Trans. Embed. Comput. Syst. 23(6): 88:1-88:24 (2024) - [j52]Pingdan Xiao, Qinghui Hong, Jingru Sun, Sichun Du, Jiliang Zhang:
Design and Application of Programmable Analog Circuit for Solving Lyapunov Matrix Equation Based on Memristors. IEEE Trans. Ind. Electron. 71(7): 7786-7795 (2024) - [j51]Congcong Chen, Jinhua Cui, Gang Qu, Jiliang Zhang:
Write+Sync: Software Cache Write Covert Channels Exploiting Memory-Disk Synchronization. IEEE Trans. Inf. Forensics Secur. 19: 8066-8078 (2024) - [j50]Pingdan Xiao, Qinghui Hong, Sichun Du, Jiliang Zhang:
Analog-in-Memory Accelerator Design Based on Memristive Arrays for Opposite Directional Interference Alignment Algorithm. IEEE Trans. Ind. Informatics 20(3): 3628-3638 (2024) - [j49]Hegan Chen, Qinghui Hong, Zhongrui Wang, Chunhua Wang, Xiangxiang Zeng, Jiliang Zhang:
Memristive Circuit Implementation of Caenorhabditis Elegans Mechanism for Neuromorphic Computing. IEEE Trans. Neural Networks Learn. Syst. 35(9): 12015-12026 (2024) - [j48]Dan Tang, Zhiqing Zheng, Keqin Li, Chao Yin, Wei Liang, Jiliang Zhang:
FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN. IEEE Trans. Netw. Sci. Eng. 11(3): 2524-2536 (2024) - [j47]Yuan Zhang, Jiliang Zhang:
A High Throughput STR-based TRNG by Jitter Precise Quantization Superposing. ACM Trans. Design Autom. Electr. Syst. 29(1): 6:1-6:19 (2024) - [j46]Zhaojun Lu, Xueyan Wang, Md Tanvir Arafin, Haoxiang Yang, Zhenglin Liu, Jiliang Zhang, Gang Qu:
An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference. IEEE Trans. Very Large Scale Integr. Syst. 32(3): 485-496 (2024) - [c44]Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang:
SoK: Rowhammer on Commodity Operating Systems. AsiaCCS 2024 - [c43]Yuan Zhang, Kuncai Zhong, Jiliang Zhang:
DH-TRNG: A Dynamic Hybrid TRNG with Ultra-High Throughput and Area-Energy Efficiency. DAC 2024: 95:1-95:6 - [c42]Zhaojun Lu, Weizong Yu, Peng Xu, Wei Wang, Jiliang Zhang, Dengguo Feng:
An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE. DAC 2024: 158:1-158:6 - [c41]Chaoqun Shen, Gang Qu, Jiliang Zhang:
SPECRUN: The Danger of Speculative Runahead Execution in Processors. DAC 2024: 162:1-162:6 - [c40]Li Ni, Jiliang Zhang:
S2RAM PUF: An Ultra-low Power Subthreshold SRAM PUF with Zero Bit Error Rate. DAC 2024: 254:1-254:6 - [c39]Zhaojun Lu, Qidong Chen, Peng Xu, Jiliang Zhang, Gang Qu:
A Cryptographic Hardware Engineering Course based on FPGA and Security Analysis Equipment. ACM Great Lakes Symposium on VLSI 2024: 706-711 - [c38]Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang, Yansong Gao, Zhuoxi Yang, Jiliang Zhang:
SegScope: Probing Fine-grained Interrupts via Architectural Footprints. HPCA 2024: 424-438 - [c37]Pingdan Xiao, Qinghui Hong, Sichun Du, Jiliang Zhang:
CIM-KF: Efficient Computing-in-memory Circuits for Full-Process Execution of Kalman Filter Algorithm. ICPP 2024: 1032-1041 - [c36]Qiao Peng, Xiaoguo Wan, Jiliang Zhang:
FOSA: A Highly Fault-Tolerant Operating System Architecture. ITC-Asia 2024: 1-6 - [c35]Kuncai Zhong, Jiangyuan Wang, Lu Chen, Peng Wang, Zixuan You, Yuan Zhang, Jiliang Zhang:
A Brief Survey on Randomizer Design and Optimization for Efficient Stochastic Computing. ITC-Asia 2024: 1-6 - [i17]Lin Ding, Song Bian, Penggao He, Yan Xu, Gang Qu, Jiliang Zhang:
APACHE: A Processing-Near-Memory Architecture for Multi-Scheme Fully Homomorphic Encryption. CoRR abs/2404.15819 (2024) - [i16]Congcong Chen, Jinhua Cui, Jiliang Zhang:
BETA: Automated Black-box Exploration for Timing Attacks in Processors. CoRR abs/2410.16648 (2024) - 2023
- [j45]Li Ni, Pengjun Wang, Yuejun Zhang, Gang Li, Lin Ding, Jiliang Zhang:
PI PUF: A Processor-Intrinsic PUF for IoT. Comput. Electr. Eng. 105: 108540 (2023) - [j44]Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, Keqin Li:
Artificial Intelligence Security: Threats and Countermeasures. ACM Comput. Surv. 55(2): 20:1-20:36 (2023) - [j43]Qinghui Hong, Bang He, Zedi Zhang, Pingdan Xiao, Sichun Du, Jiliang Zhang:
Circuit Design and Application of Discrete Cosine Transform Based on Memristor. IEEE J. Emerg. Sel. Topics Circuits Syst. 13(2): 502-513 (2023) - [j42]Hanpu Zhou, Zhuoying Fei, Qinghui Hong, Jingru Sun, Sichun Du, Tao Li, Jiliang Zhang:
Bionic Dual-Loop Emotional Learning Circuit and Its Application in Radiation Early Warning Monitoring. IEEE Trans. Cogn. Dev. Syst. 15(3): 1196-1208 (2023) - [j41]Hegan Chen, Qinghui Hong, Wenqi Liu, Zhongrui Wang, Jiliang Zhang:
Design and Application of Biomimetic Memory Circuit Based on Hippocampus Mechanism. IEEE Trans. Cogn. Dev. Syst. 15(3): 1289-1300 (2023) - [j40]Qinghui Hong, Haotian Fu, Yiyang Liu, Jiliang Zhang:
In-Memory Computing Circuit Implementation of Complex-Valued Hopfield Neural Network for Efficient Portrait Restoration. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(10): 3338-3351 (2023) - [j39]Jiliang Zhang, Chaoqun Shen, Gang Qu:
Mex+Sync: Software Covert Channels Exploiting Mutual Exclusion and Synchronization. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4491-4504 (2023) - [j38]Qinghui Hong, Shen Man, Jingru Sun, Sichun Du, Jiliang Zhang:
Programmable In-Memory Computing Circuit for Solving Combinatorial Matrix Operation in One Step. IEEE Trans. Circuits Syst. I Regul. Pap. 70(7): 2916-2928 (2023) - [j37]Aibin Yan, Runqi Liu, Jie Cui, Tianming Ni, Patrick Girard, Xiaoqing Wen, Jiliang Zhang:
Designs of BCD Adder Based on Excess-3 Code in Quantum-Dot Cellular Automata. IEEE Trans. Circuits Syst. II Express Briefs 70(6): 2256-2260 (2023) - [j36]Aibin Yan, Aoran Cao, Zhengfeng Huang, Jie Cui, Tianming Ni, Patrick Girard, Xiaoqing Wen, Jiliang Zhang:
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications. IEEE Trans. Emerg. Top. Comput. 11(4): 1070-1081 (2023) - [j35]Jiliang Zhang, Shuang Peng, Yansong Gao, Zhi Zhang, Qinghui Hong:
APMSA: Adversarial Perturbation Against Model Stealing Attacks. IEEE Trans. Inf. Forensics Secur. 18: 1667-1679 (2023) - [j34]Dan Tang, Chenjun Gao, Wei Liang, Jiliang Zhang, Keqin Li:
FTMaster: A Detection and Mitigation System of Low-Rate Flow Table Overflow Attacks via SDN. IEEE Trans. Netw. Serv. Manag. 20(4): 5073-5084 (2023) - [j33]Qinghui Hong, Richeng Huang, Pingdan Xiao, Jun Li, Jingru Sun, Jiliang Zhang:
Programmable In-memory Computing Circuit of Fast Hartley Transform. ACM Trans. Design Autom. Electr. Syst. 28(6): 100:1-100:23 (2023) - [j32]Dan Tang, Siyuan Wang, Boru Liu, Wenqiang Jin, Jiliang Zhang:
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN. IEEE Trans. Serv. Comput. 16(5): 3373-3384 (2023) - [c34]Aditya Japa, Jiliang Zhang, Weiqiang Liu, Chongyan Gu:
Processor based Intrinsic PUF Design for Approximate Computing: Faith or Reality? AsianHOST 2023: 1-6 - [c33]Jinhua Cui, Yiyun Yin, Zhiping Cai, Jiliang Zhang:
A Comparison Study of the Compatibility Approaches for SGX Enclaves. ATS 2023: 1-6 - [c32]Huawei Li, Jing Ye, Wei Hu, Jiliang Zhang:
Message from the Chairs. ATS 2023: 1 - [c31]Zhaojun Lu, Qi Zhao, Qidong Chen, Jiliang Zhang:
A Survey on Fault-Tolerance Methods for SRAM-Based FPGAs in Radiation Environments. ATS 2023: 1-6 - [c30]Lin Ding, Song Bian, Jiliang Zhang:
PIMA-LPN: Processing-in-memory Acceleration for Efficient LPN-based Post-Quantum Cryptography. DAC 2023: 1-6 - [c29]Zhaojun Lu, Houjia Qidiao, Qidong Chen, Zhenglin Liu, Jiliang Zhang:
An FPGA-Compatible TRNG with Ultra-High Throughput and Energy Efficiency. DAC 2023: 1-6 - [c28]Chaoqun Shen, Jiliang Zhang, Gang Qu:
MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization. DAC 2023: 1-6 - [c27]Jinhua Cui, Yiyun Yin, Congcong Chen, Jiliang Zhang:
Spoiler-Alert: Detecting Spoiler Attacks Using a Cuckoo Filter. DATE 2023: 1-6 - [c26]Gang Yu, Lingyou Zhou, Jiliang Zhang, Jie Zhang:
A Ray-Launching Algorithm for Polarized Wireless Channel Prediction. GLOBECOM (Workshops) 2023: 1928-1933 - [i15]Jiliang Zhang, Jing Xu, Zhi Zhang, Yansong Gao:
Imperceptible Sample-Specific Backdoor to DNN with Denoising Autoencoder. CoRR abs/2302.04457 (2023) - [i14]Lingyou Zhou, Jie Zhang, Jiliang Zhang, Oktay Cetinkaya, Steve Jubb:
A Fast Path Loss Model for Wireless Channels Considering Environmental Factors. CoRR abs/2303.12441 (2023) - [i13]Chaoqun Shen, Gang Qu, Jiliang Zhang:
SPECRUN: The Danger of Speculative Runahead Execution in Processors. CoRR abs/2312.01832 (2023) - [i12]Congcong Chen, Jinhua Cui, Gang Qu, Jiliang Zhang:
SYNC+SYNC: Software Cache Write Covert Channels Exploiting Memory-disk Synchronization. CoRR abs/2312.11501 (2023) - 2022
- [j31]Jiliang Zhang, Chaoqun Shen, Zhiyang Guo, Qiang Wu, Wanli Chang:
CT PUF: Configurable Tristate PUF Against Machine Learning Attacks for IoT Security. IEEE Internet Things J. 9(16): 14452-14462 (2022) - [j30]Jiliang Zhang, Chaoqun Shen, Haihan Su, Md Tanvir Arafin, Gang Qu:
Voltage Over-Scaling-Based Lightweight Authentication for IoT Security. IEEE Trans. Computers 71(2): 323-336 (2022) - [j29]Yupeng Hu, Linjun Wu, Zhuojun Chen, Yun Huang, Xiaolin Xu, Keqin Li, Jiliang Zhang:
STT-MRAM-Based Reliable Weak PUF. IEEE Trans. Computers 71(7): 1564-1574 (2022) - [j28]Wenhao Wang, Guangyu Hu, Xiaolin Xu, Jiliang Zhang:
CRAlert: Hardware-Assisted Code Reuse Attack Detection. IEEE Trans. Circuits Syst. II Express Briefs 69(3): 1607-1611 (2022) - [j27]Zhuojun Chen, Wenshang Lee, Qinghui Hong, Chongyan Gu, Zhenyu Guan, Lin Ding, Jiliang Zhang:
A Lightweight and Machine-Learning-Resistant PUF Using Obfuscation-Feedback-Shift-Register. IEEE Trans. Circuits Syst. II Express Briefs 69(11): 4543-4547 (2022) - [c25]Congcong Chen, Chaoqun Shen, Jiliang Zhang:
Lightweight and Secure Branch Predictors against Spectre Attacks. ASP-DAC 2022: 25-30 - [c24]Jiliang Zhang, Lin Ding, Zhuojun Chen, Wenshang Li, Gang Qu:
DA PUF: dual-state analog PUF. DAC 2022: 73-78 - [i11]Chaoqun Shen, Jiliang Zhang, Gang Qu:
MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization. CoRR abs/2211.11855 (2022) - 2021
- [j26]Jiliang Zhang, Chaoqun Shen:
Set-Based Obfuscation for Strong PUFs Against Machine Learning Attacks. IEEE Trans. Circuits Syst. I Regul. Pap. 68(1): 288-300 (2021) - [j25]He Li, Ameer Abdelhadi, Runbin Shi, Jiliang Zhang, Qiang Liu:
Adversarial Hardware With Functional and Topological Camouflage. IEEE Trans. Circuits Syst. II Express Briefs 68(5): 1685-1689 (2021) - [c23]Chaoqun Shen, Congcong Chen, Jiliang Zhang:
Micro-architectural Cache Side-Channel Attacks and Countermeasures. ASP-DAC 2021: 441-448 - [c22]Jiliang Zhang, Junjie Hou:
Unpaired Image-to-Image Translation Network for Semantic-based Face Adversarial Examples Generation. ACM Great Lakes Symposium on VLSI 2021: 449-454 - [c21]He Li, Yaru Pang, Jiliang Zhang:
Security Enhancements for Approximate Machine Learning. ACM Great Lakes Symposium on VLSI 2021: 461-466 - 2020
- [j24]Xinbo Liu, Yaping Lin, He Li, Jiliang Zhang:
A novel method for malware detection on ML-based visualization technique. Comput. Secur. 89 (2020) - [j23]Junye Shi, Yang Lu, Jiliang Zhang:
Approximation Attacks on Strong PUFs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 2138-2151 (2020) - [j22]Jiliang Zhang, Gang Qu:
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security. IEEE Trans. Ind. Electron. 67(8): 7025-7033 (2020) - [j21]Jiliang Zhang, Chen Li:
Adversarial Examples: Opportunities and Challenges. IEEE Trans. Neural Networks Learn. Syst. 31(7): 2578-2593 (2020) - [c20]Wei Hu, Lingjuan Wu, Yu Tai, Jing Tan, Jiliang Zhang:
A Unified Formal Model for Proving Security and Reliability Properties. ATS 2020: 1-6 - [c19]Yipei Yang, Jing Ye, Yuan Cao, Jiliang Zhang, Xiaowei Li, Huawei Li, Yu Hu:
Survey: Hardware Trojan Detection for Netlist. ATS 2020: 1-6 - [c18]Jiliang Zhang, Shuang Peng, Yupeng Hu, Fei Peng, Wei Hu, Jinmei Lai, Jing Ye, Xiangqi Wang:
HRAE: Hardware-assisted Randomization against Adversarial Example Attacks. ATS 2020: 1-6 - [c17]Jiliang Zhang, Chen Li, Jing Ye, Gang Qu:
Privacy Threats and Protection in Machine Learning. ACM Great Lakes Symposium on VLSI 2020: 531-536 - [c16]Qingli Guo, Jing Ye, Jiliang Zhang, Yu Hu, Xiaowei Li, Huawei Li:
Prediction Stability: A New Metric for Quantitatively Evaluating DNN Outputs. ACM Great Lakes Symposium on VLSI 2020: 537-542 - [c15]Yehao Kong, Jiliang Zhang:
Adversarial Audio: A New Information Hiding Method. INTERSPEECH 2020: 2287-2291 - [c14]Qiang Wu, Jiliang Zhang:
CT PUF: Configurable Tristate PUF against Machine Learning Attacks. ISCAS 2020: 1-5 - [c13]Xiaolin Xu, Jiliang Zhang:
Rethinking FPGA Security in the New Era of Artificial Intelligence. ISQED 2020: 46-51 - [i10]Yupeng Hu, Zhe Jin, Wenjia Li, Yang Xiang, Jiliang Zhang:
SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android. CoRR abs/2006.12831 (2020) - [i9]Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim:
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. CoRR abs/2007.10760 (2020)
2010 – 2019
- 2019
- [j20]Jiliang Zhang, Binhang Qi, Zheng Qin, Gang Qu:
HCIC: Hardware-Assisted Control-Flow Integrity Checking. IEEE Internet Things J. 6(1): 458-471 (2019) - [j19]Aibin Yan, Kang Yang, Zhengfeng Huang, Jiliang Zhang, Jie Cui, Xiangsheng Fang, Maoxiang Yi, Xiaoqing Wen:
A Double-Node-Upset Self-Recoverable Latch Design for High Performance and Low Power Application. IEEE Trans. Circuits Syst. II Express Briefs 66-II(2): 287-291 (2019) - [j18]Jiliang Zhang, Gang Qu:
Recent Attacks and Defenses on FPGA-based Systems. ACM Trans. Reconfigurable Technol. Syst. 12(3): 14:1-14:24 (2019) - [c12]Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li:
ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples. IWQoS 2019: 38:1-38:10 - [i8]Yehao Kong, Jiliang Zhang:
Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models. CoRR abs/1904.03829 (2019) - [i7]Jiliang Zhang, Wuqiao Chen, Yuqi Niu:
DeepCheck: A Non-intrusive Control-flow Integrity Checking based on Deep Learning. CoRR abs/1905.01858 (2019) - 2018
- [j17]Jiliang Zhang, Xiao Tan, Xiangqi Wang, Aibin Yan, Zheng Qin:
T2FA: Transparent Two-Factor Authentication. IEEE Access 6: 32677-32686 (2018) - [j16]Pengfei Qiu, Yongqiang Lyu, Jiliang Zhang, Dongsheng Wang, Gang Qu:
Control Flow Integrity Based on Lightweight Encryption Architecture. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(7): 1358-1369 (2018) - [j15]Jiliang Zhang, Xiao Tan, Yuanjing Zhang, Weizheng Wang, Zheng Qin:
Frequency Offset-Based Ring Oscillator Physical Unclonable Function. IEEE Trans. Multi Scale Comput. Syst. 4(4): 711-721 (2018) - [c11]Haihan Su, Jiliang Zhang:
Machine Learning Attacks on Voltage Over-scaling-based Lightweight Authentication. AsianHOST 2018: 50-55 - [i6]Jiliang Zhang, Binhang Qi, Gang Qu:
HCIC: Hardware-assisted Control-flow Integrity Checking. CoRR abs/1801.07397 (2018) - [i5]Jiliang Zhang, Lu Wan:
CMOS: Dynamic Multi-key Obfuscation Structure for Strong PUFs. CoRR abs/1806.02011 (2018) - [i4]Jiliang Zhang, Haihan Su:
Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication. CoRR abs/1807.07737 (2018) - [i3]Jiliang Zhang:
Crossover RO PUF-based Key Sharing for IoT Security. CoRR abs/1807.10884 (2018) - [i2]Xinbo Liu, Yapin Lin, He Li, Jiliang Zhang:
Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods. CoRR abs/1808.01546 (2018) - [i1]Jiliang Zhang, Xiaoxiong Jiang:
Adversarial Examples: Opportunities and Challenges. CoRR abs/1809.04790 (2018) - 2017
- [j14]Jiliang Zhang, Weizheng Wang, Xing-Wei Wang, Zhihua Xia:
Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding. J. Comput. Sci. Technol. 32(2): 329-339 (2017) - [j13]Jiliang Zhang, Lele Liu:
Publicly Verifiable Watermarking for Intellectual Property Protection in FPGA Design. IEEE Trans. Very Large Scale Integr. Syst. 25(4): 1520-1527 (2017) - [j12]Dongqi Wang, Dongming Chen, Ben Ma, Lisheng Xu, Jiliang Zhang:
A High Capacity Spatial Domain Data Hiding Scheme for Medical Images. J. Signal Process. Syst. 87(2): 215-227 (2017) - [c10]Zihan Pang, Jiliang Zhang, Qiang Zhou, Shuqian Gong, Xu Qian, Bin Tang:
Crossover Ring Oscillator PUF. ISQED 2017: 237-243 - 2016
- [j11]He Li, Qiang Liu, Jiliang Zhang:
A survey of hardware Trojan threat and defense. Integr. 55: 426-437 (2016) - [j10]Jiliang Zhang, Qiang Wu, Yipeng Ding, Yong-Qiang Lv, Qiang Zhou, Zhihua Xia, Xingming Sun, Xing-Wei Wang:
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function. J. Comput. Sci. Technol. 31(1): 124-136 (2016) - [j9]Qian Wang, An Wang, Liji Wu, Jiliang Zhang:
A new zero value attack combined fault sensitivity analysis on masked AES. Microprocess. Microsystems 45: 355-362 (2016) - [j8]Jiliang Zhang, Gang Qu:
Rebuttal to "Comments on 'A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing"'. IEEE Trans. Inf. Forensics Secur. 11(11): 2626-2627 (2016) - [j7]Jiliang Zhang:
A Practical Logic Obfuscation Technique for Hardware Security. IEEE Trans. Very Large Scale Integr. Syst. 24(3): 1193-1197 (2016) - [c9]Pengfei Qiu, Yongqiang Lyu, Jiliang Zhang, Xingwei Wang, Di Zhai, Dongsheng Wang, Gang Qu:
Physical unclonable functions-based linear encryption against code reuse attacks. DAC 2016: 75:1-75:6 - [c8]Jiliang Zhang:
Combinational Logic Binding for FPGA System Security. Trustcom/BigDataSE/ISPA 2016: 216-223 - 2015
- [j6]Yipeng Ding, Jingtian Tang, Xuemei Xu, Jiliang Zhang:
Application of Linear Predictive Coding for Doppler Through-Wall Radar Target Tracking. IEEE Geosci. Remote. Sens. Lett. 12(6): 1317-1321 (2015) - [j5]Jiliang Zhang, Yaping Lin, Yongqiang Lyu, Gang Qu:
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing. IEEE Trans. Inf. Forensics Secur. 10(6): 1137-1150 (2015) - [j4]Jiliang Zhang, Yaping Lin, Gang Qu:
Reconfigurable Binding against FPGA Replay Attacks. ACM Trans. Design Autom. Electr. Syst. 20(2): 33:1-33:20 (2015) - [c7]He Li, Qiang Liu, Jiliang Zhang, Yongqiang Lyu:
A Survey of Hardware Trojan Detection, Diagnosis and Prevention. CAD/Graphics 2015: 173-180 - [c6]Mingze Gao, Khai Lai, Jiliang Zhang, Gang Qu, Aijiao Cui, Qiang Zhou:
Reliable and Anti-cloning PUFs Based on Configurable Ring Oscillators. CAD/Graphics 2015: 194-201 - 2014
- [j3]Jiliang Zhang, Gang Qu, Yong-Qiang Lv, Qiang Zhou:
A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs. J. Comput. Sci. Technol. 29(4): 664-678 (2014) - [c5]Jiliang Zhang, Gang Qu:
A survey on security and trust of FPGA-based systems. FPT 2014: 147-152 - [c4]Bin Tang, Yaping Lin, Jiliang Zhang:
Improving the reliability of RO PUF using frequency offset. FPT 2014: 338-341 - 2013
- [c3]Jiliang Zhang, Qiang Wu, Yongqiang Lyu, Qiang Zhou, Yici Cai, Yaping Lin, Gang Qu:
Design and Implementation of a Delay-Based PUF for FPGA IP Protection. CAD/Graphics 2013: 107-114 - [c2]Jiliang Zhang, Yaping Lin, Yongqiang Lu, Ray C. C. Cheung, Wenjie Che, Qiang Zhou, Jinian Bian:
Binding Hardware IPs to Specific FPGA Device via Inter-twining the PUF Response with the FSM of Sequential Circuits. FCCM 2013: 227 - [c1]Jiliang Zhang, Yaping Lin, Yongqiang Lyu, Gang Qu, Ray C. C. Cheung, Wenjie Che, Qiang Zhou, Jinian Bian:
FPGA IP protection by binding Finite State Machine to Physical Unclonable Function. FPL 2013: 1-4 - 2012
- [j2]Jiliang Zhang, Yongqiang Lu, Qiang Zhou, Qiang Wu, Yaping Lin, Kang Zhao:
TimFastPlace: Critical-path based timing driven FastPlace. IEICE Electron. Express 9(16): 1310-1315 (2012) - [j1]Jiliang Zhang, Yaping Lin, Wenjie Che, Qiang Wu, Yongqiang Lu, Kang Zhao:
Efficient verification of IP watermarks in FPGA designs through lookup table content extracting. IEICE Electron. Express 9(22): 1735-1741 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint