What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ning Zhang
Google Scholar
ORCID:
0000-0003-0670-2161
47
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Preference Poisoning Attacks on Reward Model Learning.
Junlin Wu
Jiongxiao Wang
Chaowei Xiao
Chenguang Wang
Ning Zhang
Yevgeniy Vorobeychik
2025
conf/ndss
IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic Systems.
Yuhao Wu
Franziska Roesner
Tadayoshi Kohno
Ning Zhang
Umar Iqbal
2025
conf/ndss
TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization.
Zelun Kong
Minkyung Park
Le Guan
Ning Zhang
Chung Hwan Kim
2025
conf/soups
Smart Spaces, Private Lives: A Culturally Grounded Examination of Privacy Tensions in Smart Homes.
Yara Alsiyat
Yuanhaur Chang
Ning Zhang
Ivan Flechais
2025
conf/uss
Software Availability Protection in Cyber-Physical Systems.
Ao Li
Jinwen Wang
Ning Zhang
2025
conf/uss
Secure Information Embedding in Forensic 3D Fingerprinting.
Canran Wang
Jinwen Wang
Mi Zhou
Vinh Pham
Senyue Hao
Chao Zhou
Ning Zhang
Netanel Raviv
2024
conf/ccs
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning.
Zhiyuan Yu
Ao Li
Ruoyao Wen
Yijia Chen
Ning Zhang
2024
conf/uss
Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation.
Yujie Wang
Ao Li
Jinwen Wang
Sanjoy K. Baruah
Ning Zhang
2024
conf/uss
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities.
Yuhao Wu
Jinwen Wang
Yujie Wang
Shixuan Zhai
Zihan Li
Yi He
Kun Sun
Qi Li
Ning Zhang
2024
conf/uss
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models.
Zhiyuan Yu
Xiaogeng Liu
Shunning Liang
Zach Cameron
Chaowei Xiao
Ning Zhang
2024
conf/sp
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack.
Han Liu
Yuhao Wu
Zhiyuan Yu
Ning Zhang
2023
conf/ccs
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis.
Zhiyuan Yu
Shixuan Zhai
Ning Zhang
2023
conf/ccs
Secure and Timely GPU Execution in Cyber-physical Systems.
Jinwen Wang
Yujie Wang
Ning Zhang
2023
conf/ccs
MTD '23: 10th ACM Workshop on Moving Target Defense.
Ning Zhang
Qi Li
2023
conf/uss
ARI: Attestation of Real-time Mission Execution Integrity.
Jinwen Wang
Yujie Wang
Ao Li
Yang Xiao
Ruide Zhang
Wenjing Lou
Y. Thomas Hou
Ning Zhang
2023
conf/uss
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography.
Zhiyuan Yu
Yuanhaur Chang
Shixuan Zhai
Nicholas Deily
Tao Ju
XiaoFeng Wang
Uday Jammalamadaka
Ning Zhang
2023
conf/uss
SMACK: Semantically Meaningful Adversarial Audio Attack.
Zhiyuan Yu
Yuanhaur Chang
Ning Zhang
Chaowei Xiao
2023
conf/dsn
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
Jiadong Lou
Xiaohan Zhang
Yihe Zhang
Xinghua Li
Xu Yuan
Ning Zhang
2023
conf/wisec
MS-PTP: Protecting Network Timing from Byzantine Attacks.
Shanghao Shi
Yang Xiao
Changlai Du
Md Hasan Shahriar
Ao Li
Ning Zhang
Y. Thomas Hou
Wenjing Lou
2022
conf/ccs
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions.
Zhiyuan Yu
Zhuohang Li
Yuanhaur Chang
Skylar Fong
Jian Liu
Ning Zhang
2022
conf/ccs
When Evil Calls: Targeted Adversarial Voice over IP Network.
Han Liu
Zhiyuan Yu
Mingming Zha
XiaoFeng Wang
William Yeoh
Yevgeniy Vorobeychik
Ning Zhang
2022
conf/sp
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone.
Jinwen Wang
Ao Li
Haoran Li
Chenyang Lu
Ning Zhang
2022
conf/eurosp
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers.
Jiameng Shi
Le Guan
Wenqiang Li
Dayou Zhang
Ping Chen
Ning Zhang
2022
conf/acsac
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Ning Wang
Yang Xiao
Yimin Chen
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2021
conf/ccs
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations.
Brian Tung
Zhiyuan Yu
Ning Zhang
2021
conf/ccs
Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems.
Ao Li
Jinwen Wang
Ning Zhang
2021
conf/uss
Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems.
Jiadong Lou
Xu Yuan
Ning Zhang
2021
conf/wisec
Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands.
Shengye Wan
Kun Sun
Ning Zhang
Yue Li
2020
conf/esorics
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Yang Xiao
Ning Zhang
Jin Li
Wenjing Lou
Y. Thomas Hou
2020
conf/host
Bit<sup>2</sup>RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory.
Wei Yan
Huifeng Zhu
Zhiyuan Yu
Fatemeh Tehranipoor
John A. Chandy
Ning Zhang
Xuan Zhang
2020
conf/ndss
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Qiben Yan
Kehai Liu
Qin Zhou
Hanqing Guo
Ning Zhang
2020
conf/acsac
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication.
Yang Xiao
Shanghao Shi
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2020
conf/acsac
RusTEE: Developing Memory-Safe ARM TrustZone Applications.
Shengye Wan
Mingshen Sun
Kun Sun
Ning Zhang
Xu He
2019
journals/tifs
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
Yaxing Chen
Wenhai Sun
Ning Zhang
Qinghua Zheng
Wenjing Lou
Y. Thomas Hou
2019
conf/uss
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Liang Tong
Bo Li
Chen Hajaj
Chaowei Xiao
Ning Zhang
Yevgeniy Vorobeychik
2019
conf/dsn
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Shengye Wan
Jianhua Sun
Kun Sun
Ning Zhang
Qi Li
2018
journals/tifs
Memory Forensic Challenges Under Misused Architectural Features.
Ning Zhang
Ruide Zhang
Kun Sun
Wenjing Lou
Y. Thomas Hou
Sushil Jajodia
2018
conf/esorics
PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution.
Ning Zhang
Jin Li
Wenjing Lou
Y. Thomas Hou
2018
conf/cns
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Wenhai Sun
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2018
conf/cns
ROSTER: Radio Context Attestation in Cognitive Radio Network.
Ning Zhang
Wenhai Sun
Wenjing Lou
Y. Thomas Hou
Wade Trappe
2018
conf/cns
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Mohannad Alhanahnah
Qicheng Lin
Qiben Yan
Ning Zhang
Zhenxiang Chen
2017
conf/cns
Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Ning Zhang
Ruide Zhang
Qiben Yan
Wenjing Lou
Y. Thomas Hou
Danfeng Yao
2016
conf/ccs
Looks Good To Me: Authentication for Augmented Reality.
Ethan Gaebel
Ning Zhang
Wenjing Lou
Y. Thomas Hou
2016
conf/sp
CaSE: Cache-Assisted Secure Execution on ARM Processors.
Ning Zhang
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
2016
conf/eurosp
CacheKit: Evading Memory Introspection Using Cache Incoherence.
Ning Zhang
He Sun
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
2015
conf/ccs
Now You See Me: Hide and Seek in Physical Address Space.
Ning Zhang
Kun Sun
Wenjing Lou
Yiwei Thomas Hou
Sushil Jajodia
2014
conf/cns
Enabling Trusted Data-intensive execution in cloud computing.
Ning Zhang
Wenjing Lou
Xuxian Jiang
Y. Thomas Hou
Coauthors
Ao Li
(7)
Bo Li
(1)
Brian Tung
(1)
Canran Wang
(1)
Changlai Du
(1)
Chao Zhou
(1)
Chaowei Xiao
(4)
Chen Hajaj
(1)
Chenguang Wang
(1)
Chenyang Lu
(1)
Chung Hwan Kim
(1)
Danfeng Yao
(1)
Dayou Zhang
(1)
Ethan Gaebel
(1)
Fatemeh Tehranipoor
(1)
Franziska Roesner
(1)
Han Liu
(2)
Hanqing Guo
(1)
Haoran Li
(1)
He Sun
(1)
Huifeng Zhu
(1)
Ivan Flechais
(1)
Jiadong Lou
(2)
Jiameng Shi
(1)
Jian Liu
(1)
Jianhua Sun
(1)
Jin Li
(2)
Jinwen Wang
(8)
Jiongxiao Wang
(1)
John A. Chandy
(1)
Junlin Wu
(1)
Kehai Liu
(1)
Kun Sun
(8)
Le Guan
(2)
Liang Tong
(1)
Md Hasan Shahriar
(1)
Mi Zhou
(1)
Mingming Zha
(1)
Mingshen Sun
(1)
Minkyung Park
(1)
Mohannad Alhanahnah
(1)
Netanel Raviv
(1)
Nicholas Deily
(1)
Ning Wang
(1)
Ning Zhang
(47)
Ping Chen
(1)
Qi Li
(3)
Qiben Yan
(3)
Qicheng Lin
(1)
Qin Zhou
(1)
Qinghua Zheng
(1)
Ruide Zhang
(3)
Ruoyao Wen
(1)
Sanjoy K. Baruah
(1)
Senyue Hao
(1)
Shanghao Shi
(2)
Shengye Wan
(3)
Shixuan Zhai
(3)
Shunning Liang
(1)
Skylar Fong
(1)
Sushil Jajodia
(2)
Tadayoshi Kohno
(1)
Tao Ju
(1)
Uday Jammalamadaka
(1)
Umar Iqbal
(1)
Vinh Pham
(1)
Wade Trappe
(1)
Wei Yan
(1)
Wenhai Sun
(3)
Wenjing Lou
(16)
Wenqiang Li
(1)
William Yeoh
(1)
XiaoFeng Wang
(2)
Xiaogeng Liu
(1)
Xiaohan Zhang
(1)
Xinghua Li
(1)
Xu He
(1)
Xu Yuan
(2)
Xuan Zhang
(1)
Xuxian Jiang
(1)
Y. Thomas Hou
(13)
Yang Xiao
(5)
Yara Alsiyat
(1)
Yaxing Chen
(1)
Yevgeniy Vorobeychik
(3)
Yi He
(1)
Yihe Zhang
(1)
Yijia Chen
(1)
Yimin Chen
(1)
Yiwei Thomas Hou
(3)
Yuanhaur Chang
(4)
Yue Li
(1)
Yuhao Wu
(3)
Yujie Wang
(4)
Zach Cameron
(1)
Zelun Kong
(1)
Zhenxiang Chen
(1)
Zhiyuan Yu
(10)
Zhuohang Li
(1)
Zihan Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to