Fan Zhang
Orcid: 0000-0001-6087-8243Affiliations:
- Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China
- University of Connecticut, Storrs, CT, USA (PhD 2011)
According to our database1,
Fan Zhang
authored at least 106 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Vul-LMGNNs: Fusing language models and online-distilled graph neural networks for code vulnerability detection.
Inf. Fusion, 2025
PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network.
Inf. Fusion, 2025
2024
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024
IEEE Trans. Computers, September, 2024
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains.
IEEE Trans. Mob. Comput., May, 2024
Comput. Secur., March, 2024
IEEE Trans. Dependable Secur. Comput., 2024
SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Integr., 2024
Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024
TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features.
Comput. Networks, 2024
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024
Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection.
Proceedings of the ACM on Web Conference 2024, 2024
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
RIDS: Towards Advanced IDS via RNN Model and Programmable Switches Co-Designed Approaches.
Proceedings of the IEEE INFOCOM 2024, 2024
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining.
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
IEEE Trans. Software Eng., November, 2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023
Extending the classical side-channel analysis framework to access-driven cache attacks.
Comput. Secur., June, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
CoRR, 2023
Comput. Secur., 2023
Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach.
Proceedings of the IEEE Real-Time Systems Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. Secur., 2022
FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
2021
Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint.
IEEE Trans. Inf. Forensics Secur., 2021
Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
IEEE Internet Things J., 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
2020
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2020
A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks.
IEEE Trans. Computers, 2020
IEEE Trans. Computers, 2020
Defending Model Inversion and Membership Inference Attacks via Prediction Purification.
CoRR, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
2019
Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective.
IEEE Trans. Parallel Distributed Syst., 2019
IEEE Trans. Inf. Forensics Secur., 2019
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis.
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
IEEE Access, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Frontiers Inf. Technol. Electron. Eng., 2018
Efficient flush-reload cache attack on scalar multiplication based signature algorithm.
Sci. China Inf. Sci., 2018
Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2018
An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units.
IEEE Access, 2018
Efficient Approximate Algorithms for the Closest Pair Problem in High Dimensional Spaces.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Improved Differential Fault Analysis on LED with Constraint Equations: Towards Reaching Its Limit.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018
2017
Secur. Commun. Networks, 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016
一种基于量子密码的卫星网络窃听攻击检测方法 (Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography).
计算机科学, 2016
Proceedings of the Advances in Multimedia Information Processing - PCM 2016, 2016
2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
2013
J. Syst. Softw., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013
Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
IACR Cryptol. ePrint Arch., 2012
MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the 26th International Conference on Computer Design, 2008