Feng Zhu

Orcid: 0000-0002-7129-1082

Affiliations:
  • Nanjing University of Posts and Telecommunications, School of Computer Science, Nanjing, China
  • Florida International University, School of Computing and Information Science, Miami, FL, USA (PhD 2014)


According to our database1, Feng Zhu authored at least 18 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence.
IEEE Internet Things J., June, 2024

2023
RF-Ray: Sensing Objects in the Package via RFID Systems.
IEEE Syst. J., March, 2023

2021
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems.
Wirel. Commun. Mob. Comput., 2021

2020
A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems.
Sensors, 2020

SKINNY-Based RFID Lightweight Authentication Protocol.
Sensors, 2020

SecMAP: A Secure RFID Mutual Authentication Protocol for Healthcare Systems.
IEEE Access, 2020

2019
Binary-centric defense of production operating systems against kernel queue injection attacks.
J. Comput. Virol. Hacking Tech., 2019

A Lightweight RFID Mutual Authentication Protocol with PUF.
Sensors, 2019

Analysis and Design of Group RFID Tag Security Authentication Protocol.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

2018
An RFID Indoor Positioning Algorithm Based on Support Vector Regression.
Sensors, 2018

A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.
Sensors, 2018

An Improvement RFID Security Authentication Protocol Based on Hash Function.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2013
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
Proceedings of the Computer Security - ESORICS 2013, 2013

2011
Static analysis based invariant detection for commodity operating systems.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective.
Proceedings of the Cloud Computing, Second International Conference, 2010


  Loading...