Ning Zhang

Orcid: 0000-0003-0670-2161

Affiliations:
  • Washington University in St. Louis, St. Louis, MO, USA
  • Virginia Polytechnic Institute and State University, Department of Computer Science, Blacksburg, VA, USA (PhD 2016)


According to our database1, Ning Zhang authored at least 94 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hiding in Plain Sight: Adversarial Attack via Style Transfer on Image Borders.
IEEE Trans. Computers, October, 2024

Priority-based concurrency and shared resource access mechanisms for nested intercomponent requests in CAmkES.
Real Time Syst., March, 2024

Interface-Based Side Channel in TEE-Assisted Networked Services.
IEEE/ACM Trans. Netw., February, 2024

SoK: Security and Privacy Risks of Medical AI.
CoRR, 2024

Data Exposure from LLM Apps: An In-depth Investigation of OpenAI's GPTs.
CoRR, 2024

SecGPT: An Execution Isolation Architecture for LLM-Based Systems.
CoRR, 2024

Automatic and Universal Prompt Injection Attacks against Large Language Models.
CoRR, 2024

Preference Poisoning Attacks on Reward Model Learning.
CoRR, 2024

Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024

SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities.
Proceedings of the 33rd USENIX Security Symposium, 2024

Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation.
Proceedings of the 33rd USENIX Security Symposium, 2024

Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

InsectACIDE: Debugger-Based Holistic Asynchronous CFI for Embedded System.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024

Elastic Scheduling for Harmonic Task Systems.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024

An Empirical Study of Performance Interference: Timing Violation Patterns and Impacts.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024

Data-flow Availability: Achieving Timing Assurance in Autonomous Systems.
Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, 2024

PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
BD-SAS: Enabling Dynamic Spectrum Sharing in Low-Trust Environment.
IEEE Trans. Cogn. Commun. Netw., August, 2023

ChargeX: Exploring State Switching Attack on Electric Vehicle Charging Systems.
CoRR, 2023

MS-PTP: Protecting Network Timing from Byzantine Attacks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography.
Proceedings of the 32nd USENIX Security Symposium, 2023

SMACK: Semantically Meaningful Adversarial Audio Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

ARI: Attestation of Real-time Mission Execution Integrity.
Proceedings of the 32nd USENIX Security Symposium, 2023

Who's Afraid of Butterflies? A Close Examination of the Butterfly Attack.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

A Procrastinating Control-Flow Integrity Framework for Periodic Real-Time Systems.
Proceedings of the 31st International Conference on Real-Time Networks and Systems, 2023

A Decentralized Truth Discovery Approach to the Blockchain Oracle Problem.
Proceedings of the IEEE INFOCOM 2023, 2023

CodeIPPrompt: Intellectual Property Infringement Assessment of Code Language Models.
Proceedings of the International Conference on Machine Learning, 2023

Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

IP Protection in TinyML.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

RIATIG: Reliable and Imperceptible Adversarial Text-to-Image Generation with Natural Prompts.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

MTD '23: 10th ACM Workshop on Moving Target Defense.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Secure and Timely GPU Execution in Cyber-physical Systems.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Decentralized Spectrum Access System: Vision, Challenges, and a Blockchain Solution.
IEEE Wirel. Commun., 2022

Graph-based stock correlation and prediction for high-frequency trading systems.
Pattern Recognit., 2022

PROVES: Establishing Image Provenance using Semantic Signatures.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Work-in-Progress: Measuring Security Protection in Real-time Embedded Firmware.
Proceedings of the IEEE Real-Time Systems Symposium, 2022

PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference.
Proceedings of the IEEE Real-Time Systems Symposium, 2022

A Capture The Flag (CTF) Platform and Exercises for an Intro to Computer Security Class.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022

From Timing Variations to Performance Degradation: Understanding and Mitigating the Impact of Software Execution Timing in SLAM.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022

PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

Reward Delay Attacks on Deep Reinforcement Learning.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

When Evil Calls: Targeted Adversarial Voice over IP Network.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021

Security and Privacy in the Emerging Cyber-Physical World: A Survey.
IEEE Commun. Surv. Tutorials, 2021

Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Research Challenges for Combined Autonomy, AI, and Real-Time Assurance.
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021

Towards Automated Computational Auditing of mHealth Security and Privacy Regulations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications.
IEEE Trans. Very Large Scale Integr. Syst., 2020

A Survey of Distributed Consensus Protocols for Blockchain Networks.
IEEE Commun. Surv. Tutorials, 2020

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Bit<sup>2</sup>RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

RusTEE: Developing Memory-Safe ARM TrustZone Applications.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
IEEE Trans. Inf. Forensics Secur., 2019

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019

Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution.
CoRR, 2019

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019

PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Networks.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Memory Forensic Challenges Under Misused Architectural Features.
IEEE Trans. Inf. Forensics Secur., 2018

A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

TruSense: Information Leakage from TrustZone.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

ROSTER: Radio Context Attestation in Cognitive Radio Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality.
ACM Trans. Intell. Syst. Technol., 2017

When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

AugAuth: Shoulder-surfing resistant authentication for augmented reality.
Proceedings of the IEEE International Conference on Communications, 2017

Black penguin: On the feasibility of detecting intrusion with homogeneous memory.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices.
IACR Cryptol. ePrint Arch., 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Looks Good To Me: Authentication for Augmented Reality.
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

2015
Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Enabling Trusted Data-intensive execution in cloud computing.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2012
MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Distributed Data Mining with Differential Privacy.
Proceedings of IEEE International Conference on Communications, 2011


  Loading...