Ning Zhang
Orcid: 0000-0003-0670-2161Affiliations:
- Washington University in St. Louis, St. Louis, MO, USA
- Virginia Polytechnic Institute and State University, Department of Computer Science, Blacksburg, VA, USA (PhD 2016)
According to our database1,
Ning Zhang
authored at least 94 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Computers, October, 2024
Priority-based concurrency and shared resource access mechanisms for nested intercomponent requests in CAmkES.
Real Time Syst., March, 2024
IEEE/ACM Trans. Netw., February, 2024
CoRR, 2024
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024
An Empirical Study of Performance Interference: Timing Violation Patterns and Impacts.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024
Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, 2024
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Cogn. Commun. Netw., August, 2023
CoRR, 2023
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE Real-Time Systems Symposium, 2023
Proceedings of the 31st International Conference on Real-Time Networks and Systems, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
RIATIG: Reliable and Imperceptible Adversarial Text-to-Image Generation with Natural Prompts.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection Using Adversarial Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Wirel. Commun., 2022
Pattern Recognit., 2022
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the IEEE Real-Time Systems Symposium, 2022
PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference.
Proceedings of the IEEE Real-Time Systems Symposium, 2022
A Capture The Flag (CTF) Platform and Exercises for an Intro to Computer Security Class.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
From Timing Variations to Performance Degradation: Understanding and Mitigating the Impact of Software Execution Timing in SLAM.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022
PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Commun. Surv. Tutorials, 2021
Remotely controlling TrustZone applications?: a study on securely and resiliently receiving remote commands.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021
Towards Automated Computational Auditing of mHealth Security and Privacy Regulations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications.
IEEE Trans. Very Large Scale Integr. Syst., 2020
IEEE Commun. Surv. Tutorials, 2020
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Bit<sup>2</sup>RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT.
IEEE Trans. Inf. Forensics Secur., 2019
Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data.
CoRR, 2019
Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution.
CoRR, 2019
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality.
ACM Trans. Intell. Syst. Technol., 2017
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
2011
Proceedings of IEEE International Conference on Communications, 2011