Yizhi Zhao

Orcid: 0000-0002-1258-0132

According to our database1, Yizhi Zhao authored at least 24 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Pinpointing Hardware Trojans Through Semantic Feature Extraction and Natural Language Processing.
Proceedings of the IEEE International Test Conference in Asia, 2024

2023
Semi-supervised Cell Recognition under Point Supervision.
CoRR, 2023

PathAsst: Redefining Pathology through Generative Foundation AI Assistant for Pathology.
CoRR, 2023

2022
Estimation of the Mixed Layer Depth in the Indian Ocean from Surface Parameters: A Clustering-Neural Network Method.
Sensors, 2022

zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs.
Future Gener. Comput. Syst., 2022

Proof of Non-stationary Channel Polarization.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

Secure Polar Coding with Non-stationary Channel Polarization.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

Robustness of classifier to adversarial examples under imbalanced data.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Secure polar coding with delayed wiretapping information.
IET Commun., 2020

CSI learning based active secure coding scheme for detectable wiretap channel.
IET Commun., 2020

Secure Polar Coding for Adversarial Wiretap Channel.
CoRR, 2020

zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Symbolic Model for Systematically Analyzing TEE-Based Protocols.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Encrypted secure polar coding scheme for general two-way wiretap channel.
IET Inf. Secur., 2019

2018
Strong Security Polar Coding with Delayed Wiretap Channel State Information.
CoRR, 2018

Irregular Channel Polarization and Its Applications to Static Adversarial Wiretap Channel.
CoRR, 2018

Active Secure Coding Based on Eavesdropper Behavior Learning.
CoRR, 2018

2017
Chaotic Encrypted Polar Coding Scheme for General Wiretap Channel.
IEEE Trans. Very Large Scale Integr. Syst., 2017

2016
Chaos embedded polar coding for wiretap channel in negative secrecy capacity case.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
Compressive Sampling and Rapid Reconstruction of Broadband Frequency Hopping Signals with Interference.
Circuits Syst. Signal Process., 2015

2012
Adaptive Mac protocols for wireless sensor networks
PhD thesis, 2012

HeapDefender: A Mechanism of Defending Embedded Systems against Heap Overflow via Hardware.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Hardware implementation of SHA-3 candidate based on BLAKE-32.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012


  Loading...