Yusha Zhang

According to our database1, Yusha Zhang authored at least 16 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards Enhanced Energy Aware Resource Optimization for Edge Devices Through Multi-cluster Communication Systems.
J. Grid Comput., June, 2024

A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

KSM: Killer of Spectre and Meltdown Attacks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

A Module Level Security Evaluation Method Based on Model Checking.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution Environments.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
A Combined Deep Learning and Prior Knowledge Constraint Approach for Large-Scale Forest Disturbance Detection Using Time Series Remote Sensing Data.
Remote. Sens., June, 2023

Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Detecting and Mitigating Cache Side Channel Threats on Intel SGX.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Impact of the Dates of Input Image Pairs on Spatio-Temporal Fusion for Time Series with Different Temporal Variation Patterns.
Remote. Sens., 2022

Exploring Chinese lexical differences based on synergetic-linguistic model.
Digit. Scholarsh. Humanit., 2022

Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations.
CoRR, 2022

Analysis of DRAM Vulnerability Using Computation Tree Logic.
Proceedings of the IEEE International Conference on Communications, 2022

2020
A comparative linguistic analysis of English news headlines in China, USA, UK, and ASEAN countries.
Int. J. Comput. Sci. Eng., 2020

Cache side-channel attacks detection based on machine learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Object-Based Change Detection Using Multiple Classifiers and Multi-Scale Uncertainty Analysis.
Remote. Sens., 2019

A Study on Syntactic Complexity and Text Readability of ASEAN English News.
Proceedings of the International Conference on Asian Language Processing, 2019


  Loading...