Zhenkai Zhang

Orcid: 0000-0002-7934-7773

According to our database1, Zhenkai Zhang authored at least 84 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synergistic optimization strategy for beamforming and power allocation in dual-functional radar-communication systems.
EURASIP J. Adv. Signal Process., December, 2024

A lightweight underwater fish image semantic segmentation model based on U-Net.
IET Image Process., October, 2024

Gesture-mmWAVE: Compact and Accurate Millimeter-Wave Radar-Based Dynamic Gesture Recognition for Embedded Devices.
IEEE Trans. Hum. Mach. Syst., June, 2024

Target parameter estimation for OTFS-integrated radar and communications based on sparse reconstruction preprocessing.
Frontiers Inf. Technol. Electron. Eng., May, 2024

Geometry-Based UAV-MIMO Channel Model for Intelligent Reflecting Surface-Assisted Communication Systems.
IEEE Trans. Veh. Technol., January, 2024

Interference-Robust Millimeter-Wave Radar-Based Dynamic Hand Gesture Recognition Using 2-D CNN-Transformer Networks.
IEEE Internet Things J., January, 2024

Power Resource Allocation Algorithm for Dual-Function Radar-Communication System.
IET Signal Process., 2024

Caching Aided Multi-Tenant Serverless Computing.
CoRR, 2024

Invalidate+Compare: A Timer-Free GPU Cache Attack Primitive.
Proceedings of the 33rd USENIX Security Symposium, 2024

GPU Memory Exploitation for Fun and Profit.
Proceedings of the 33rd USENIX Security Symposium, 2024

DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

WBP: Training-Time Backdoor Attacks Through Hardware-Based Weight Bit Poisoning.
Proceedings of the Computer Vision - ECCV 2024, 2024

Toward Understanding the Security of Plugins in Continuous Integration Services.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

PowSpectre: Powering Up Speculation Attacks with TSX-based Replay.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Optimal Polarization Design for Distributed MIMO Radar Networks: A Stackelberg Game Perspective.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

A Novel Geometry-Based 3-D Wideband Channel Model and Capacity Analysis for IRS-Assisted UAV Communication Systems.
IEEE Trans. Wirel. Commun., August, 2023

Heartbeat information prediction based on transformer model using millimetre-wave radar.
IET Biom., July, 2023

Joint allocation of transmit power and signal bandwidth for distributed cognitive tracking radar network using cooperative game.
Digit. Signal Process., April, 2023

Waveform design and signal processing for integrated radar-communication system based on frequency diversity array.
Digit. Signal Process., March, 2023

Low-sidelobe waveform design for integrated radar-communication systems based on frequency diversity array.
IET Signal Process., February, 2023

mmFingerprint: A New Application Fingerprinting Technique via mmWave Sensing and Its Use in Rowhammer Detection.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

Multiscale Representation for Real-Time Anti-Aliasing Neural Rendering.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

BeKnight: Guarding Against Information Leakage in Speculatively Updated Branch Predictors.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Improving Denoising Diffusion Models via Simultaneous Estimation of Image and Noise.
Proceedings of the Asian Conference on Machine Learning, 2023

2022
Geometry-Based UAV-MIMO Channel Modeling Assisted by Intelligent Reflecting Surface.
IEEE Trans. Veh. Technol., 2022

Moving target defense for the security and resilience of mixed time and event triggered cyber-physical systems.
J. Syst. Archit., 2022

A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock.
J. Hardw. Syst. Secur., 2022

A Nonstationary 3-D Wideband Channel Model for Low-Altitude UAV-MIMO Communication Systems.
IEEE Internet Things J., 2022

Data space randomization for securing cyber-physical systems.
Int. J. Inf. Sec., 2022

Underwater source localization using time difference of arrival and frequency difference of arrival measurements based on an improved invasive weed optimization algorithm.
IET Signal Process., 2022

Joint range and velocity estimation for orthogonal frequency division multiplexing-based high-speed integrated radar and communications system.
IET Commun., 2022

Applications of data augmentation in mineral prospectivity prediction based on convolutional neural networks.
Comput. Geosci., 2022

Distributed power allocation for cognitive tracking based on non-cooperative game in decentralized netted radar.
Digit. Signal Process., 2022

Open Set Recognition using Vision Transformer with an Additional Detection Head.
CoRR, 2022

A Node Selection Algorithm Based on Multi-Objective Optimization Under Position Floating.
IEEE Access, 2022

Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Proceedings of the 43rd IEEE Security and Privacy, 2022

A Vision Transformer Architecture for Open Set Recognition.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022

LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

CSDLEEG: Identifying Confused Students Based on EEG Using Multi-View Deep Learning.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Covert Communication With Relay Selection.
IEEE Wirel. Commun. Lett., 2021

Underwater TDOA/AOA joint localization algorithm based on hybrid invasive weed optimization algorithm.
IET Commun., 2021

An improved underwater TDOA/AOA joint localisation algorithm.
IET Commun., 2021

A joint array resource allocation and transmit beampattern design approach for multiple targets tracking.
Expert Syst. Appl., 2021

Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

Research on the Algorithm of Power Allocation in the Integrated Radar and Communication System.
Proceedings of the 2021 International Conference on Control, 2021

OnlineDC: Leveraging Temporal Driving Behavior to Facilitate Driver Classification.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Array resource allocation for radar and communication integration network.
Signal Process., 2020

Integrated moving target defense and control reconfiguration for securing Cyber-Physical systems.
Microprocess. Microsystems, 2020

Secured green communication scheme for interference alignment based networks.
J. Commun. Networks, 2020

Analysis of security and reliability in cognitive radio networks over Rayleigh channels.
Int. J. Commun. Syst., 2020

Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Security in Mixed Time and Event Triggered Cyber-Physical Systems using Moving Target Defense.
Proceedings of the 23rd IEEE International Symposium on Real-Time Distributed Computing, 2020

BitJabber: The World's Fastest Electromagnetic Covert Channel.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

2019
A model-based design approach for simulation and virtual prototyping of automotive control systems using port-Hamiltonian systems.
Softw. Syst. Model., 2019

Shared Aperture Multibeam Forming of Time-Modulated Linear Array.
Complex., 2019

Deep Sea TDOA Localization Method Based on Improved OMP Algorithm.
IEEE Access, 2019

Dynamic symbolic execution for the analysis of web server applications in Java.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Array resource allocation based on KKT optimization for radar and communication integration: poster abstract.
Proceedings of the 18th International Conference on Information Processing in Sensor Networks, 2019

An Improved Radar and Infrared Sensor Tracking Fusion Algorithm Based on IMM-UKF.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

Integrated data space randomization and control reconfiguration for securing cyber-physical systems.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

An Acoustic Source Localization Algorithm Based on Maximum or Minimum Value Screening in Deep Sea Multipath Environment.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
A novel time difference of arrival localization algorithm using a neural network ensemble model.
Int. J. Distributed Sens. Networks, 2018

Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Triggering Rowhammer Hardware Faults on ARM: A Revisit.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Integrating Cache-Related Preemption Delay into GEDF Analysis for Multiprocessor Scheduling with On-chip Cache.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Work-in-Progress: Cache-Aware Partitioned EDF Scheduling for Multi-core Real-Time Systems.
Proceedings of the 2017 IEEE Real-Time Systems Symposium, 2017

Handling write backs in multi-level cache analysis for WCET estimation.
Proceedings of the 25th International Conference on Real-Time Networks and Systems, 2017

2016
A novel resource scheduling method of netted radars based on Markov decision process during target tracking in clutter.
EURASIP J. Adv. Signal Process., 2016

Cache-related preemption delay analysis for multi-level inclusive caches.
Proceedings of the 2016 International Conference on Embedded Software, 2016

2015
Analysis and Verification of Cyber-Physical System Software Using Static Analysis.
PhD thesis, 2015

Precise Multi-level Inclusive Cache Analysis for WCET Estimation.
Proceedings of the 2015 IEEE Real-Time Systems Symposium, 2015

Top-down and bottom-up multi-level cache analysis for WCET estimation.
Proceedings of the 21st IEEE Real-Time and Embedded Technology and Applications Symposium, 2015

Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis.
Proceedings of the 16th ACM SIGPLAN/SIGBED Conference on Languages, 2015

A novel power control method of phased array radar based on the predicted tracking Cramér-Rao Lower Bounds.
Proceedings of the IEEE International Conference on Information and Automation, 2015

2014
A co-simulation framework for design of time-triggered automotive cyber physical systems.
Simul. Model. Pract. Theory, 2014

2013
A case study on the model-based design and integration of automotive cyber-physical systems.
Proceedings of the 21st Mediterranean Conference on Control and Automation, 2013

Modeling Time-Triggered Ethernet in SystemC/TLM for Virtual Prototyping of Cyber-Physical Systems.
Proceedings of the Embedded Systems: Design, Analysis and Verification, 2013

Co-simulation framework for design of time-triggered cyber physical systems.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

2011
High confidence embedded software design: a quadrotor helicopter case study.
SIGBED Rev., 2011


  Loading...