Zhiqiang Lin
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Zhiqiang Lin 001 (Ohio State University, Columbus, OH, USA)
- Zhiqiang Lin 002 (Guangzhou University, Guangzhou, China)
- Zhiqiang Lin 003 (Xiamen University, China)
- Zhiqiang Lin 004 (Shenzhen University, China)
- Zhiqiang Lin 005 (Ningbo University, Ningbo, China)
- Zhiqiang Lin 006 (Chongqing University of Posts and Telecommunications, Chongqing, China)
- Zhiqiang Ling
Bibliography
2023
A 2.2um three-wafer stacked back side illuminated voltage domain global shutter CMOS image sensor.
Proceedings of the Imaging Sensors and Systems 2023, 2023
2022
Ultraverse: Efficient Retroactive Operation for Attack Recovery in Database Systems and Web Frameworks.
CoRR, 2022
2021
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things.
Secur. Commun. Networks, 2021
Biomed. Signal Process. Control., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated Binary Analysis.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 21st International Conference on Communication Technology, 2021
Proceedings of the ICCSE '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16, 2021
Proceedings of the ICCSE '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16, 2021
Proceedings of the ICCSE '21: 5th International Conference on Crowd Science and Engineering, Jinan, China, October 16, 2021
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021
2020
Entropy, 2020
An Improved Model for Effectiveness Evaluation of Missile Electromagnetic Launch System.
IEEE Access, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Improved Migration Genetic Algorithm Optimization for Variable-Speed Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press With Pressure Shock.
IEEE Access, 2019
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019
Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
An adaptive decision-making method with fuzzy Bayesian reinforcement learning for robot soccer.
Inf. Sci., 2018
Int. J. Inf. Commun. Technol., 2018
Des. Codes Cryptogr., 2018
Cryptogr. Commun., 2018
An Adaptive Strategy Selection Method With Reinforcement Learning for Robotic Soccer Games.
IEEE Access, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the Science of Cyber Security - First International Conference, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 6th International Workshop on Quantitative Approaches to Software Quality co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications.
Cryptogr. Commun., 2017
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016
Load balancing scheduling algorithm for storage system based on state acquisition and dynamic feedback.
Proceedings of the IEEE International Conference on Information and Automation, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers.
IEEE Trans. Inf. Theory, 2015
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution.
IEEE Trans. Dependable Secur. Comput., 2015
J. Univers. Comput. Sci., 2015
Int. J. Inf. Commun. Technol., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
ACM Comput. Surv., 2015
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps.
Proceedings of the 24th USENIX Security Symposium, 2015
Automatically deriving pointer reference expressions from binary code for memory dump analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Information Security Practice and Experience, 2015
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
IEEE Trans. Cloud Comput., 2014
Int. J. Grid Util. Comput., 2014
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification.
Proceedings of the Computer Security - ESORICS 2014, 2014
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
ACM Trans. Inf. Syst. Secur., 2013
EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM.
Proceedings of the 40th Annual International Symposium on Computer Architecture, 2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Manipulating semantic values in kernel data structures: Attack assessments and implications.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012
2011
IACR Cryptol. ePrint Arch., 2011
2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Advances in Neural Networks, 2009
2008
IEEE Trans. Circuits Syst. I Regul. Pap., 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
2006
Effects of charge-based computation non-idealities on CMOS image compression sensors.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005