Zihao Zhan

Orcid: 0000-0002-1467-9056

According to our database1, Zihao Zhan authored at least 16 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices.
CoRR, 2024

VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger.
Proceedings of the 33rd USENIX Security Symposium, 2024

Programmable EM Sensor Array for Golden-Model Free Run-Time Trojan Detection and Localization.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024

2023
Optimizing Cabin Wireless Network Signal Coverage with Ray Tracing Method.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

DDS-Based Information Interaction System for Ship Cloud Storage Data Center.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Research on UUV Rudder Angle Control Method Based on Sliding Mode Control.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2023

2022
A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock.
J. Hardw. Syst. Secur., 2022

Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Proceedings of the 43rd IEEE Security and Privacy, 2022

2021
Deep Grouped Non-Negative Matrix Factorization Method for Image Data Representation.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2021

Class-Based Deep Non-Negative Matrix Factorization Algorithm for Facial Image Representation.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

2020
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

BitJabber: The World's Fastest Electromagnetic Covert Channel.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

2018
Triggering Rowhammer Hardware Faults on ARM: A Revisit.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2016
Reversible image processing via reversible data hiding.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016


  Loading...