Ziyuan Zhu

Orcid: 0009-0003-4956-8377

According to our database1, Ziyuan Zhu authored at least 55 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Stopping Set Analysis for Concatenated Polar Code Architectures.
CoRR, 2024

Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training.
Comput. Secur., 2024

Outer Code Designs for Augmented and Local-Global Polar Code Architectures.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

Cache Side-Channel Attacks Detection for AES Encryption Based on Machine Learning.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Enhancing Adversarial Robustness for Deep Metric Learning via Attention-Aware Knowledge Guidance.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Search Robust and Adaptable Architecture.
Proceedings of the IEEE International Conference on Acoustics, 2024

A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

KSM: Killer of Spectre and Meltdown Attacks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

A Module Level Security Evaluation Method Based on Model Checking.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution Environments.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
A High-Coverage and Efficient Instruction-Level Testing Approach for x86 Processors.
IEEE Trans. Computers, November, 2023

Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

MemInspect: Memory Forensics for investigating Fileless Attacks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Detecting and Mitigating Cache Side Channel Threats on Intel SGX.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Improving Adversarial Robustness via Channel and Depth Compatibility.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations.
CoRR, 2022

In-depth Testing of x86 Instruction Disassemblers with Feedback Controlled DFS Algorithm.
Proceedings of the IEEE 40th International Conference on Computer Design, 2022

Elastic Resource Allocation Based on Dynamic Perception of Operator Influence Domain in Distributed Stream Processing.
Proceedings of the Computational Science - ICCS 2022, 2022

Analysis of DRAM Vulnerability Using Computation Tree Logic.
Proceedings of the IEEE International Conference on Communications, 2022

Polar Codes with Local-Global Decoding.
Proceedings of the 56th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2022, Pacific Grove, CA, USA, October 31, 2022

2021
MaxiZone: Maximizing Influence Zone Over Geo-Textual Data.
IEEE Trans. Knowl. Data Eng., 2021

Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2021

MaxiZone: Maximizing Influence Zone over Geo-Textual Data (Extended Abstract).
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Differential Testing of x86 Instruction Decoders with Instruction Operand Inferring Algorithm.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

An Expert Interview Study of IoT Wearable Technologies for an Aging Population from Product, Data, and Society Dimensions.
Proceedings of the Human Aspects of IT for the Aged Population. Supporting Everyday Life Activities, 2021

2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

SCPORAM: a hardware support scheme for protecting memory access patterns.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Cache side-channel attacks detection based on machine learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Malware Detection Based on Term Frequency Analysis of GPRs Features.
Proceedings of the 19th IEEE International Conference on Trust, 2020

QEScalor: Quantitative Elastic Scaling Framework in Distributed Streaming Processing.
Proceedings of the Computational Science - ICCS 2020, 2020

Analyzing The Security of The Cache Side Channel Defences With Attack Graphs.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

2019
IHCS: An Integrated Hybrid Cleaning System.
Proc. VLDB Endow., 2019

Colored Petri Net Based Cache Side Channel Vulnerability Evaluation.
IEEE Access, 2019

DDM: A Demand-Based Dynamic Mitigation for SMT Transient Channels.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Spatial-Temporal Attention Network for Malware Detection Using Micro-architecture Features.
Proceedings of the International Joint Conference on Neural Networks, 2019

A Deep Malware Detection Method Based on General-Purpose Register Features.
Proceedings of the Computational Science - ICCS 2019, 2019

2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

2016
TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment.
Proceedings of the Security and Privacy in Communication Networks, 2016

An expected hypervolume improvement algorithm for architectural exploration of embedded processors.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
Sensitivity Analysis Based Predictive Modeling for MPSoC Performance and Energy Estimation.
Proceedings of the 28th International Conference on VLSI Design, 2015

A low power buffer-aided vector register file for LTE baseband signal processing.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

An accurate ACOSSO metamodeling technique for processor architecture design space exploration.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
A system-level design approach for SDR-based MPSoC in LTE baseband processing.
Proceedings of the IEEE 57th International Midwest Symposium on Circuits and Systems, 2014

System-level design methodology enabling fast development of baseband MP-SoC for 4G small cell base station.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Simplified MMSE Detectors for Turbo Receiver in BICM MIMO Systems.
J. Comput. Sci. Technol., 2013

A 100 GOPS ASP based baseband processor for wireless communication.
Proceedings of the Design, Automation and Test in Europe, 2013

2010
Idempotent H.264 intraframe compression.
Multim. Tools Appl., 2010

2009
Idempotent H.264 intraframe multi-generation coding.
Proceedings of the IEEE International Conference on Acoustics, 2009


  Loading...