[go: up one dir, main page]

Follow
Ning Zhang
Title
Cited by
Cited by
Year
A survey of distributed consensus protocols for blockchain networks
Y Xiao, N Zhang, W Lou, YT Hou
IEEE communications surveys & tutorials 22 (2), 1432-1465, 2020
12622020
Truspy: Cache Side-channel Information Leakage from the Secure World on ARM Devices
N Zhang, K Sun, D Shands, W Lou, YT Hou
Cryptology ePrint Archive, 2016
230*2016
Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided waves
Q Yan, K Liu, Q Zhou, H Guo, N Zhang
Network and Distributed Systems Security (NDSS) Symposium, 2020
1632020
Don't listen to me: Understanding and exploring jailbreak prompts of large language models
Z Yu, X Liu, S Liang, Z Cameron, C Xiao, N Zhang
33rd USENIX Security Symposium (USENIX Security 24), 4675-4692, 2024
1602024
Automatic and universal prompt injection attacks against large language models
X Liu, Z Yu, Y Zhang, N Zhang, C Xiao
arXiv preprint arXiv:2403.04957, 2024
1552024
Privacyguard: Enforcing private data usage control with blockchain and attested off-chain contract execution
Y Xiao, N Zhang, J Li, W Lou, YT Hou
European Symposium on Research in Computer Security, 610-629, 2020
136*2020
Case: Cache-assisted Secure Execution on ARM Devices
N Zhang, K Sun, W Lou, YT Hou
Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016
135*2016
Improving Robustness of {ML} Classifiers against Realizable Evasion Attacks Using Conserved Features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
28th {USENIX} Security Symposium ({USENIX} Security 19), 285-302, 2019
1262019
A new era in llm security: Exploring security concerns in real-world llm-based systems
F Wu, N Zhang, S Jha, P McDaniel, C Xiao
arXiv preprint arXiv:2402.18649, 2024
1112024
Efficient signature generation for classifying cross-architecture IoT malware
M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
1092018
Distributed consensus protocols and algorithms
Y Xiao, N Zhang, J Li, W Lou, YT Hou
Blockchain for Distributed Systems Security 25, 40, 2019
1062019
Distributed data mining with differential privacy
N Zhang, M Li, W Lou
2011 IEEE international conference on Communications (ICC), 1-5, 2011
1012011
Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone
J Wang, A Li, H Li, C Lu, N Zhang
2022 IEEE symposium on security and privacy (SP), 352-369, 2022
842022
Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in IoT
Y Chen, W Sun, N Zhang, Q Zheng, W Lou, YT Hou
IEEE Transactions on Information Forensics and Security 14 (7), 1830-1842, 2018
782018
Riatig: Reliable and imperceptible adversarial text-to-image generation with natural prompts
H Liu, Y Wu, S Zhai, B Yuan, N Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
762023
Modeling the impact of network connectivity on consensus security of proof-of-work blockchain
Y Xiao, N Zhang, W Lou, YT Hou
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1648-1657, 2020
692020
Antifake: Using adversarial audio to prevent unauthorized speech synthesis
Z Yu, S Zhai, N Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
652023
Security and privacy in the emerging cyber-physical world: A survey
Z Yu, Z Kaplan, Q Yan, N Zhang
IEEE Communications Surveys & Tutorials 23 (3), 1879-1919, 2021
652021
Slowlidar: Increasing the latency of lidar-based detection using adversarial examples
H Liu, Y Wu, Z Yu, Y Vorobeychik, N Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
632023
CacheKit: Evading memory introspection using cache incoherence
N Zhang, H Sun, K Sun, W Lou, YT Hou
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 337-352, 2016
622016
The system can't perform the operation now. Try again later.
Articles 1–20