Volgen
Jingqiang Lin
Jingqiang Lin
Geverifieerd e-mailadres voor ustc.edu.cn
Titel
Geciteerd door
Geciteerd door
Jaar
Cyber-physical systems security—A survey
A Humayed, J Lin, F Li, B Luo
IEEE Internet of Things Journal 4 (6), 1802-1831, 2017
10482017
Blockchain-based certificate transparency and revocation transparency
Z Wang, J Lin, Q Cai, Q Wang, D Zha, J Jing
IEEE Transactions on Dependable and Secure Computing 19 (1), 681-697, 2020
1472020
Protecting private keys against memory disclosure attacks using hardware transactional memory
L Guan, J Lin, B Luo, J Jing, J Wang
2015 IEEE Symposium on Security and Privacy, 3-19, 2015
1272015
A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment
M Zhang, Y Chen, J Lin
IEEE Internet of Things Journal 8 (13), 10830-10842, 2021
1052021
Copker: Computing with Private Keys without RAM.
L Guan, J Lin, B Luo, J Jing
NDSS, 23-26, 2014
712014
Certificate transparency in the wild: Exploring the reliability of monitors
B Li, J Lin, F Li, Q Wang, Q Li, J Jing, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
552019
Entropy evaluation for oscillator-based true random number generators
Y Ma, J Lin, T Chen, C Xu, Z Liu, J Jing
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
412014
Towards efficient Kyber on FPGAs: A processor for vector of polynomials
Z Chen, Y Ma, T Chen, J Lin, J Jing
2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 247-252, 2020
362020
Extracting robust keys from NAND flash physical unclonable functions
S Jia, L Xia, Z Wang, J Lin, G Zhang, Y Ji
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
332015
Offline RFID grouping proofs with trusted timestamps
C Ma, J Lin, Y Wang, M Shang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
302012
Using signaling games to model the multi-step attack-defense scenarios on confidentiality
J Lin, P Liu, J Jing
Decision and Game Theory for Security: Third International Conference …, 2012
302012
Entropy estimation for ADC sampling-based true random number generators
Y Ma, T Chen, J Lin, J Yang, J Jing
IEEE Transactions on Information Forensics and Security 14 (11), 2887-2900, 2019
292019
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware
W Li, J Shi, F Li, J Lin, W Wang, L Guan
Proceedings of the 44th International Conference on Software Engineering, 1-12, 2022
282022
More powerful and reliable second-level statistical randomness tests for NIST SP 800-22
S Zhu, Y Ma, J Lin, J Zhuang, J Jing
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
252016
DPF-ECC: Accelerating elliptic curve cryptography with floating-point computing power of GPUs
L Gao, F Zheng, N Emmart, J Dong, J Lin, C Weems
2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS …, 2020
232020
On the analysis and improvement of min-entropy estimation on time-varying data
S Zhu, Y Ma, X Li, J Yang, J Lin, J Jing
IEEE Transactions on Information Forensics and Security 15, 1696-1708, 2019
232019
Exploiting the floating-point computing power of GPUs for RSA
F Zheng, W Pan, J Lin, J Jing, Y Zhao
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
232014
From library portability to para-rehosting: Natively executing microcontroller software on commodity hardware
W Li, L Guan, J Lin, J Shi, F Li
arXiv preprint arXiv:2107.12867, 2021
222021
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
222017
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang
arXiv preprint arXiv:1706.05779, 2017
192017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20