A survey on recent advances in vehicular network security, trust, and privacy Z Lu, G Qu, Z Liu IEEE Transactions on Intelligent Transportation Systems 20 (2), 760-776, 2018 | 607 | 2018 |
A privacy-preserving trust model based on blockchain for VANETs Z Lu, W Liu, Q Wang, G Qu, Z Liu Ieee Access 6, 45655-45664, 2018 | 365 | 2018 |
BARS: A blockchain-based anonymous reputation system for trust management in VANETs Z Lu, Q Wang, G Qu, Z Liu 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 286 | 2018 |
A blockchain-based privacy-preserving authentication scheme for VANETs Z Lu, Q Wang, G Qu, H Zhang, Z Liu IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019 | 194 | 2019 |
An entropy analysis based intrusion detection system for controller area network in vehicles Q Wang, Z Lu, G Qu 2018 31st IEEE International System-on-Chip Conference (SOCC), 90-95, 2018 | 67 | 2018 |
LEAP: A lightweight encryption and authentication protocol for in-vehicle communications Z Lu, Q Wang, X Chen, G Qu, Y Lyu, Z Liu 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 1158-1164, 2019 | 43 | 2019 |
PUFKEY: A high-security and high-throughput hardware true random number generator for sensor networks D Li, Z Lu, X Zou, Z Liu Sensors 15 (10), 26251-26266, 2015 | 38 | 2015 |
Fooling the eyes of autonomous vehicles: Robust physical adversarial examples against traffic sign recognition systems W Jia, Z Lu, H Zhang, Z Liu, J Wang, G Qu arXiv preprint arXiv:2201.06192, 2022 | 31 | 2022 |
A delay based plug-in-monitor for intrusion detection in controller area network Q Wang, Y Qian, Z Lu, Y Shoukry, G Qu 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 86-91, 2018 | 22 | 2018 |
Chaotic encrypted polar coding scheme for general wiretap channel Y Zhao, X Zou, Z Lu, Z Liu IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017 | 19 | 2017 |
A cyber security evaluation framework for in-vehicle electrical control units H Zhang, Y Pan, Z Lu, J Wang, Z Liu IEEE Access 9, 149690-149706, 2021 | 18 | 2021 |
Edge computing based GPS spoofing detection methods Q Wang, Z Lu, M Gao, G Qu 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 1-5, 2018 | 17 | 2018 |
Methods for estimating the convergence of inter-chip min-entropy of SRAM PUFs H Liu, W Liu, Z Lu, Q Tong, Z Liu IEEE Transactions on Circuits and Systems I: Regular Papers 65 (2), 593-605, 2017 | 17 | 2017 |
RIME: A scalable and energy-efficient processing-in-memory architecture for floating-point operations Z Lu, MT Arafin, G Qu Proceedings of the 26th Asia and South Pacific Design Automation Conference …, 2021 | 15 | 2021 |
A novel security key generation method for SRAM PUF based on Fourier analysis W Liu, Z Lu, H Liu, R Min, Z Zeng, Z Liu IEEE Access 6, 49576-49587, 2018 | 12 | 2018 |
Is it approximate computing or malicious computing? Y Wang, J Dong, Q Xu, Z Lu, G Qu Proceedings of the 2020 on Great Lakes Symposium on VLSI, 333-338, 2020 | 10 | 2020 |
Partial scan design against scan-based side channel attacks X Chen, Z Lu, G Qu, A Cui 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 9 | 2018 |
An SVM-based NAND flash endurance prediction method H Zhang, J Wang, Z Chen, Y Pan, Z Lu, Z Liu Micromachines 12 (7), 746, 2021 | 8 | 2021 |
Security challenges of processing-in-memory systems MT Arafin, Z Lu Proceedings of the 2020 on Great Lakes Symposium on VLSI, 229-234, 2020 | 6 | 2020 |
Mitigating adversarial attacks for deep neural networks by input deformation and augmentation P Qiu, Q Wang, D Wang, Y Lyu, Z Lu, G Qu 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 157-162, 2020 | 6 | 2020 |