关注
Zhaojun Lu
Zhaojun Lu
School of Cyber Science and Engineering, Huzhong University of Science and Technology, Wuhan, China
在 hust.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on recent advances in vehicular network security, trust, and privacy
Z Lu, G Qu, Z Liu
IEEE Transactions on Intelligent Transportation Systems 20 (2), 760-776, 2018
4642018
A privacy-preserving trust model based on blockchain for VANETs
Z Lu, W Liu, Q Wang, G Qu, Z Liu
Ieee Access 6, 45655-45664, 2018
3062018
BARS: A blockchain-based anonymous reputation system for trust management in VANETs
Z Lu, Q Wang, G Qu, Z Liu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
2292018
A blockchain-based privacy-preserving authentication scheme for VANETs
Z Lu, Q Wang, G Qu, H Zhang, Z Liu
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
1362019
An entropy analysis based intrusion detection system for controller area network in vehicles
Q Wang, Z Lu, G Qu
2018 31st IEEE International System-on-Chip Conference (SOCC), 90-95, 2018
482018
PUFKEY: A high-security and high-throughput hardware true random number generator for sensor networks
D Li, Z Lu, X Zou, Z Liu
Sensors 15 (10), 26251-26266, 2015
332015
LEAP: A lightweight encryption and authentication protocol for in-vehicle communications
Z Lu, Q Wang, X Chen, G Qu, Y Lyu, Z Liu
2019 IEEE Intelligent Transportation Systems Conference (ITSC), 1158-1164, 2019
312019
Chaotic encrypted polar coding scheme for general wiretap channel
Y Zhao, X Zou, Z Lu, Z Liu
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (12 …, 2017
172017
Edge computing based GPS spoofing detection methods
Q Wang, Z Lu, M Gao, G Qu
2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 1-5, 2018
152018
A delay based plug-in-monitor for intrusion detection in controller area network
Q Wang, Y Qian, Z Lu, Y Shoukry, G Qu
2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 86-91, 2018
122018
RIME: A scalable and energy-efficient processing-in-memory architecture for floating-point operations
Z Lu, MT Arafin, G Qu
Proceedings of the 26th Asia and South Pacific Design Automation Conference …, 2021
102021
A novel security key generation method for SRAM PUF based on Fourier analysis
W Liu, Z Lu, H Liu, R Min, Z Zeng, Z Liu
IEEE Access 6, 49576-49587, 2018
92018
Methods for estimating the convergence of inter-chip min-entropy of SRAM PUFs
H Liu, W Liu, Z Lu, Q Tong, Z Liu
IEEE Transactions on Circuits and Systems I: Regular Papers 65 (2), 593-605, 2017
92017
A Cyber Security Evaluation Framework for In-Vehicle Electrical Control Units
H Zhang, Y Pan, Z Lu, J Wang, Z Liu
IEEE Access 9, 149690-149706, 2021
62021
Is it approximate computing or malicious computing?
Y Wang, J Dong, Q Xu, Z Lu, G Qu
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 333-338, 2020
62020
An anti-electromagnetic attack PUF based on a configurable ring oscillator for wireless sensor networks
Z Lu, D Li, H Liu, M Gong, Z Liu
Sensors 17 (9), 2118, 2017
62017
An SVM-based NAND flash endurance prediction method
H Zhang, J Wang, Z Chen, Y Pan, Z Lu, Z Liu
Micromachines 12 (7), 746, 2021
52021
Partial scan design against scan-based side channel attacks
X Chen, Z Lu, G Qu, A Cui
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
52018
Security challenges of processing-in-memory systems
MT Arafin, Z Lu
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 229-234, 2020
42020
Mitigating adversarial attacks for deep neural networks by input deformation and augmentation
P Qiu, Q Wang, D Wang, Y Lyu, Z Lu, G Qu
2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 157-162, 2020
42020
系统目前无法执行此操作,请稍后再试。
文章 1–20