Suivre
Li ZHANG (张立)
Li ZHANG (张立)
Huawei
Aucune adresse e-mail validée
Titre
Citée par
Citée par
Année
A scalable and extensible framework for android malware detection and family attribution
L Zhang, VLL Thing, Y Cheng
Computers & Security 80, 120-133, 2019
592019
Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing
Computers & Security 106, 102288, 2021
532021
A survey of Android exploits in the wild
H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang
Computers & Security 76, 71-91, 2018
452018
A blind dynamic fingerprinting technique for sequential circuit intellectual property protection
CH Chang, L Zhang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013
402013
A hybrid watermarking scheme for sequential functions
A Cui, CH Chang, L Zhang
2011 IEEE International Symposium of Circuits and Systems (ISCAS), 2333-2336, 2011
302011
A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs
L Zhang, CH Chang
IEEE Transactions on Information Forensics and Security 9 (11), 1893-1905, 2014
272014
Hardware IP watermarking and fingerprinting
CH Chang, M Potkonjak, L Zhang
Secure System Design and Trustable Computing, 329-368, 2016
232016
State encoding watermarking for field authentication of sequential circuit intellectual property
L Zhang, CH Chang
2012 IEEE International Symposium on Circuits and Systems (ISCAS), 3013-3016, 2012
232012
A hybrid symbolic execution assisted fuzzing method
L Zhang, VLL Thing
TENCON 2017-2017 IEEE Region 10 Conference, 822-825, 2017
182017
Hardware Trojan detection with linear regression based gate-level characterization
L Zhang, CH Chang
2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 256-259, 2014
102014
Public key protocol for usage-based licensing of FPGA IP cores
L Zhang, CH Chang
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 25-28, 2015
82015
Progressive control flow obfuscation for android applications
L Zhang, H Meng, VLL Thing
TENCON 2018-2018 IEEE Region 10 Conference, 1075-1079, 2018
72018
A modular design of elliptic-curve point multiplication for resource constrained devices
W Wei, L Zhang, CH Chang
2014 International Symposium on Integrated Circuits (ISIC), 596-599, 2014
42014
Assisting vulnerability detection by prioritizing crashes with incremental learning
L Zhang, VLL Thing
TENCON 2018-2018 IEEE Region 10 Conference, 2080-2085, 2018
32018
Secure Licensing of IP Cores on SRAM-Based FPGAs
L Zhang, CH Chang
Secure System Design and Trustable Computing, 391-418, 2016
22016
Integrity protection and authentication of integrated circuit intellectual property cores
L Zhang
2015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–16