Cyber-physical systems security—A survey A Humayed, J Lin, F Li, B Luo IEEE Internet of Things Journal 4 (6), 1802-1831, 2017 | 1079 | 2017 |
Blockchain-based certificate transparency and revocation transparency Z Wang, J Lin, Q Cai, Q Wang, D Zha, J Jing IEEE Transactions on Dependable and Secure Computing 19 (1), 681-697, 2020 | 148 | 2020 |
Protecting private keys against memory disclosure attacks using hardware transactional memory L Guan, J Lin, B Luo, J Jing, J Wang 2015 IEEE Symposium on Security and Privacy, 3-19, 2015 | 127 | 2015 |
A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment M Zhang, Y Chen, J Lin IEEE Internet of Things Journal 8 (13), 10830-10842, 2021 | 108 | 2021 |
Copker: Computing with Private Keys without RAM. L Guan, J Lin, B Luo, J Jing NDSS, 23-26, 2014 | 72 | 2014 |
Certificate transparency in the wild: Exploring the reliability of monitors B Li, J Lin, F Li, Q Wang, Q Li, J Jing, C Wang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 56 | 2019 |
Entropy evaluation for oscillator-based true random number generators Y Ma, J Lin, T Chen, C Xu, Z Liu, J Jing Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 41 | 2014 |
Towards efficient Kyber on FPGAs: A processor for vector of polynomials Z Chen, Y Ma, T Chen, J Lin, J Jing 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 247-252, 2020 | 37 | 2020 |
Extracting robust keys from NAND flash physical unclonable functions S Jia, L Xia, Z Wang, J Lin, G Zhang, Y Ji Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 33 | 2015 |
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware W Li, J Shi, F Li, J Lin, W Wang, L Guan Proceedings of the 44th International Conference on Software Engineering, 1-12, 2022 | 31 | 2022 |
Entropy estimation for ADC sampling-based true random number generators Y Ma, T Chen, J Lin, J Yang, J Jing IEEE Transactions on Information Forensics and Security 14 (11), 2887-2900, 2019 | 30 | 2019 |
Offline RFID grouping proofs with trusted timestamps C Ma, J Lin, Y Wang, M Shang 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 30 | 2012 |
Using signaling games to model the multi-step attack-defense scenarios on confidentiality J Lin, P Liu, J Jing Decision and Game Theory for Security: Third International Conference …, 2012 | 30 | 2012 |
From library portability to para-rehosting: Natively executing microcontroller software on commodity hardware W Li, L Guan, J Lin, J Shi, F Li arXiv preprint arXiv:2107.12867, 2021 | 26 | 2021 |
DPF-ECC: Accelerating elliptic curve cryptography with floating-point computing power of GPUs L Gao, F Zheng, N Emmart, J Dong, J Lin, C Weems 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS …, 2020 | 26 | 2020 |
More powerful and reliable second-level statistical randomness tests for NIST SP 800-22 S Zhu, Y Ma, J Lin, J Zhuang, J Jing Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 25 | 2016 |
On the analysis and improvement of min-entropy estimation on time-varying data S Zhu, Y Ma, X Li, J Yang, J Lin, J Jing IEEE Transactions on Information Forensics and Security 15, 1696-1708, 2019 | 23 | 2019 |
Exploiting the floating-point computing power of GPUs for RSA F Zheng, W Pan, J Lin, J Jing, Y Zhao Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 23 | 2014 |
Supporting transparent snapshot for bare-metal malware analysis on mobile devices L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 22 | 2017 |
Copker: a cryptographic engine against cold-boot attacks L Guan, J Lin, Z Ma, B Luo, L Xia, J Jing IEEE Transactions on Dependable and Secure Computing 15 (5), 742-754, 2016 | 20 | 2016 |