Three decades of deception techniques in active cyber defense-retrospect and outlook L Zhang, VLL Thing Computers & Security 106, 102288, 2021 | 73 | 2021 |
A scalable and extensible framework for android malware detection and family attribution L Zhang, VLL Thing, Y Cheng Computers & Security 80, 120-133, 2019 | 65 | 2019 |
A survey of Android exploits in the wild H Meng, VLL Thing, Y Cheng, Z Dai, L Zhang Computers & Security 76, 71-91, 2018 | 53 | 2018 |
A blind dynamic fingerprinting technique for sequential circuit intellectual property protection CH Chang, L Zhang IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2013 | 42 | 2013 |
A hybrid watermarking scheme for sequential functions A Cui, CH Chang, L Zhang 2011 IEEE International Symposium of Circuits and Systems (ISCAS), 2333-2336, 2011 | 32 | 2011 |
A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs L Zhang, CH Chang IEEE Transactions on Information Forensics and Security 9 (11), 1893-1905, 2014 | 27 | 2014 |
Hardware IP watermarking and fingerprinting CH Chang, M Potkonjak, L Zhang Secure System Design and Trustable Computing, 329-368, 2016 | 25 | 2016 |
State encoding watermarking for field authentication of sequential circuit intellectual property L Zhang, CH Chang 2012 IEEE International Symposium on Circuits and Systems (ISCAS), 3013-3016, 2012 | 23 | 2012 |
A hybrid symbolic execution assisted fuzzing method L Zhang, VLL Thing TENCON 2017-2017 IEEE Region 10 Conference, 822-825, 2017 | 21 | 2017 |
Hardware Trojan detection with linear regression based gate-level characterization L Zhang, CH Chang 2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 256-259, 2014 | 10 | 2014 |
Public key protocol for usage-based licensing of FPGA IP cores L Zhang, CH Chang 2015 IEEE International Symposium on Circuits and Systems (ISCAS), 25-28, 2015 | 9 | 2015 |
Progressive control flow obfuscation for android applications L Zhang, H Meng, VLL Thing TENCON 2018-2018 IEEE Region 10 Conference, 1075-1079, 2018 | 7 | 2018 |
Assisting vulnerability detection by prioritizing crashes with incremental learning L Zhang, VLL Thing TENCON 2018-2018 IEEE Region 10 Conference, 2080-2085, 2018 | 5 | 2018 |
A modular design of elliptic-curve point multiplication for resource constrained devices W Wei, L Zhang, CH Chang 2014 International Symposium on Integrated Circuits (ISIC), 596-599, 2014 | 4 | 2014 |
Secure Licensing of IP Cores on SRAM-Based FPGAs L Zhang, CH Chang Secure System Design and Trustable Computing, 391-418, 2016 | 2 | 2016 |
Integrity protection and authentication of integrated circuit intellectual property cores L Zhang | | 2015 |