Showing 1 - 20 results of 34 for search 'ZHENG Yue', query time: 0.04s
Refine Results
-
1
A PUF-based data-device hash for tampered image detection and source camera identification by Zheng, Yue, Cao, Yuan, Chang, Chip-Hong
Published 2020
Journal Article -
2
UDhashing : physical unclonable function-based user-device hash for endpoint authentication by Zheng, Yue, Cao, Yuan, Chang, Chip-Hong
Published 2021
Journal Article -
3
A DNN fingerprint for non-repudiable model ownership identification and piracy detection by Zheng, Yue, Wang, Si, Chang, Chip Hong
Published 2022
Journal Article -
4
A lightweight PUF-based secure group key agreement protocol for wireless sensor networks by Zheng, Yue, Liu, Wenye, Chang, Chip Hong
Published 2024
Conference Paper -
5
Facial biohashing based user-device physical unclonable function for bring your own device security by Zheng, Yue, Cao, Yuan, Chang, Chip Hong
Published 2018
Get full text
Conference Paper -
6
-
7
A Study on Visual Innovation of Macau Souvenirs Packaging in the Context of Multicultural Communication by Zheng Yue, Li Xianlu, Zhang Caiyu, Wang Xuan
Published 2023-01-01
Article -
8
Securing IoT monitoring device using PUF and physical layer authentication by Zheng, Yue, Dhabu, Sumedh Somnath, Chang, Chip Hong
Published 2018
Get full text
Conference Paper -
9
An in-pixel gain amplifier based event-driven physical unclonable function for CMOS dynamic vision sensors by Wang, Biyin, Zhao, Xiaojin, Zheng, Yue, Chang, Chip-Hong
Published 2020
Conference Paper -
10
A new PUF based lock and key solution for secure in-field testing of cryptographic chips by Cui, Aijiao, Chang, Chip-Hong, Zhou, Wei, Zheng, Yue
Published 2021
Journal Article -
11
A buyer-traceable DNN model IP protection method against piracy and misappropriation by Wang, Si, Xu, Chaohui, Zheng, Yue, Chang, Chip Hong
Published 2022
Conference Paper -
12
PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications by Zheng, Yue, Liu, Wenye, Gu, Chongyan, Chang, Chip Hong
Published 2022
Journal Article -
13
-
14
Inconspicuous data augmentation based backdoor attack on deep neural networks by Xu, Chaohui, Liu, Wenyu, Zheng, Yue, Wang, Si, Chang, Chip Hong
Published 2023
Conference Paper -
15
An imperceptible data augmentation based blackbox clean-label backdoor attack on deep neural networks by Xu, Chaohui, Liu, Wenye, Zheng, Yue, Wang, Si, Chang, Chip Hong
Published 2024
Journal Article -
16
Influence of diabetes mellitus on the biochemical parameters and outcomes of multiple myeloma by Zheng-Yue Dou, Bing Xia, Chao-Yu Wang, Yan-Jie Xu, Yi-Zhuo Zhang
Published 2023-12-01
Article -
17
-
18
Metabolomic profiles of myocardial ischemia under treatment with salvianolic acid B by Lu Yonghai, Zheng Yue, Liu Xinru, Liang Xu, Ngai Saiming, Li Tiejun, Zhang Weidong
Published 2012-03-01
Article -
19
-
20