Jie Zhang

Affiliations:
  • Chinese University of Hong Kong, Department of Computer Science and Engineering, CUhk REliable Computing Laboratory, Hong Kong (PhD 2014)


According to our database1, Jie Zhang authored at least 18 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
G-Tran: A High Performance Distributed Graph Database with a Decentralized Architecture.
Proc. VLDB Endow., 2022

2021
G-Tran: Making Distributed Graph Transactions Fast.
CoRR, 2021

2020
Understanding Graph Neural Networks from Graph Signal Denoising Perspectives.
CoRR, 2020

Measuring and Improving the Use of Graph Information in Graph Neural Networks.
Proceedings of the 8th International Conference on Learning Representations, 2020

2019
Grasper: A High Performance Distributed System for OLAP on Property Graphs.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

2018
A General and Efficient Querying Method for Learning to Hash.
Proceedings of the 2018 International Conference on Management of Data, 2018

2015
VeriTrust: Verification for Hardware Trust.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

FASTrust: Feature analysis for third-party IP trust verification.
Proceedings of the 2015 IEEE International Test Conference, 2015

BoardPUF: Physical Unclonable Functions for Printed Circuit Board Authentication.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015

On the premises and prospects of timing speculation.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

DERA: yet another differential fault attack on cryptographic devices based on error rate analysis.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Vulnerability analysis for crypto devices against probing attack.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
On trojan side channel design and identification.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2014

DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ForTER: a forward error correction scheme for timing error resilience.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013

On hardware Trojan design and implementation at register-transfer level.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

VeriTrust: verification for hardware trust.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
HTOutlier: Hardware Trojan detection with side-channel signature outlier identification.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012


  Loading...