Minhui Zou

Orcid: 0000-0001-8330-8331

According to our database1, Minhui Zou authored at least 17 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TDPP: 2-D Permutation-Based Protection of Memristive Deep Neural Networks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024

2023
TDPP: Two-Dimensional Permutation-Based Protection of Memristive Deep Neural Networks.
CoRR, 2023

2022
Improved analysis and optimal priority assignment for communicating threads on uni-processor.
J. Syst. Archit., 2022

Multiserver configuration for cloud service profit maximization in the presence of soft errors based on grouped grey wolf optimizer.
J. Syst. Archit., 2022

Review of security techniques for memristor computing systems.
CoRR, 2022

Efficient Training of the Memristive Deep Belief Net Immune to Non-Idealities of the Synaptic Devices.
Adv. Intell. Syst., 2022

Enhancing Security of Memristor Computing System Through Secure Weight Mapping.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022

2021
Improving Efficiency and Lifetime of Logic-in-Memory by Combining IMPLY and MAGIC Families.
J. Syst. Archit., 2021

EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles.
J. Syst. Archit., 2021

2020
Makespan-minimization workflow scheduling for complex networks with social groups in edge computing.
J. Syst. Archit., 2020

Security Enhancement for RRAM Computing System through Obfuscating Crossbar Row Connections.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2018
Potential Trigger Detection for Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Secure distributed framework based on seamless key session for smart home environment.
Int. J. Distributed Sens. Networks, 2018

Network Phenotyping for Network Traffic Classification and Anomaly Detection.
CoRR, 2018

PoTrojan: powerful neural-level trojan designs in deep learning models.
CoRR, 2018

2015
Towards trustable storage using SSDs with proprietary FTL.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists.
J. Comput. Sci. Technol., 2014


  Loading...