Zhaojun Lu

Orcid: 0000-0002-5467-6597

According to our database1, Zhaojun Lu authored at least 28 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An RRAM-Based Computing-in-Memory Architecture and Its Application in Accelerating Transformer Inference.
IEEE Trans. Very Large Scale Integr. Syst., March, 2024

2023
ADLPT: Improving 3D NAND Flash Memory Reliability by Adaptive Lifetime Prediction Techniques.
IEEE Trans. Computers, June, 2023

LightWarner: Predicting Failure of 3D NAND Flash Memory Using Reinforcement Learning.
IEEE Trans. Computers, March, 2023

An FPGA-Compatible TRNG with Ultra-High Throughput and Energy Efficiency.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

A Survey on Fault-Tolerance Methods for SRAM-Based FPGAs in Radiation Environments.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
A Cyber Security Evaluation Framework for In-Vehicle Electrical Control Units.
IEEE Access, 2021

RIME: A Scalable and Energy-Efficient Processing-In-Memory Architecture for Floating-Point Operations.
Proceedings of the ASPDAC '21: 26th Asia and South Pacific Design Automation Conference, 2021

2020
Research on Accurate Location of Line Loss Anomaly in Substation Area Based on Data Driven.
Proceedings of the Big Data and Security - Second International Conference, 2020

Is It Approximate Computing or Malicious Computing?
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

Security Challenges of Processing-In-Memory Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

2019
A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs.
IEEE Trans. Very Large Scale Integr. Syst., 2019

A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy.
IEEE Trans. Intell. Transp. Syst., 2019

Pass and Run: A Privacy Preserving Delay Tolerant Network Communication Protocol for CyberVehicles.
IEEE Des. Test, 2019

LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

2018
Methods for Estimating the Convergence of Inter-Chip Min-Entropy of SRAM PUFs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2018

A Privacy-Preserving Trust Model Based on Blockchain for VANETs.
IEEE Access, 2018

A Novel Security Key Generation Method for SRAM PUF Based on Fourier Analysis.
IEEE Access, 2018

BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Partial Scan Design Against Scan-Based Side Channel Attacks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Entropy Analysis Based Intrusion Detection System for Controller Area Network in Vehicles.
Proceedings of the 31st IEEE International System-on-Chip Conference, 2018

Edge Computing based GPS Spoofing Detection Methods.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Chaotic Encrypted Polar Coding Scheme for General Wiretap Channel.
IEEE Trans. Very Large Scale Integr. Syst., 2017

An Anti-Electromagnetic Attack PUF Based on a Configurable Ring Oscillator for Wireless Sensor Networks.
Sensors, 2017

2015
PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks.
Sensors, 2015

Efficient Off-Chip Memory Protection Mechanism for Embedded Computing Systems Using AES-GCM.
Proceedings of the 14th International Conference on Computer-Aided Design and Computer Graphics, 2015


  Loading...