Jingqiang Lin
Jingqiang Lin
Verified email at
Cited by
Cited by
Cyber-physical systems security—A survey
A Humayed, J Lin, F Li, B Luo
IEEE Internet of Things Journal 4 (6), 1802-1831, 2017
Blockchain-based certificate transparency and revocation transparency
Z Wang, J Lin, Q Cai, Q Wang, D Zha, J Jing
IEEE Transactions on Dependable and Secure Computing 19 (1), 681-697, 2020
Protecting private keys against memory disclosure attacks using hardware transactional memory
L Guan, J Lin, B Luo, J Jing, J Wang
2015 IEEE Symposium on Security and Privacy, 3-19, 2015
A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment
M Zhang, Y Chen, J Lin
IEEE Internet of Things Journal 8 (13), 10830-10842, 2021
Copker: Computing with Private Keys without RAM.
L Guan, J Lin, B Luo, J Jing
NDSS, 23-26, 2014
Certificate transparency in the wild: Exploring the reliability of monitors
B Li, J Lin, F Li, Q Wang, Q Li, J Jing, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Entropy evaluation for oscillator-based true random number generators
Y Ma, J Lin, T Chen, C Xu, Z Liu, J Jing
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
Towards efficient Kyber on FPGAs: A processor for vector of polynomials
Z Chen, Y Ma, T Chen, J Lin, J Jing
2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 247-252, 2020
Extracting robust keys from NAND flash physical unclonable functions
S Jia, L Xia, Z Wang, J Lin, G Zhang, Y Ji
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
Offline RFID grouping proofs with trusted timestamps
C Ma, J Lin, Y Wang, M Shang
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
Using signaling games to model the multi-step attack-defense scenarios on confidentiality
J Lin, P Liu, J Jing
Decision and Game Theory for Security: Third International Conference …, 2012
Entropy estimation for ADC sampling-based true random number generators
Y Ma, T Chen, J Lin, J Yang, J Jing
IEEE Transactions on Information Forensics and Security 14 (11), 2887-2900, 2019
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware
W Li, J Shi, F Li, J Lin, W Wang, L Guan
Proceedings of the 44th International Conference on Software Engineering, 1-12, 2022
On the analysis and improvement of min-entropy estimation on time-varying data
S Zhu, Y Ma, X Li, J Yang, J Lin, J Jing
IEEE Transactions on Information Forensics and Security 15, 1696-1708, 2019
More powerful and reliable second-level statistical randomness tests for NIST SP 800-22
S Zhu, Y Ma, J Lin, J Zhuang, J Jing
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
Exploiting the floating-point computing power of GPUs for RSA
F Zheng, W Pan, J Lin, J Jing, Y Zhao
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
DPF-ECC: accelerating elliptic curve cryptography with floating-point computing power of gpus
L Gao, F Zheng, N Emmart, J Dong, J Lin, C Weems
2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS …, 2020
Hardware performance optimization and evaluation of SM3 hash algorithm on FPGA
Y Ma, L Xia, J Lin, J Jing, Z Liu, X Yu
Information and Communications Security: 14th International Conference …, 2012
Efficient secret sharing schemes
C Lv, X Jia, J Lin, J Jing, L Tian, M Sun
Secure and Trust Computing, Data Management and Applications: 8th FIRA …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20