BibTeX records: Zhongkai Tong

download as .bib file

@inproceedings{DBLP:conf/cscwd/TongZZLM24,
  author       = {Zhongkai Tong and
                  Ziyuan Zhu and
                  Yusha Zhang and
                  Yuxin Liu and
                  Dan Meng},
  editor       = {Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Tie Qiu and
                  Xiaobo Zhou and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng and
                  Tianyi Xu and
                  Ning Chen},
  title        = {{KSM:} Killer of Spectre and Meltdown Attacks},
  booktitle    = {27th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024},
  pages        = {157--162},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CSCWD61410.2024.10580256},
  doi          = {10.1109/CSCWD61410.2024.10580256},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/TongZZLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/ZhangZLTCM24,
  author       = {Yusha Zhang and
                  Ziyuan Zhu and
                  Yuxin Liu and
                  Zhongkai Tong and
                  Wenjing Cai and
                  Dan Meng},
  editor       = {Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Tie Qiu and
                  Xiaobo Zhou and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng and
                  Tianyi Xu and
                  Ning Chen},
  title        = {A Formal Verification Methodology for Cache Architectures Based on
                  Noninterference Hyperproperties},
  booktitle    = {27th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024},
  pages        = {772--777},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CSCWD61410.2024.10580574},
  doi          = {10.1109/CSCWD61410.2024.10580574},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/ZhangZLTCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/LiuZZTCM24,
  author       = {Yuxin Liu and
                  Ziyuan Zhu and
                  Yusha Zhang and
                  Zhongkai Tong and
                  Wenjing Cai and
                  Dan Meng},
  editor       = {Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Tie Qiu and
                  Xiaobo Zhou and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng and
                  Tianyi Xu and
                  Ning Chen},
  title        = {A Module Level Security Evaluation Method Based on Model Checking},
  booktitle    = {27th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024},
  pages        = {1165--1170},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CSCWD61410.2024.10580174},
  doi          = {10.1109/CSCWD61410.2024.10580174},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/LiuZZTCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/TongZSLM24,
  author       = {Zhongkai Tong and
                  Ziyuan Zhu and
                  Zhangyu Sha and
                  Yuxin Liu and
                  Dan Meng},
  editor       = {De{-}Shuang Huang and
                  Xiankun Zhang and
                  Qinhu Zhang},
  title        = {Cache Side-Channel Attacks Detection for {AES} Encryption Based on
                  Machine Learning},
  booktitle    = {Advanced Intelligent Computing Technology and Applications - 20th
                  International Conference, {ICIC} 2024, Tianjin, China, August 5-8,
                  2024, Proceedings, Part {I} {(LNAI)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14875},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-5663-6\_6},
  doi          = {10.1007/978-981-97-5663-6\_6},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/TongZSLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LiuZZTCM24,
  author       = {Yuxin Liu and
                  Ziyuan Zhu and
                  Yusha Zhang and
                  Zhongkai Tong and
                  Wenjing Cai and
                  Dan Meng},
  title        = {Analyzing Cache Timing-based Side Channel Vulnerability through Cache
                  Line Composition},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2024, Washington,
                  DC, USA, October 28 - Nov. 1, 2024},
  pages        = {517--522},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/MILCOM61039.2024.10773698},
  doi          = {10.1109/MILCOM61039.2024.10773698},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/LiuZZTCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuZZTCM22,
  author       = {Yuxin Liu and
                  Ziyuan Zhu and
                  Yusha Zhang and
                  Zhongkai Tong and
                  Wenjing Cai and
                  Dan Meng},
  title        = {Analysis of {DRAM} Vulnerability Using Computation Tree Logic},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul,
                  Korea, May 16-20, 2022},
  pages        = {986--991},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICC45855.2022.9839097},
  doi          = {10.1109/ICC45855.2022.9839097},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiuZZTCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-14062,
  author       = {Zhongkai Tong and
                  Ziyuan Zhu and
                  Yusha Zhang and
                  Yuxin Liu and
                  Dan Meng},
  title        = {Attack detection based on machine learning algorithms for different
                  variants of Spectre attacks and different Meltdown attack implementations},
  journal      = {CoRR},
  volume       = {abs/2208.14062},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.14062},
  doi          = {10.48550/ARXIV.2208.14062},
  eprinttype    = {arXiv},
  eprint       = {2208.14062},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-14062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/WangZTYFSM21,
  author       = {Huozhu Wang and
                  Ziyuan Zhu and
                  Zhongkai Tong and
                  Xiang Yin and
                  Yusi Feng and
                  Gang Shi and
                  Dan Meng},
  title        = {An Effective Approach for Malware Detection and Explanation via Deep
                  Learning Analysis},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9534115},
  doi          = {10.1109/IJCNN52387.2021.9534115},
  timestamp    = {Thu, 24 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/WangZTYFSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TongZWWZL20,
  author       = {Zhongkai Tong and
                  Ziyuan Zhu and
                  Zhanpeng Wang and
                  Limin Wang and
                  Yusha Zhang and
                  Yuxin Liu},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Cache side-channel attacks detection based on machine learning},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {919--926},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00123},
  doi          = {10.1109/TRUSTCOM50675.2020.00123},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TongZWWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZWTY20,
  author       = {Zhanpeng Wang and
                  Ziyuan Zhu and
                  Limin Wang and
                  Zhongkai Tong and
                  Chao Yan},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {{SCPORAM:} a hardware support scheme for protecting memory access
                  patterns},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {983--990},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00131},
  doi          = {10.1109/TRUSTCOM50675.2020.00131},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZWTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cinc/HeCFYWJTBLP19,
  author       = {Zhengling He and
                  Xianxiang Chen and
                  Zhen Fang and
                  Weidong Yi and
                  Chenshuo Wang and
                  Li Jiang and
                  Zhongkai Tong and
                  Zhongrui Bai and
                  Yueqi Li and
                  Yichen Pan},
  title        = {Early Sepsis Prediction Using Ensemble Learning with Features Extracted
                  from {LSTM} Recurrent Neural Network},
  booktitle    = {46th Computing in Cardiology, CinC 2019, Singapore, September 8-11,
                  2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.22489/CinC.2019.269},
  doi          = {10.22489/CINC.2019.269},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cinc/HeCFYWJTBLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TongCHTFW18,
  author       = {Zhongkai Tong and
                  Xianxiang Chen and
                  Zhengling He and
                  Kai Tong and
                  Zhen Fang and
                  Xianlong Wang},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Md. Kamrul Hasan},
  title        = {Emotion Recognition Based on Photoplethysmogram and Electroencephalogram},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {402--407},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10266},
  doi          = {10.1109/COMPSAC.2018.10266},
  timestamp    = {Mon, 19 Aug 2024 08:42:01 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/TongCHTFW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}