Yu Zhuang
Texas Tech University
H-index: 22
North America-United States
Top articles of Yu Zhuang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A lightweight authentication scheme for a network of unmanned aerial vehicles (UAVs) by using physical unclonable functions | Electronics | Mohammed Saeed Alkatheiri Sajid Saleem Mohammed Ali Alqarni Ahmad O Aseeri Sajjad Hussain Chauhdary | 2022/9/15 |
Neural network modeling attacks on arbiter-PUF-based designs | IEEE Transactions on Information Forensics and Security | Nils Wisiol Bipana Thapaliya Khalid T Mursi Jean-Pierre Seifert Yu Zhuang | 2022/7/7 |
A Permutation Challenge Input Interface for Arbiter PUF Variants Against Machine Learning Attacks | Yu Zhuang Gaoxiang Li Khalid T Mursi | 2022/7/4 | |
A hybrid-optimizer-enhanced neural network method for the security vulnerability study of multiplexer arbiter PUFs | Journal of Physics: Conference Series | Khalid T Mursi Bipana Thapaliya Yu Zhuang | 2021 |
OnlineDC: Leveraging Temporal Driving Behavior to Facilitate Driver Classification | Hashim Abu-Gellban Yu Zhuang Long Nguyen Fang Jin Zhenkai Zhang | 2021/12/15 | |
Experimental examination of component-differentially-challenged XOR PUF circuits | Journal of Physics: Conference Series | Khalid T Mursi Yu Zhuang | 2021 |
Machine learning-based vulnerability study of interpose PUFs as security primitives for IoT networks | Bipana Thapaliya Khalid T Mursi Yu Zhuang | 2021/10/24 | |
A challenge obfuscating interface for arbiter puf variants against machine learning attacks | arXiv preprint arXiv:2103.12935 | Yu Zhuang Khalid T Mursi Li Gaoxiang | 2021/3/24 |
I/O characteristic discovery for storage system optimizations | Journal of Parallel and Distributed Computing | Jiang Zhou Yong Chen Dong Dai Yu Zhuang Weiping Wang | 2021/2/1 |
Neural-network-based modeling attacks on xor arbiter pufs revisited | Cryptology ePrint Archive | Nils Wisiol Bipana Thapaliya Khalid T Mursi Jean-Pierre Seifert Yu Zhuang | 2021 |
Experimental study of component-differentiallychallenged xor pufs as security primitives for internetof-things | Khalid T Mursi Yu TTU Zhuang | 2020 | |
Context-aware autonomous security assertion for industrial IoT | IEEE Access | Usman Tariq Ahmad O Aseeri Mohammed Saeed Alkatheiri Yu Zhuang | 2020/10/20 |
A fast deep learning method for security vulnerability study of XOR PUFs | Electronics | Khalid T Mursi Bipana Thapaliya Yu Zhuang Ahmad O Aseeri Mohammed Saeed Alkatheiri | 2020/10/18 |
Robo: A counselor chatbot for opioid addicted patients | Mahdi Naser Moghadasi Yu Zhuang Hashim Gellban | 2020/7/11 | |
Sent2vec: A new sentence embedding representation with sentimental semantic | Mahdi Naser Moghadasi Yu Zhuang | 2020/12/10 | |
Robustness and unpredictability for double arbiter pufs on silicon data: Performance evaluation and modeling accuracy | Electronics | Meznah A Alamro Khalid T Mursi Yu Zhuang Ahmad O Aseeri Mohammed Saeed Alkatheiri | 2020/5/24 |
Does sophisticating double arbiter puf design ensure its security? performance and security assessments on 5-1 dapuf | Meznah A Alamro Khalid T Mursi Yu Zhuang Mohammed Saeed Alkatheiri Ahmad O Aseeri | 2020/12/10 | |
Fast automatic determination of cluster numbers for high dimensional big data | Zohreh Safari Khalid T Mursi Yu Zhuang | 2020/3/9 | |
A sentimental and semantical analysis on Facebook comments to detect latent patterns | Mahdi Naser Moghadasi Zohreh Safari Yu Zhuang | 2020/12/10 |