近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
SCI期刊论文
F.Zhang,B.Yang,X.Dong,S.Guilley,Z.Liu*,W.He,F.G.Zhang,K.Ren,'Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE,'IEEE Transactions on Computers,accepted(CCF-A).
C.Ou,S.Lam,C.Zhou,G.Jiang,F.Zhang*,'A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks,'IEEE Transactions on Computers,accepted(CCF-A).
F.Zhang,X.Dong,B.Yang,Y.Zhou*,K.Ren,'A Systematic Evaluation of Wavelet-based Attack Framework on Random Delay Countermeasures,'IEEE Transactions on Information Forensics&Security,Vol.15,pp.1407-1422,2020.(CCF-A).
F.Zhang*,G Xu,B.Yang,Z.Liang,K.Ren,'Theoretical Analysis of Persistent Fault Attack,'SCIENCE CHINA Information Sciences,2020,63(3):139102.
F.Zhang,Y.Zhang,H.Jiang,X.Zhu,F.Lin*,K.Ren,'Precise Methods for Distinguishing S-box Faults in Laser Injection Attacks,'IET Electronics Letters,Vol.55,No.25,pp.1333-1335,December 2019.(ZJUTOP).
Z.Liu,Y.Cao*,X.Zhang,C.Zhu,F.Zhang,'Managing recurrent virtual network updates in multi-tenant datacenters:A system perspective,'IEEE Transactions on Parellel and Distributed Systems,Vol.30,No.8,pp.1816-1825,August 2019.(CCF-A).
J.T.Ning,J.Xu*,K.T.Liang,F.Zhang,E.-C.Chang,'Passive Attacks Against Searchable Encryption,'IEEE Transactions on Information Forensics&Security,Vol.13,No.3,pp.789-802,March 2019.(CCF-A).
L.Dong,H.Zhang*,L.Zhu,S.Sun,H.Gan,F.Zhang*,'Analysis of an Optimal Fault Attack on an LED Lightweight Cryptosystem,'IEEE Access,Vol.7,pp.31656-31662,2019.
F.Zhang*,Z.Liang,B.Yang,X.Zhao,S.Guo,K.Ren,'Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition,'Frontiers of Information Technology&Electronic Engineering.,Vol.19,No.12,pp.1475-1499,2018.
C.Xu,J.Shen*,X.Du,F.Zhang,'An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units,'IEEE Access,Vol.6,pp.48697-48707,2018.
Y.K.Tang*,S.Q.Li,F.Zhang,L.Fang,'Thermal maps based HT detection using spatial projection transformation,'IET Information Security,Vol.12,Issue.4,pp.356–361,2018.
P.Zhou,T.Wang,X.Lou,X.Zhao,F.Zhang*,S.Guo,'Efficient flush-reload cache attack on scalar multiplication based signature algorithm,'SCIENCE CHINA Information Sciences,2018,61:039102.
X.Zhao,F.Zhang*,S.Guo,Z.Gong,'Optimal Model Search for Hardware-Trojan-based Bit-level Fault Attacks on Block Ciphers,'SCIENCE CHINA Information Sciences,2018,61(3):039106.
J.Shen*,L.Geng,F.Zhang,'Dynamic current logic based flip-flop design for robust and low power security ICs,'Electronics Letters,Vol.53,No.18,pp.1236-1238,2017.(ZJU TOP)
H.Chen,T.Wang,F.Zhang*,X.Zhao,W.He,L.Xu,Y.Ma,'Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher,'Security and Communication Networks.,Vol.2017,ArticleID 8051728,2017.
F.Zhang,X.Zhao,W.He*,S.Bhasin,S.Guo,'Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers,'SCIENCE CHINA Information Sciences,2017,60:048102.
H.Gan,H.Zhang*,M.Khan,X.Wang,F.Zhang,P.He,'An improved empirical mode decomposition for power analysis attack,'China Communications,Vol.14,No.9,pp.94-99,2017.
M.Khan,H.Zhang*,F.Zhang,S.Shahzad,R.Ullah,S.Ali,Q.Arain,M.Ahmed,'X-Band Power Amplifier for Next Generation Networks based on MESFET,'China Communications,Vol.14,No.4,pp.11-19,2017.
H.Chen,T.Wang,S.Guo,X.Zhao,F.Zhang*,J.Liu,'Improved Differential Fault analysis of SOSEMANUK with Algebraic Techniques,'IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences.,Vol.E100-A,No.3,pp.811-821,2017.
F.Zhang*,S.Guo,X.Zhao,T.Wang,J.Yang,F.-X.Standaert,D.Gu'A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers,'IEEE Transactions on Information Forensics&Security,Vol.11,No.5,pp.1039-1054,2016.(CCF-A,IF=4.332)
F.Zhang,X.Zhao,S.Guo,J.Shen*,J.Huang,Z.Hu,'A Comprehensive Study of Algebraic Fault Analysis on PRINCE,'China Communications,Vol.12,No.7,pp.127-141,2015.
P.Zhou,T.Wang,G.Li,F.Zhang*,X.Zhao,'Analysis on the Parameter Selection Method for FLUSH+RELOAD based Cache Timing Attack on RSA,'China Communications,Vol.12,No.6,pp.33-45,2015.
S.Guo,X.Zhao,F.Zhang*,T.Wang,Z.Shi,F.-X Standaert,'Exploiting the Incomplete Diffusion Feature:A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations,'IEEE Transactions on Information Forensics&Security,Vol.9,No.6,pp.999-1014,2014.(CCF-A,IF=4.332)
X.Zhao,S.Guo,F.Zhang*,T.Wang,Z.Shi,Z.Liu,J.Gallais,'A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES,'Computers&Security,Vol.39:173-189,2013.
X.Zhao,S.Guo,F.Zhang*,T.Wang,Z.Shi,H.Liu,K,Ji,J.Huang.'Efficient Hamming Weight based Side-Channel Cube Attacks on PRESENT,'The Journal of Systems and Software,Vol.86,Issue 3,pp.728-743,2013.
X.Zhao,S.Guo,F.Zhang*,T.Wang,Z.Shi,and H.Luo,'Enhanced Side-Channel Cube Attacks on PRESENT,'IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences.Vol.E96-A,No.1,pp.332-339,2013.
会议论文
Y.Chen,B.Xuan,C.Poskitt,J.Sun,F.Zhang*,'Active Fuzzing for Testing and Securing Cyber-Physical Systems,'The ACM SIGSOFT International Symposium on Software Testing and Analysis(ISSTA),2020.accepted(CCF-A).
F.Zhang,B.Shao,G.Xu,B.Yang,Z.Yang*,Z.Qin,K.Ren,'From Homogeneous to Heterogeneous:Leveraging Deep Learning based Power Analysis on Cross Devices,'Design Automation Conference(DAC),2020.accepted(AR=23%,CCF-A).
W.Liu,C.-H.Chang*,F.Zhang*,X.Lou,'Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection,'Design Automation Conference(DAC),2020.accepted(AR=23%,CCF-A).
F.Zhang,Y.Zhang,H.Jiang,X.Zhu,S.Bhasin,Z.Liu*,D.Gu,K.Ren,'Persistent Fault Attack in Practice,'IACR Transactions on Cryptographic Hardware and Embedded Systems,Vol.2020,No.2,pp.172-195,2020.(AR=23%,CCF-B).
P.Chin,Y.Cao,L.Zhang,X.Zhao,F.Zhang*,'Locking Secret Data in the Vault Leveraging Fuzzy PUFs,'In AsianHOST 2019,December 2019.accepted(Best Paper Candidate).
F.Zhang,B.-L Yang,B.-J Yang*,Y.Zhang,S.Bhasin,K.Ren,'Fluctuating Power Logic:SCA protection by VDD randomization at the cell-level,'In AsianHOST 2019,December 2019.accepted.
X.Lou,F.Zhang*,G.Xu,Z.Liang,X.Zhao,S.Guo,K.Ren,'Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance,'In Inscrypt 2019,December 2019.accepted.(AR=24.5%,23/94)
Y.Zhang,F.Zhang*,B,Yang,G.Xu,B.Shao,X.Zhao,K.Ren,'Persistent Fault Injection in FPGA via BRAM Modification,'In The 2019 IEEE Conference on Dependable and Secure Computing(IDSC 2019),November 2019.accepted.
X.Cai,J.Yi,F.Zhang,S.Rajasekaran*,'Adversarial Structured Neural Network Pruning,'In CIKM 2019,pp.2433-2436,November 2019.(CCF-B,AR=21%,100/470)
Y.Chen,C.Poskitt,J.Sun,S.Adepu,F.Zhang*,'Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences,'In 34th IEEE/ACM International Conference on Automated Software Engineering(ASE),pp.962-973,2019,San Diego,CA,USA.[PDF](CCF-A,AR=21%,93/455)
W.Guo,Y.Cao,C.-H.Chang,M.Zhu,W.Ge,F.Zhang,'A Reliable Physical Unclonable Function Based on Differential Charging Capacitors,'In ISCAS 2019,May 2019.accepted.
J.Pan,F.Zhang,K.Ren,S.Bhasin,'One Fault is All it Needs:Breaking Higher-Order Masking with Persistent Fault Analysis,'In DATE 2019,pp.1-6,March 2019.(CCF-B,AR=24%,202/834).
S.Bhasin,J.Pan,F.Zhang,'Persistence Wears Down Resistance:Persistent Fault Analysis on Unprotected and Protected Block Cipher Implementations(Extended Abstract),'In SPACE 2018,December 2018.(Invited paper)
X.Dong,F.Zhang*,S.Queshi,Y.Zhang,Z.Liang,F.Gao,'A Wavelet-based Power Analysis Attack against Random Delay Countermeasure,'In AsianHOST 2018,pp.19-24,December 2018.
F.Zhang,X.Dong,Y.Zhang,X.Lou,Y.Wang,S.Qureshi,X.Zhao,Y.Tang'Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques,'In MASS 2018,pp.335-343,October 2018.
F.Zhang*,X.Lou,X.Zhao,S.Bhasin,W.He,R.Ding,S.Qureshi,K.Ren,'Persistent Fault Analysis on Block Ciphers,'IACR Transactions on Cryptographic Hardware and Embedded Systems,Issue 3,pp.150-172,2018.(CCF-B,the same paper won Best Paper Award in ChinaCrypt 2018).
X.Cai,S.Rajasekaran*,F.Zhang,'Efficient Approximate Algorithms for the Closest Pair Problem in High Dimensional Spaces,'In PAKDD 2018,pp.151-163,June 2018.
F.Zhang*,L.Geng,J.Shen,S.Bhasin,X.Zhao,S.Guo,'Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks,'In AsianHOST 2017,pp.49-54,2017.
X.Zhao,S.Guo,F.Zhang,T.Wang,Z.Shi,M.Chu,D.Gu,'Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering,'In FTDC 2014,pp.29-39,2014.
F.Zhang,X.Zhao,S.Guo,T.Wang,and Z.Shi,'Improved Algebraic Fault Analysis:A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers,'In COSADE 2013,LNCS,vol.7864,pp.62-79,March 7-8,2013.
X.Zhao,S.Guo,F.Zhang,Z.Shi,T.Wang,'Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques,'In FDTC 2013,pp.41-51,August,2013.
X.Zhao,F.Zhang,T.Wang,S.Guo,Z.Shi,H.Liu,K.Ji.'MDASCA:An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation,'In COSADE 2012,LNCS,vol.7275,pp.231-248,2012.(Best Paper Award)
F.Zhang,Z.Shi,'Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool,'In ITNG 2011,pp.359-365,April 2011.
S.Wang,F.Zhang,J.Dai,Z.Shi,L,Wang,'Making Register File Resistant to Power Analysis Attacks,'In ICCD 2008,pp.577-582,October 2008.
F.Zhang,Z.Shi,'An Efficient Window-based Countermeasure to Power Analysis of ECC Algorithms,'In ITNG 2008,pp.120-126,April 2008.
F.Zhang,Z.Shi,B.Wang,'Chord-based Key Establishment Schemes for Sensor Networks,'In ITNG 2008,pp.731-737,April 2008.
F.Zhang,Z.Shi,'Power Analysis Attacks on ECC Randomized Automata,'In ITNG 2007,pp.900-901,April 2007.
Z.Shi,F.Zhang,'New Attacks on Randomized ECC Algorithms,'In EITC 2006,pp.22-25,August 2006.
EI期刊论文
P.Zhou,T.Wang,X.Zhao,F.Zhang*,'Flush-Reload Cache timing attack on SM2 digital signature algorithm,'Journal of Huazhong University of Science and Technology(Natural Science Edition),Vol.46,No.3,pp.24-29,2018.In Chinese.
Y.Ma,T.Wang*,H.Chen,F.Zhang,X.Lou,L.Xu,W.Yang,'Fault Cube Attack on SIMON Family of Lightweight Block Ciphers,'Journal of Zhejiang University(Engineering Science),Vol.51,No.9,pp.1770-1779,2017.In Chinese.
H.Chen*,T.Wang,F.Zhang,X.Zhao,'Fault-based guess-and-determine attack on SOSEMANUK,'Journal of Huazhong University of Science and Technology(Natural Science Edition),Vol.45,No.2,pp.72-77,2017.In Chinese.
J.Huang,X.Zhao*,F.Zhang,S.Guo,P.Zhou,J.Yang,'Improvement and Evaluation for Algebraic Fault Attacks on PRESENT,'Journal on Communications,Vol.37,No.8,pp.144-156,2016.In Chinese.
H.Gan*,H.Zhang,J.Li,F.Zhang,X.Zhao,P.He,'Independent component analysis applied in electromagnetic attack,'Chinese Journal of Radio Science,Vol.31,No.2,pp.401-405,2016.In Chinese.
H.Gan,H.Zhang,F.Zhang*,X.Zhao,P.He,'Electromagnetic Information Leakage Acquisition and Pretreatment,'Chinese Journal of Radio Science,Vol.30,No.5,pp.1004-1008,2015.In Chinese.
H.Zhang,J.Li,F.Zhang*,H.Gan,P.He,'A Study on Template Attack of Chip Base on Side Channel Power Leakage,'Chinese Journal of Radio Science,Vol.30,No.5,pp.987-992,2015.In Chinese.
H.Chen*,T.Wang,F.Zhang,X.Zhao,Y.Sun,'Algebraic Fault Analysis on HIGHT,'Journal of Shanghai Jiaotong University,Vol.49,No.12,pp.1817-1825,2015.In Chinese.
X.Wang,S.Guo,X.Zhao,M.Song,F.Zhang,'Research of power preprocessing optimization-based template attack on LED,'Journal on Communications,Vol.35,No.3,pp.157-167,2014.In Chinese.
X.Zhao,S.Guo,T.Wang,F.Zhang,H.Liu,J.Huang,P.Wang,'Research of Algebraic Fault Analysis on Piccolo,'Chinese Journal of Computers,Vol.36,No.4,pp.882-894,2013.In Chinese.
H.Liu,X.Zhao,T.Wang,S.Guo,F.Zhang,J.Ke,'Research of Hamming Weight-Based Algebraic Side-Channel Attacks on SMS4,'Chinese Journal of Computers,Vol.36,No.6,pp.1183-1193,2013.In Chinese.
X.Zhao,S.Guo,T.Wang*,F.Zhang,Z.Shi,'Fault-Propagate Pattern based DFA on PRESENT and PRINTcipher,'Wuhan University Journal of Natural Sciences.Vol.17,No.6,pp.485-493,2012.[PDF]
T.Wang,X.Zhao,S.Guo,F.Zhang,H.Liu,and T.Zheng,'Research of Cache Timing Template Attacks on AES,'(in Chinese)Chinese Journal of Computers.Vol.2,No.1,pp.325-341,February 2012.
F.Zhang,S.Zhang,Y.Tang,W.Dai,'Design on Smart card-based Secure Logon System,'Information Security and Communications Privacy,2004(3):38-41.In Chinese.
专著的部分章节
F.Zhang,B.Shao,W.Gu,'Artificial Intelligence with Side Channle Analysis,'(人工智能之于旁路分析)in Communications of the CCF,Vol.15,Issue.7,Editors:K.Ren,(Eds.),July 2019.
F.Zhang,B.Yang,G.Xu,X.Lou,S.Bhasin,K.Ren,'Improvements and recent updates of persistent fault analysis on block ciphers,'in Book Frontiers in Hardware Security and Trust,Editors:Chang Chip-Hong,Cao Yuan,(Eds.)2019.
F.Zhang,B.Yang,S.Guo,X.Zhao,T.Wang,F.-X.Standaert,D.Gu,'An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers,'in Book Automated Methods in Cryptographic Fault Analysis,Editors:Breier,Jakub,Hou,Xiaolu,Bhasin,Shivam(Eds.)2018.
Y.Yao,F.Zhang,and Y.Fu,'Realtime Hand-Gesture Recognition Using RGB-D Sensor,'in Book Computer Vision and Machine Learning with RGB-D Sensors,pp.289-313,2014.
Z.Shi,B.Wang,F.Zhang,'CBKE:Chord-based Key Establishment Schemes for Wireless Sensor Networks,'Chapter in Handbook on Sensor Networks,(Xiao,Chen and Li,eds.),pp.399-418,World Scientific Publishing Company,August 2010.
其他论文
A.Wang*,J.Ge,N.Shang,F.Zhang,G Zhang,'Practical Cases of Side-channel Analysis,'Journal of Cryptologic Research,Vol.5,Issue.4,pp.383-398,2018.In Chinese.
X.Lou,F.Zhang*,J.Huang,X.Zhao,H.Liu,'Research on Trace Driven Cache Analysis on SM4,'Journal of Cryptologic Research,Vol.5,Issue.4,pp.430-441,2018.In Chinese.
H.Chen*,T.Wang,X.Zhao,F.Zhang,Y.Ma,X.Wang,'Research of fault-tolerant algebraic fault attack on HIGHT,'Journal of Nanjing University(Natural Science),Vol.53,No.6,pp.1141-1152,2017.In Chinese.
Y.Wang,X.Zhao,F.Zhang,S.Guo,L.Wu,W.Li,X.Lou'Security Evaluation for Fault Attacks on Lightweight Block Cipher Midori,'Journal of Cryptologic Research,Vol.4,No.1,pp.58-78,2017.In Chinese.
J.Wu,C.Kuang,K.Zeng,W.Qiao,F.Zhang*,X.Zhang,Z.Xu.'RGB-D Camera based Human Limb Movement Recognition and Tracking in Supine Positions,'In PCM 2016,pp.705-714,2016.
J.Huang,B.Xi,P.Li,F.Zhang*,X.Zhao,'Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography,'In Journal of Computer Science,Vol.43,No.7,pp.157-161,2015.