


Остановите войну!
for scientists:


default search action
Jianying Zhou 0001
Person information

- affiliation: Singapore University of Technology and Design (SUTD)
- affiliation (former): Institute for Infocomm Research, Cryptography & Security Department, Singapore
Other persons with the same name
- Jianying Zhou — disambiguation page
- Jianying Zhou 0002 — Nanyang Technological University, Singapore
- Jianying Zhou 0003 — Sun Yat-sen University, School of Physics and Engineering, Guangzhou, China
- Jianying Zhou 0004 — Third Research Institute of the Ministry of Public Security, China
- Jianying Zhou 0005 — NeoPhotonics Corporation, San Jose, CA, USA
- Jianying Zhou 0006 — The First Affiliated Hospital, Zhejiang University, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j115]Aldar C.-F. Chan, Jianying Zhou:
Non-Intrusive Protection for Legacy SCADA Systems. IEEE Commun. Mag. 61(6): 36-42 (2023) - [j114]Ann Yi Wong
, Eyasu Getahun Chekole
, Martín Ochoa, Jianying Zhou
:
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies. Comput. Secur. 128: 103140 (2023) - [j113]Teik Guan Tan
, Jianying Zhou
, Vishal Sharma
, Saraju P. Mohanty
:
Post-Quantum Adversarial Modeling: A User's Perspective. Computer 56(8): 58-67 (2023) - [j112]Gabriela F. Ciocarlie
, Jianying Zhou
:
Securing Critical Infrastructure Across Cyber and Physical Dimensions. IEEE Secur. Priv. 21(4): 9 (2023) - [j111]Boyu Kuang
, Anmin Fu
, Yansong Gao
, Yuqing Zhang
, Jianying Zhou, Robert H. Deng
:
FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(4): 2954-2969 (2023) - [j110]Chenglu Jin
, Zheng Yang
, Tao Xiang
, Sridhar Adepu, Jianying Zhou:
HMACCE: Establishing Authenticated and Confidential Channel From Historical Data for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 1080-1094 (2023) - [j109]Alessandro Brighente
, Mauro Conti
, Radha Poovendran, Jianying Zhou:
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. IEEE Trans. Ind. Informatics 19(6): 7801 (2023) - [j108]Anthony Kee Teck Yeo, Matheus E. Garbelini
, Sudipta Chattopadhyay
, Jianying Zhou:
VitroBench: Manipulating in-vehicle networks and COTS ECUs on your bench: A comprehensive test platform for automotive cybersecurity research. Veh. Commun. 43: 100649 (2023) - [c192]Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. ACNS 2023: 143-166 - [c191]Ko Zheng Teng
, Trupil Limbasiya
, Federico Turrin
, Yan Lin Aung
, Sudipta Chattopadhyay
, Jianying Zhou
, Mauro Conti
:
PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems. CPSS@AsiaCCS 2023: 3-13 - [c190]John Henry Castellanos, Mohamed Maghenem, Alvaro A. Cárdenas
, Ricardo G. Sanfelice, Jianying Zhou:
Provable Adversarial Safety in Cyber-Physical Systems. EuroS&P 2023: 979-1012 - [c189]Daniël Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou:
TAP: Transparent and Privacy-Preserving Data Services. USENIX Security Symposium 2023 - [i52]Alessandro Brighente, Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - 2022
- [j107]Bowen Liu
, Qiang Tang
, Jianying Zhou:
Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting. IEEE Access 10: 71598-71611 (2022) - [j106]Vishal Sharma
, Zengpeng Li
, Pawel Szalachowski
, Teik Guan Tan
, Jianying Zhou
:
Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution. Distributed Ledger Technol. Res. Pract. 1(1): 1-23 (2022) - [j105]Shiwei Xu
, Xiaowen Cai
, Yizhi Zhao, Zhengwei Ren, Le Du, Qin Wang, Jianying Zhou:
zkrpChain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs. Future Gener. Comput. Syst. 128: 490-504 (2022) - [j104]Teik Guan Tan
, Pawel Szalachowski, Jianying Zhou
:
Challenges of post-quantum digital signing in real-world applications: a survey. Int. J. Inf. Sec. 21(4): 937-952 (2022) - [j103]Shanshan Li
, Chunxiang Xu
, Yuan Zhang
, Jianying Zhou:
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens. IEEE Trans. Inf. Forensics Secur. 17: 3525-3538 (2022) - [j102]Trupil Limbasiya, Ko Zheng Teng
, Sudipta Chattopadhyay, Jianying Zhou
:
A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles. Veh. Commun. 37: 100515 (2022) - [c188]Lim Yong Zhi
, Jianying Zhou, Martin Saerbeck:
SuppliedTrust: A Trusted Blockchain Architecture for Supply Chains. ACNS Workshops 2022: 36-52 - [c187]Alessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti
, Jianying Zhou:
HolA: Holistic and Autonomous Attestation for IoT Networks. ACNS Workshops 2022: 277-296 - [c186]Aldar C.-F. Chan
, Jianying Zhou:
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid. ACNS Workshops 2022: 338-357 - [c185]Flavio Toffalini
, Mathias Payer
, Jianying Zhou
, Lorenzo Cavallaro
:
Designing a Provenance Analysis for SGX Enclaves. ACSAC 2022: 102-116 - [c184]Zheng Yang
, Chao Yin
, Junming Ke
, Tien Tuan Anh Dinh
, Jianying Zhou
:
If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable. ACSAC 2022: 727-741 - [c183]Vishal Sharma
, Pawel Szalachowski, Jianying Zhou:
Evaluating Blockchain Protocols with Abusive Modeling. AsiaCCS 2022: 109-122 - [c182]Bowen Liu, Jianying Zhou:
Liberate Your Servers: A Decentralized Content Compliance Validation Protocol. DBSec 2022: 89-109 - [c181]Muhammad Omer Shahid, Chuadhry Mujeeb Ahmed
, Venkata Reddy Palleti, Jianying Zhou:
Curse of System Complexity and Virtue of Operational Invariants: Machine Learning based System Modeling and Attack Detection in CPS. DSC 2022: 1-8 - [c180]Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Securing Password Authentication for Web-based Applications. DSC 2022: 1-10 - [c179]Teik Guan Tan, Jianying Zhou:
Migrating Blockchains Away from ECDSA for Post-quantum Security: A Study of Impact on Users and Applications. DPM/CBT@ESORICS 2022: 308-316 - [c178]Daniël Reijsbergen, Aung Maw, Sarad Venugopalan
, Dianshi Yang, Tien Tuan Anh Dinh, Jianying Zhou:
Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure. ICBC 2022: 1-9 - [c177]Teik Guan Tan
, De Wen Soh
, Jianying Zhou
:
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices. ICICS 2022: 19-36 - [c176]Yan Lin Aung
, Martín Ochoa
, Jianying Zhou
:
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence. ISC 2022: 319-338 - [c175]Zheng Yang, Tien Tuan Anh Dinh, Chao Yin
, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou:
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. SACMAT 2022: 49-60 - [e39]Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [i51]Priyanga Rajaram, Mark Goh, Jianying Zhou:
Guidelines for cyber risk management in shipboard operational technology systems. CoRR abs/2203.04072 (2022) - [i50]Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, Jianying Zhou:
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles. CoRR abs/2203.14965 (2022) - [i49]Andrei Bytes, Prashant Hari Narayan Rajput, Michail Maniatakos, Jianying Zhou:
FieldFuzz: Enabling vulnerability discovery in Industrial Control Systems supply chain using stateful system-level fuzzing. CoRR abs/2204.13499 (2022) - [i48]Daniël Reijsbergen, Aung Maw, Sarad Venugopalan
, Dianshi Yang, Tien Tuan Anh Dinh, Jianying Zhou:
Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure. CoRR abs/2205.00185 (2022) - [i47]Flavio Toffalini, Mathias Payer, Jianying Zhou, Lorenzo Cavallaro:
Designing a Provenance Analysis for SGX Enclaves. CoRR abs/2206.07418 (2022) - [i46]Daniël Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou:
TAP: Transparent and Privacy-Preserving Data Services. CoRR abs/2210.11702 (2022) - [i45]Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. IACR Cryptol. ePrint Arch. 2022: 1280 (2022) - [i44]Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou:
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. IACR Cryptol. ePrint Arch. 2022: 1281 (2022) - [i43]Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret. IACR Cryptol. ePrint Arch. 2022: 1373 (2022) - 2021
- [j101]Peng Zhou
, Xiaojing Gu, Surya Nepal
, Jianying Zhou
:
Modeling social worm propagation for advanced persistent threats. Comput. Secur. 108: 102321 (2021) - [j100]Flavio Toffalini, Andrea Oliveri
, Mariano Graziano, Jianying Zhou, Davide Balzarotti:
The evidence beyond the wall: Memory forensics in SGX environments. Digit. Investig. 39: 301313 (2021) - [j99]Zheng Yang
, Sridhar Adepu
, Jianying Zhou:
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography. IEEE Secur. Priv. 19(5): 57-65 (2021) - [j98]Jia Xu
, Jianying Zhou
:
Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext. Int. J. Inf. Sec. 20(2): 141-159 (2021) - [j97]Edwin Franco Myloth Josephlal, Sridhar Adepu, Zheng Yang
, Jianying Zhou:
Enabling isolation and recovery in PLC redundancy framework of metro train systems. Int. J. Inf. Sec. 20(6): 783-795 (2021) - [j96]Weizhi Meng
, Wenjuan Li
, Jianying Zhou:
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 70: 60-71 (2021) - [j95]Zengpeng Li
, Zheng Yang
, Pawel Szalachowski
, Jianying Zhou:
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things. IEEE Internet Things J. 8(2): 844-859 (2021) - [j94]Anjia Yang
, Jia Xu
, Jian Weng
, Jianying Zhou
, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans. Cloud Comput. 9(1): 212-225 (2021) - [j93]Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Jianying Zhou
, Robert H. Deng
:
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups. IEEE Trans. Inf. Forensics Secur. 16: 4746-4761 (2021) - [j92]Zheng Yang
, Zhiting Bao, Chenglu Jin, Zhe Liu, Jianying Zhou:
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers. IACR Trans. Symmetric Cryptol. 2021(3): 170-217 (2021) - [c174]Lim Yong Zhi
, Jianying Zhou, Martin Saerbeck:
Shaping Blockchain Technology for Securing Supply Chains. ACNS Workshops 2021: 3-18 - [c173]Cher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou:
Quantum Computing Threat Modelling on a Generic CPS Setup. ACNS Workshops 2021: 171-190 - [c172]Flavio Toffalini, Mariano Graziano, Mauro Conti
, Jianying Zhou:
SnakeGX: A Sneaky Attack Against SGX Enclaves. ACNS (1) 2021: 333-362 - [c171]Zheng Yang
, Chenglu Jin, Jianting Ning, Zengpeng Li, Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. ACSAC 2021: 497-512 - [c170]Chuadhry Mujeeb Ahmed
, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. AsiaCCS 2021: 886-900 - [c169]Zheng Yang
, Chao Yin
, Chenglu Jin, Jianting Ning, Jianying Zhou:
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems. CPSS@AsiaCCS 2021: 17-28 - [c168]Chuadhry Mujeeb Ahmed
, Jianying Zhou:
Bank of Models: Sensor Attack Detection and Isolation in Industrial Control Systems. CRITIS 2021: 3-23 - [c167]Xiaowen Cai, Wenjing Cheng, Minghui Zhang, Chen Qian, Zhengwei Ren, Shiwei Xu, Jianying Zhou:
Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain. CSS 2021: 164-181 - [c166]Bowen Liu, Pawel Szalachowski, Jianying Zhou:
A First Look into DeFi Oracles. DAPPS 2021: 39-48 - [c165]Kai Ren Teo, Balamurali B. T., Jer-Ming Chen
, Jianying Zhou:
Retrieving Input from Touch Interfaces via Acoustic Emanations. DSC 2021: 1-8 - [c164]Daniël Reijsbergen, Zheng Yang
, Aung Maw, Tien Tuan Anh Dinh, Jianying Zhou:
Transparent Electricity Pricing with Privacy. ESORICS (2) 2021: 439-460 - [c163]Jay Prakash, Clarice Chua Qing Yu, Tanvi Ravindra Thombre, Andrei Bytes, Mohammed Jubur
, Nitesh Saxena, Lucienne Blessing
, Jianying Zhou, Tony Q. S. Quek:
Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations. EuroS&P 2021: 21-36 - [c162]Shiwei Xu, Ao Sun, Xiaowen Cai, Zhengwei Ren, Yizhi Zhao, Jianying Zhou:
Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain. ICPADS 2021: 667-674 - [c161]Teik Guan Tan, Jianying Zhou:
Layering Quantum-Resistance into Classical Digital Signature Algorithms. ISC 2021: 26-41 - [c160]Bowen Liu
, Qiang Tang, Jianying Zhou:
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT. ISC 2021: 95-116 - [c159]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
LaKSA: A Probabilistic Proof-of-Stake Protocol. NDSS 2021 - [c158]John Henry Castellanos, Martín Ochoa, Alvaro A. Cárdenas, Owen Arden, Jianying Zhou:
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis. RAID 2021: 235-250 - [e38]Jianying Zhou
, Chuadhry Mujeeb Ahmed
, Lejla Batina
, Sudipta Chattopadhyay
, Olga Gadyatskaya
, Chenglu Jin
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Mihalis Maniatakos
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Masaki Shimaoka
, Chunhua Su
, Cong Wang
:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [e37]Rodrigo Roman
, Jianying Zhou
:
Security and Trust Management - 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings. Lecture Notes in Computer Science 13075, Springer 2021, ISBN 978-3-030-91858-3 [contents] - [i42]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. CoRR abs/2102.08985 (2021) - [i41]Daniël Reijsbergen, Zheng Yang, Aung Maw, Tien Tuan Anh Dinh, Jianying Zhou:
Transparent Electricity Pricing with Privacy. CoRR abs/2104.07949 (2021) - [i40]Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting. CoRR abs/2104.13543 (2021) - [i39]Aldar C.-F. Chan, Jianying Zhou:
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid. CoRR abs/2107.05863 (2021) - [i38]Zengpeng Li, Teik Guan Tan, Pawel Szalachowski, Vishal Sharma, Jianying Zhou:
Post-Quantum VRF and its Applications in Future-Proof Blockchain System. CoRR abs/2109.02012 (2021) - [i37]Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou:
Reinshard: An optimally sharded dual-blockchain for concurrency resolution. CoRR abs/2109.07316 (2021) - [i36]Ann Yi Wong, Eyasu Getahun Chekole, Martín Ochoa, Jianying Zhou:
Threat Modeling and Security Analysis of Containers: A Survey. CoRR abs/2111.11475 (2021) - [i35]Bowen Liu, Qiang Tang
, Jianying Zhou:
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT. IACR Cryptol. ePrint Arch. 2021: 1127 (2021) - 2020
- [j91]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j90]Tanmoy Kanti Das
, Sridhar Adepu, Jianying Zhou
:
Anomaly detection in Industrial Control Systems using Logical Analysis of Data. Comput. Secur. 96: 101935 (2020) - [j89]Chuadhry Mujeeb Ahmed
, Jianying Zhou
:
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective. IEEE Secur. Priv. 18(6): 14-22 (2020) - [j88]Sridhar Adepu
, Nandha Kumar Kandasamy, Jianying Zhou
, Aditya Mathur:
Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Sec. 19(2): 189-211 (2020) - [j87]Hoon Wei Lim, William G. Temple, Bao Anh N. Tran, Binbin Chen
, Zbigniew Kalbarczyk, Jianying Zhou
:
Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems. ACM Trans. Cyber Phys. Syst. 4(1): 7:1-7:26 (2020) - [j86]Zheng Yang
, Jun He
, Yangguang Tian, Jianying Zhou
:
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 16(10): 6584-6596 (2020) - [c157]Andrei Bytes, Jianying Zhou
:
Post-exploitation and Persistence Techniques Against Programmable Logic Controller. ACNS Workshops 2020: 255-273 - [c156]Yangguang Tian, Nan Li
, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. ACSAC 2020: 813-828 - [c155]Zhongyuan Hau, John Henry Castellanos
, Jianying Zhou
:
Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach. CPSS@AsiaCCS 2020: 42-53 - [c154]Dianshi Yang, Daisuke Mashima, Wei Lin, Jianying Zhou
:
DecIED: Scalable k-Anonymous Deception for IEC61850-Compliant Smart Grid Systems. CPSS@AsiaCCS 2020: 54-65 - [c153]Zheng Yang
, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou
:
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems. AsiaCCS 2020: 719-731 - [c152]Surabhi Athalye, Chuadhry Mujeeb Ahmed
, Jianying Zhou
:
A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS. CRITIS 2020: 17-30 - [c151]Teik Guan Tan, Vishal Sharma
, Jianying Zhou
:
Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader. IEEE ICBC 2020: 1-9 - [c150]Junming Ke, Pawel Szalachowski, Jianying Zhou
, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. ISC 2020: 334-351 - [c149]Chuadhry Mujeeb Ahmed
, Jay Prakash, Rizwan Qadeer, Anand Agrawal, Jianying Zhou
:
Process skew: fingerprinting the process for anomaly detection in industrial control systems. WISEC 2020: 219-230 - [e36]Mauro Conti
, Jianying Zhou, Emiliano Casalicchio
, Angelo Spognardi
:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12146, Springer 2020, ISBN 978-3-030-57807-7 [contents] - [e35]Mauro Conti
, Jianying Zhou, Emiliano Casalicchio
, Angelo Spognardi
:
Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12147, Springer 2020, ISBN 978-3-030-57877-0 [contents] - [e34]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [e33]Jianying Zhou
, Xiapu Luo
, Qingni Shen
, Zhen Xu:
Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11999, Springer 2020, ISBN 978-3-030-41578-5 [contents] - [e32]Weizhi Meng
, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou
:
Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12282, Springer 2020, ISBN 978-3-030-61077-7 [contents] - [i34]Andrei Bytes, Jay Prakash, Jianying Zhou, Tony Q. S. Quek:
On the Insecurities of Mobile D2D File Sharing Applications. CoRR abs/2002.03144 (2020) - [i33]Chuadhry Mujeeb Ahmed, Jianying Zhou:
Challenges and Opportunities in CPS Security: A Physics-based Perspective. CoRR abs/2004.03178 (2020) - [i32]Chuadhry Mujeeb Ahmed, Jay Prakash, Jianying Zhou:
Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults. CoRR abs/2005.00325 (2020) - [i31]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
ProPoS: A Probabilistic Proof-of-Stake Protocol. CoRR abs/2006.01427 (2020) - [i30]Tanmoy Kanti Das, S. Gangopadhyay, Jianying Zhou:
SSIDS: Semi-Supervised Intrusion Detection System by Extending the Logical Analysis of Data. CoRR abs/2007.10608 (2020) - [i29]Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Securing Password Authentication for Web-based Applications. CoRR abs/2011.06257 (2020) - [i28]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. IACR Cryptol. ePrint Arch. 2020: 1098 (2020)
2010 – 2019
- 2019
- [j85]Dong Li, Huaqun Guo
, Jianying Zhou
, Luying Zhou, Jun Wen Wong:
SCADAWall: A CPI-enabled firewall model for SCADA security. Comput. Secur. 80: 134-154 (2019) - [j84]Tao Zhang
, Lee Wang Hao, Mingyuan Gao, Jianying Zhou
:
File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation. Int. J. Inf. Sec. 18(6): 701-713 (2019) - [j83]Andrei Bytes
, Sridhar Adepu
, Jianying Zhou
:
Towards Semantic Sensitive Feature Profiling of IoT Devices. IEEE Internet Things J. 6(5): 8056-8064 (2019) - [j82]