default search action
Jinyu Zhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Deepak Adhikari, Wei Jiang, Jinyu Zhan, Danda B. Rawat, Asmita Bhattarai:
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives. Comput. Sci. Rev. 54: 100665 (2024) - [j32]Deepak Adhikari, Wei Jiang, Jinyu Zhan, Maregu Assefa, Hadi Akbarzade Khorshidi, Uwe Aickelin, Danda B. Rawat:
A Lightweight-Window-Portion-Based Multiple Imputation for Extreme Missing Gaps in IoT Systems. IEEE Internet Things J. 11(3): 3676-3689 (2024) - [j31]Lingxin Jin, Wei Jiang, Jinyu Zhan, Xiangyu Wen:
Highly Evasive Targeted Bit-Trojan on Deep Neural Networks. IEEE Trans. Computers 73(9): 2350-2363 (2024) - [j30]Jinyu Zhan, Suidi Peng, Wei Jiang, Xiang Wang, Jiarui Liu:
Detecting Spoofed Noisy Speeches via Activation-Based Residual Blocks for Embedded Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11): 3985-3996 (2024) - [j29]Jinyu Zhan, Wei Jiang, Xinke Liao, Ke Jiang, Deepak Adhikari:
Improving Dependability of Distributed Real-Time Applications via Safety and Security Co-Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(12): 4505-4518 (2024) - [j28]Maregu Assefa, Wei Jiang, Jinyu Zhan, Kumie Gedamu, Getinet Yilma, Melese Ayalew, Deepak Adhikari:
Audio-Visual Contrastive and Consistency Learning for Semi-Supervised Action Recognition. IEEE Trans. Multim. 26: 3491-3504 (2024) - [j27]Wei Jiang, Xiangyu Wen, Jinyu Zhan, Xupeng Wang, Ziwei Song, Chen Bian:
Critical Path-Based Backdoor Detection for Deep Neural Networks. IEEE Trans. Neural Networks Learn. Syst. 35(3): 4032-4046 (2024) - [i2]Lingxin Jin, Xianyu Wen, Wei Jiang, Jinyu Zhan:
A Survey of Trojan Attacks and Defenses to Deep Neural Networks. CoRR abs/2408.08920 (2024) - [i1]Lingxin Jin, Meiyu Lin, Wei Jiang, Jinyu Zhan:
Data Poisoning-based Backdoor Attack Framework against Supervised Learning Rules of Spiking Neural Networks. CoRR abs/2409.15670 (2024) - 2023
- [j26]Deepak Adhikari, Wei Jiang, Jinyu Zhan, Zhiyuan He, Danda B. Rawat, Uwe Aickelin, Hadi Akbarzade Khorshidi:
A Comprehensive Survey on Imputation of Missing Data in Internet of Things. ACM Comput. Surv. 55(7): 133:1-133:38 (2023) - [j25]Yongjia Yang, Jinyu Zhan, Wei Jiang, Yucheng Jiang, Antai Yu:
Neural architecture search for resource constrained hardware devices: A survey. IET Cyper-Phys. Syst.: Theory & Appl. 8(3): 149-159 (2023) - [j24]Hong Lei, Wei Jiang, Jinyu Zhan, Shen You, Lingxin Jin, Xiaona Xie, Zhengwei Chang:
Iterative Training Attack: A Black-Box Adversarial Attack via Perturbation Generative Network. J. Circuits Syst. Comput. 32(18): 2350314:1-2350314:20 (2023) - [j23]Wei Jiang, Xinke Liao, Jinyu Zhan, Deepak Adhikari, Ke Jiang:
DESCO: Decomposition-Based Co-Design to Improve Fault Tolerance of Security-Critical Tasks in Cyber Physical Systems. IEEE Trans. Computers 72(6): 1652-1665 (2023) - [j22]Wei Jiang, Shen You, Jinyu Zhan, Xupeng Wang, Hong Lei, Deepak Adhikari:
Query-Efficient Generation of Adversarial Examples for Defensive DNNs via Multiobjective Optimization. IEEE Trans. Evol. Comput. 27(4): 832-847 (2023) - [j21]Jinyu Zhan, Yongjia Yang, Wei Jiang, Ke Jiang, Zhiguo Shi, Cheng Zhuo:
Fast Multi-Lane Detection Based on CNN Differentiation for ADAS/AD. IEEE Trans. Veh. Technol. 72(12): 15290-15300 (2023) - 2022
- [j20]Jinyu Zhan, Wei Jiang, Ying Li, Junting Wu, Jianping Zhu, Jinghuan Yu:
NIC-QF: A design of FPGA based Network Interface Card with Query Filter for big data systems. Future Gener. Comput. Syst. 136: 153-169 (2022) - [j19]Jinyu Zhan, Wei Jiang, Ying Li, Junting Wu, Jianping Zhu, Jinghuan Yu:
Accelerating Queries of Big Data Systems by Storage-Side CPU-FPGA Co-Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(7): 2128-2141 (2022) - [j18]Wei Jiang, Xiangyu Wen, Jinyu Zhan, Xupeng Wang, Ziwei Song:
Interpretability-Guided Defense Against Backdoor Attacks to Deep Neural Networks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(8): 2611-2624 (2022) - [j17]Jinyu Zhan, Ruoxu Sun, Wei Jiang, Yucheng Jiang, Xunzhao Yin, Cheng Zhuo:
Improving Fault Tolerance for Reliable DNN Using Boundary-Aware Activation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(10): 3414-3425 (2022) - [j16]Jinyu Zhan, Zhibei Pu, Wei Jiang, Junting Wu, Yongjia Yang:
Detecting Spoofed Speeches via Segment-Based Word CQCC and Average ZCR for Embedded Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 3862-3873 (2022) - [j15]Wei Jiang, Ziwei Song, Jinyu Zhan, Di Liu, Jiafu Wan:
Layerwise Security Protection for Deep Neural Networks in Industrial Cyber Physical Systems. IEEE Trans. Ind. Informatics 18(12): 8797-8806 (2022) - 2021
- [j14]Ruoxu Sun, Jinyu Zhan, Wei Jiang, Qi Dong, Yalan Ye:
Energy Optimization of Mixed-Criticality Distributed Real-Time Embedded Systems. J. Circuits Syst. Comput. 30(5): 2150085:1-2150085:19 (2021) - [j13]Kaiyan Chang, Wei Jiang, Jinyu Zhan, Zicheng Gong, Weijia Pan:
ArchNet: A data hiding design for distributed machine learning systems. J. Syst. Archit. 114: 101912 (2021) - [j12]Jinyu Zhan, Xingzhi Zhou, Wei Jiang:
Field programmable gate array-based all-layer accelerator with quantization neural networks for sustainable cyber-physical systems. Softw. Pract. Exp. 51(11): 2203-2224 (2021) - [j11]Wei Jiang, Zhiyuan He, Jinyu Zhan, Weijia Pan:
Attack-Aware Detection and Defense to Resist Adversarial Examples. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(10): 2194-2198 (2021) - [j10]Wei Jiang, Zhiyuan He, Jinyu Zhan, Weijia Pan, Deepak Adhikari:
Research Progress and Challenges on Application-Driven Adversarial Examples: A Survey. ACM Trans. Cyber Phys. Syst. 5(4): 39:1-39:25 (2021) - [c30]Xingzhi Zhou, Jinyu Zhan, Wei Jiang:
Achieving fast lane detection of autonomous driving by CNN based differentiation: work-in-progress. CODES+ISSS 2021: 21-22 - [c29]Chen Bian, Wei Jiang, Jinyu Zhan, Ziwei Song, Xiangyu Wen, Hong Lei:
A physically realizable backdoor attack on 3D point cloud deep learning: work-in-progress. CODES+ISSS 2021: 27-28 - [c28]Ziwei Song, Wei Jiang, Jinyu Zhan, Xiangyu Wen, Chen Bian:
Critical-weight based locking scheme for DNN IP protection in edge computing: work-in-progress. CODES+ISSS 2021: 33-34 - [c27]Xiangyu Wen, Wei Jiang, Jinyu Zhan, Chen Bian, Ziwei Song:
Generative strategy based backdoor attacks to 3D point clouds: work-in-progress. EMSOFT 2021: 23-24 - [c26]Zhufeng Fan, Jinyu Zhan, Wei Jiang:
Detecting deepfake videos by visual-audio synchronism: work-in-progress. EMSOFT 2021: 31-32 - [c25]Ruoxu Sun, Jinyu Zhan, Wei Jiang, Yucheng Jiang:
Improving fault tolerance of DNNs through weight remapping based on gaussian distribution: work-in-progress. EMSOFT 2021: 33-34 - [c24]Wei Jiang, Xinke Liao, Jinyu Zhan, Ke Jiang:
Work-in-Progress: Improving Resilience of Distributed Real-Time Applications via Security and Fault Tolerance Co-Design. RTSS 2021: 536-539 - 2020
- [j9]Wei Jiang, Zicheng Gong, Jinyu Zhan, Zhiyuan He, Weijia Pan:
A Low-Cost Image Encryption Method to Prevent Model Stealing of Deep Neural Network. J. Circuits Syst. Comput. 29(16): 2050252:1-2050252:20 (2020) - [j8]Wei Jiang, Liang Wen, Jinyu Zhan, Ke Jiang:
Design optimization of confidentiality-critical cyber physical systems with fault detection. J. Syst. Archit. 107: 101739 (2020) - [j7]Jinyu Zhan, Yixin Li, Wei Jiang, Jiayu Yu, Jinghuan Yu:
Branch-aware data variable allocation for energy optimization of hybrid SRAM+NVM SPM☆. J. Syst. Archit. 109: 101797 (2020) - [j6]Wei Jiang, Ziwei Song, Jinyu Zhan, Zhiyuan He, Xiangyu Wen, Ke Jiang:
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications. J. Syst. Archit. 110: 101775 (2020) - [c23]Ying Li, Jinyu Zhan, Wei Jiang, Junting Wu, Jianping Zhu:
An FPGA based Network Interface Card with Query Filter for Storage Nodes of Big Data Systems. ASP-DAC 2020: 556-561 - [c22]Jinyu Zhan, Junting Wu, Wei Jiang, Ying Li, Jianping Zhu:
Accelerating Queries of MongoDB by an FPGA-based Storage Engine: Work-in-Progress. CODES+ISSS 2020: 16-17 - [c21]Zicheng Gong, Wei Jiang, Jinyu Zhan, Ziwei Song:
Model Stealing Defense with Hybrid Fuzzy Models: Work-in-Progress. CODES+ISSS 2020: 30-31 - [c20]Zhiyuan He, Wei Jiang, Jinyu Zhan, Xupeng Wang, Xiangyu Wen:
Heatmap-Aware Low-Cost Design to Resist Adversarial Attacks: Work-in-Progress. CODES+ISSS 2020: 32-33 - [c19]Xiangyu Wen, Wei Jiang, Jinyu Zhan, Xupeng Wang, Zhiyuan He:
Interpretability Derived Backdoor Attacks Detection in Deep Neural Networks: Work-in-Progress. EMSOFT 2020: 13-14 - [c18]Ruoxu Sun, Jinyu Zhan, Wei Jiang:
An Insight into Fault Propagation in Deep Neural Networks: Work-in-Progress. EMSOFT 2020: 20-21 - [c17]Jinyu Zhan, Ying Li, Wei Jiang, Jianping Zhu:
FPGA Based Co-design of Storage-side Query Filter for Big Data Systems. SoCC 2020: 25-30
2010 – 2019
- 2019
- [j5]Jinyu Zhan, Junhuan Yang, Wei Jiang, Yufang Sun, Yixin Li:
Vehicle data management with specific wear-levelling and fault tolerance for hybrid DRAM-NVM memory. J. Syst. Archit. 98: 259-270 (2019) - [c16]Jinyu Zhan, Ying Li, Wei Jiang, Junting Wu, Jianping Zhu:
An improved network interface card with query filter for big data systems: work-in-progress. CODES+ISSS 2019: 19:1-19:2 - [c15]Yixin Li, Jinyu Zhan, Wei Jiang, Jiayu Yu:
Energy optimization of branch-aware data variable allocation on hybrid SRAM+NVM SPM for CPS. SAC 2019: 236-241 - 2018
- [j4]Jinyu Zhan, Xia Zhang, Wei Jiang, Yue Ma, Ke Jiang:
Energy optimization of security-sensitive mixed-criticality applications for distributed real-time systems. J. Parallel Distributed Comput. 117: 115-126 (2018) - [j3]Jinyu Zhan, Yiming Zhang, Wei Jiang, Junhuan Yang, Lin Li, Yixin Li:
Energy-aware page replacement and consistency guarantee for hybrid NVM-DRAM memory systems. J. Syst. Archit. 89: 60-72 (2018) - [c14]Junlong Wang, Wei Jiang, Jinyu Zhan, Jinghuan Yu, Haibo Hu, Liugen Xu:
Persistence improvement for distributed cache with NVM based storage system: work-in-progress. CASES 2018: 2:1-2:3 - [c13]Yixin Li, Jinyu Zhan, Wei Jiang, Ying Li:
Writing-aware data variable allocation on hybrid SRAM+NVM SPM: work-in-progress. CASES 2018: 11:1-11:2 - [c12]Jinyu Zhan, Junhuan Yang, Wei Jiang, Yixin Li:
Dynamic data management for automotive ECUs with hybrid RAM-NVM memory: work-in-progress. CODES+ISSS 2018: 5 - [c11]Wei Jiang, Liugen Xiu, Jinyu Zhan, Ke Jiang:
Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress. CODES+ISSS 2018: 9 - [c10]Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang:
Design of security-critical distributed real-time applications with fault-tolerant constraint: work-in-progress. EMSOFT 2018: 4 - 2017
- [j2]Wei Jiang, Xia Zhang, Jinyu Zhan, Yue Ma, Ke Jiang:
Design optimization of secure message communication for energy-constrained distributed real-time systems. J. Parallel Distributed Comput. 100: 1-15 (2017) - [c9]Lin Li, Wei Jiang, Rui Pan, Jinyu Zhan, Zili Shao, Xiankui Xiong:
On-line memorry defragmentation for NVM-based persistent heaps. NVMSA 2017: 1-4 - [c8]Yiming Zhang, Jinyu Zhan, Junhuan Yang, Wei Jiang, Lin Li, Yixin Li:
Energy-aware page replacement for NVM based hybrid main memory system. RTCSA 2017: 1-6 - 2016
- [c7]Li Zhu, Jinyu Zhan, Sihao Chen, Yiming Zhang, Junhuan Yang, Wei Jiang, Lin Li:
Fault Tolerant Algorithm for NVM to Reuse the Error Blocks. ICESS 2016: 54-59 - [c6]Junhuan Yang, Jinyu Zhan, Yiming Zhang, Wei Jiang, Lin Li, Li Zhu, Xuefei Tang:
Data Management for Automotive ECUs Based on Hybrid RAM-NVM Main Memory. ICESS 2016: 74-79 - [c5]Yiming Zhang, Jinyu Zhan, Junhuan Yang, Wei Jiang, Lin Li, Li Zhu, Xuefei Tang:
Dynamic Memory Management for Hybrid DRAM-NVM Main Memory Systems. ICESS 2016: 148-153 - 2013
- [j1]Jinyu Zhan, Shan Lu, Guowu Yang:
Analysis of Boolean Networks Using an Optimized Algorithm of Structure Matrix Based on Semi-tensor Product. J. Comput. 8(6): 1441-1448 (2013) - [c4]Xia Zhang, Jinyu Zhan, Wei Jiang, Yue Ma, Ke Jiang:
Design Optimization of Energy- and Security-Critical Distributed Real-Time Embedded Systems. IPDPS Workshops 2013: 741-750 - [c3]Xia Zhang, Jinyu Zhan, Wei Jiang, Yue Ma:
A Vulnerability Optimization Method for Security-Critical Real-Time Systems. NAS 2013: 215-221 - 2012
- [c2]Jinyu Zhan, Shan Lu, Guowu Yang:
Improved Calculation Scheme of Structure Matrix of Boolean Network Using Semi-tensor Product. ICICA (1) 2012: 242-248
2000 – 2009
- 2004
- [c1]Jinyu Zhan, Nan Sang, Guangze Xiong:
Formal Co-verification for SoC Design with Colored Petri Net. ICESS 2004: 188-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint