default search action
Zhiqiang Lin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Zhiqiang Lin 0001 — Ohio State University, Columbus, OH, USA
- Zhiqiang Lin 0002 — Guangzhou University, Guangzhou, China
- Zhiqiang Lin 0003 — Xiamen University, China
- Zhiqiang Lin 0004 — Shenzhen University, China
- Zhiqiang Lin 0005 — Ningbo University, Ningbo, China
- Zhiqiang Lin 0006 — Chongqing University of Posts and Telecommunications, Chongqing, China
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c71]Shimpei Fukuoka, Masayuki Uchiyama, Geunsook Park, Alan Chih-Wei Hsiung, Mourad Daoudi, Zhiqiang Lin, Vincent C. Venezia, Lindsay A. Grant:
A 2.2um three-wafer stacked back side illuminated voltage domain global shutter CMOS image sensor. Imaging Sensors and Systems 2023: 1-5 - 2022
- [c70]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [i7]Ronny Ko, Chuan Xiao, Makoto Onizuka, Yihe Huang, Zhiqiang Lin:
Ultraverse: Efficient Retroactive Operation for Attack Recovery in Database Systems and Web Frameworks. CoRR abs/2211.05327 (2022) - 2021
- [j27]Zhiqiang Lin, Taorong Qiu, Ping Liu, Lingyun Zhang, Siwei Zhang, Zhendong Mu:
Fatigue driving recognition based on deep learning and graph neural network. Biomed. Signal Process. Control. 68: 102598 (2021) - [j26]Kaiqing Huang, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. Secur. Commun. Networks 2021: 8872699:1-8872699:22 (2021) - [c69]Yechuan Bi, Jianshan Peng, Zhiqiang Lin:
Data flow sensitive driver vulnerability mining method. EITCE 2021: 1263-1268 - [c68]Ronghua Xu, Hefeng Meng, Zhiqiang Lin, Yonghui Xu, Lizhen Cui, Jun Lin:
Credit Default Prediction via Explainable Ensemble Learning. ICCSE 2021: 81-87 - [c67]Jiancheng Zhang, Xiao Yang, Hefeng Meng, Zhiqiang Lin, Yonghui Xu, Lizhen Cui:
A Survey on Knowledge Enhanced EHR Data Mining. ICCSE 2021: 124-131 - [c66]Hefeng Meng, Zhiqiang Lin, Fan Yang, Yonghui Xu, Lizhen Cui:
Knowledge Distillation In Medical Data Mining: A Survey. ICCSE 2021: 175-182 - [c65]Xiaowei Li, Hui Shu, Yi Zhai, Zhiqiang Lin:
A Method for Resume Information Extraction Using BERT-BiLSTM-CRF. ICCT 2021: 1437-1442 - [c64]Zhiqiang Lin:
Keynote: Uncovering Vulnerabilities in Bluetooth Devices with Automated Binary Analysis. PerCom Workshops 2021: 545 - [c63]Paul Muntean, Richard Viehoever, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
iTOP: Automating Counterfeit Object-Oriented Programming Attacks. RAID 2021: 162-176 - [c62]Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, Jim Hao Chen:
Automatic Policy Generation for Inter-Service Access Control of Microservices. USENIX Security Symposium 2021: 3971-3988 - [e3]Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8 [contents] - [i6]Cheng Zhang, Yunze Pan, Yunqi Zhang, Adam C. Champion, Zhaohui Shen, Dong Xuan, Zhiqiang Lin, Ness B. Shroff:
WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic. CoRR abs/2102.11171 (2021) - 2020
- [j25]Qiaoyang Li, Guiming Chen, Lingliang Xu, Zhiqiang Lin, Liyao Zhou:
An Improved Model for Effectiveness Evaluation of Missile Electromagnetic Launch System. IEEE Access 8: 156615-156633 (2020) - [j24]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system. EURASIP J. Wirel. Commun. Netw. 2020(1): 152 (2020) - [j23]Lingyun Zhang, Taorong Qiu, Zhiqiang Lin, Shuli Zou, Xiaoming Bai:
Construction and Application of Functional Brain Network Based on Entropy. Entropy 22(11): 1234 (2020) - [c61]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. ACSAC 2020: 466-479 - [c60]Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin:
On Design of Blockchain-based Transport Scheme. BSCI 2020: 214-215 - [c59]Jaehyun Han, Zhiqiang Lin, Donald E. Porter:
On the Effectiveness of Behavior-Based Ransomware Detection. SecureComm (2) 2020: 120-140 - [c58]Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. TPS-ISA 2020: 107-117 - [c57]Raul Quinonez, Jairo Giraldo, Luis E. Salazar, Erick Bauman, Alvaro A. Cárdenas, Zhiqiang Lin:
SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. USENIX Security Symposium 2020: 895-912
2010 – 2019
- 2019
- [j22]Heng Du, Zhiqiang Lin, Yuan Zhang, Hui Chen, Zhimin Xu:
Improved Migration Genetic Algorithm Optimization for Variable-Speed Falling Trajectory of Mobile Crossbeam in Composite Hydraulic Press With Pressure Shock. IEEE Access 7: 39459-39473 (2019) - [c56]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. ACSAC 2019: 584-597 - [c55]Huibo Wang, Pei Wang, Yu Ding, Mingshen Sun, Yiming Jing, Ran Duan, Long Li, Yulong Zhang, Tao Wei, Zhiqiang Lin:
Towards Memory Safe Enclave Programming with Rust-SGX. CCS 2019: 2333-2350 - [c54]Yuzhong Liu, Zhiqiang Lin, Li Li, Hualiang Li, Yali Shen:
Effects of Extremely Low Frequency Electromagnetic Fields Exposure in an Informationalized Perspective. DPTA 2019: 1191-1201 - [c53]Xing Li, Yan Chen, Zhiqiang Lin:
Towards Automated Inter-Service Authorization for Microservice Applications. SIGCOMM Posters and Demos 2019: 3-5 - [e2]Lorenzo Cavallaro, Johannes Kinder, Adam Doupé, Zhiqiang Lin:
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation, CCS 2019, London, United Kingdom, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6834-6 [contents] - [e1]Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis:
Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings. Lecture Notes in Computer Science 11723, Springer 2019, ISBN 978-3-030-30214-6 [contents] - [i5]Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing Control Flow Integrity with LLVM-CFI. CoRR abs/1910.01485 (2019) - 2018
- [j21]Haobin Shi, Zhiqiang Lin, Kao-Shing Hwang, Shike Yang, Jialin Chen:
An Adaptive Strategy Selection Method With Reinforcement Learning for Robotic Soccer Games. IEEE Access 6: 8376-8386 (2018) - [j20]Zongxiang Yi, Zhiqiang Lin, Lishan Ke:
A generic method to construct zero-difference balanced functions. Cryptogr. Commun. 10(4): 591-609 (2018) - [j19]Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang:
Fast construction of binary ring FCSRs for hardware stream ciphers. Des. Codes Cryptogr. 86(4): 939-953 (2018) - [j18]Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin:
A review: The effects of imperfect data on incremental decision tree. Int. J. Inf. Commun. Technol. 12(1/2): 162-174 (2018) - [j17]Haobin Shi, Zhiqiang Lin, Shuge Zhang, Xuesi Li, Kao-Shing Hwang:
An adaptive decision-making method with fuzzy Bayesian reinforcement learning for robot soccer. Inf. Sci. 436-437: 268-281 (2018) - [j16]Vincent C. Venezia, Alan Chih-Wei Hsiung, Wu-Zang Yang, Yuying Zhang, Cheng Zhao, Zhiqiang Lin, Lindsay A. Grant:
Second Generation Small Pixel Technology Using Hybrid Bond Stacking. Sensors 18(2): 667 (2018) - [c52]Chao Zhang, Weiliang Yin, Zhiqiang Lin:
Boost Symbolic Execution Using Dynamic State Merging and Forking. QuASoQ@APSEC 2018: 14-21 - [c51]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c50]Erick Bauman, Huibo Wang, Mingwei Zhang, Zhiqiang Lin:
SGXElide: enabling enclave code secrecy via self-modification. CGO 2018: 75-86 - [c49]Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. RAID 2018: 423-444 - [c48]Jiaxi Wu, Xiaotong Lin, Zhiqiang Lin, Yi Tang:
A Security Concern About Deep Learning Models. SciSec 2018: 199-206 - [c47]Manish Bhatt, Irfan Ahmed, Zhiqiang Lin:
Using Virtual Machine Introspection for Operating Systems Security Education. SIGCSE 2018: 396-401 - [c46]Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, Tongping Liu:
Guarder: A Tunable Secure Allocator. USENIX Security Symposium 2018: 117-133 - 2017
- [j15]Zhiqiang Lin, Dongdai Lin, Dingyi Pei:
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications. Cryptogr. Commun. 9(4): 431-443 (2017) - [j14]Yuyin Yu, Lishan Ke, Zhiqiang Lin, Qiuyan Wang:
Permutation Polynomials over Zpn and Their Randomness. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 913-915 (2017) - [c45]Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan:
SGX-Log: Securing System Logs With SGX. AsiaCCS 2017: 19-30 - [c44]Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan:
SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors. CCS 2017: 1211-1228 - [c43]Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu:
FreeGuard: A Faster Secure Heap Allocator. CCS 2017: 2389-2403 - [c42]Taesoo Kim, Zhiqiang Lin, Chia-Che Tsai:
CCS'17 Tutorial Abstract / SGX Security and Privacy. CCS 2017: 2613-2614 - [c41]Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat Kantarcioglu, Bhavani Thuraisingham:
Securing Data Analytics on SGX with Randomization. ESORICS (1) 2017: 352-369 - [c40]Yangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin:
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults. RAID 2017: 357-380 - [i4]Ashish Kundu, Zhiqiang Lin, Joshua Hammond:
Energy Attacks on Mobile Devices. CoRR abs/1704.04464 (2017) - [i3]Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu:
FreeGuard: A Faster Secure Heap Allocator. CoRR abs/1709.02746 (2017) - 2016
- [j13]Juan Caballero, Zhiqiang Lin:
Type Inference on Executables. ACM Comput. Surv. 48(4): 65:1-65:35 (2016) - [c39]Yufei Gu, Zhiqiang Lin:
Derandomizing Kernel Address Space Layout for Memory Introspection and Forensics. CODASPY 2016: 62-72 - [c38]Xinyi Yang, Haobin Shi, Shike Yang, Zhiqiang Lin:
Load balancing scheduling algorithm for storage system based on state acquisition and dynamic feedback. ICIA 2016: 1737-1742 - [c37]Erick Bauman, Zhiqiang Lin:
A Case for Protecting Computer Games With SGX. SysTEX@Middleware 2016: 4:1-4:6 - [c36]Junyuan Zeng, Yangchun Fu, Zhiqiang Lin:
Automatic Uncovering of Tap Points from Kernel Executions. RAID 2016: 49-70 - [c35]Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang:
Detecting Stack Layout Corruptions with Robust Stack Unwinding. RAID 2016: 71-94 - 2015
- [j12]Erick Bauman, Gbadebo Ayoade, Zhiqiang Lin:
A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions. ACM Comput. Surv. 48(1): 10:1-10:33 (2015) - [j11]Zhiqiang Lin, Lishan Ke, Dongdai Lin, Jian Gao:
On the LFSRization of a Class of FCSR Automata. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 434-440 (2015) - [j10]Zhiqiang Lin:
On two circuit configurations of non-linear feedback shift registers. Int. J. Inf. Commun. Technol. 7(2/3): 185-201 (2015) - [j9]Zhusong Liu, Hongyang Yan, Zhiqiang Lin, Lingling Xu:
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure. J. Univers. Comput. Sci. 21(3): 454-472 (2015) - [j8]Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin:
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution. IEEE Trans. Dependable Secur. Comput. 12(5): 557-570 (2015) - [j7]Dingyi Pei, Zhiqiang Lin, Xiaolei Zhang:
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers. IEEE Trans. Inf. Theory 61(5): 2942-2951 (2015) - [c34]Seung-Hun Kim, Lei Xu, Ziyi Liu, Zhiqiang Lin, Won Woo Ro, Weidong Shi:
Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization. DSN 2015: 251-262 - [c33]Erick Bauman, Yafeng Lu, Zhiqiang Lin:
Half a Century of Practice: Who Is Still Storing Plaintext Passwords? ISPEC 2015: 253-267 - [c32]Junyuan Zeng, Zhiqiang Lin:
Towards Automatic Inference of Kernel Object Semantics from Binary Code. RAID 2015: 538-561 - [c31]Yangchun Fu, Zhiqiang Lin, David Brumley:
Automatically deriving pointer reference expressions from binary code for memory dump analysis. ESEC/SIGSOFT FSE 2015: 614-624 - [c30]Jin Chen, Haibo Chen, Erick Bauman, Zhiqiang Lin, Binyu Zang, Haibing Guan:
You Shouldn't Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps. USENIX Security Symposium 2015: 657-690 - [c29]Junyuan Zeng, Yangchun Fu, Zhiqiang Lin:
PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework. VEE 2015: 147-160 - [i2]Zhiqiang Lin, Dingyi Pei, Dongdai Lin:
Construction of Transition Matrices for Binary FCSRs. IACR Cryptol. ePrint Arch. 2015: 1181 (2015) - 2014
- [j6]Zhiqiang Lin:
Clock-controlled generators with large period output sequences. Int. J. Grid Util. Comput. 5(4): 278-285 (2014) - [j5]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin:
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting. IEEE Trans. Cloud Comput. 2(4): 380-394 (2014) - [c28]Lishan Ke, Zhiqiang Lin:
Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences. 3PGCIC 2014: 386-389 - [c27]Qian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin:
MACE: high-coverage and robust memory analysis for commodity operating systems. ACSAC 2014: 196-205 - [c26]Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin:
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. DATE 2014: 1-6 - [c25]David I. Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin:
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification. ESORICS (2) 2014: 237-256 - [c24]Alireza Saberi, Yangchun Fu, Zhiqiang Lin:
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization. NDSS 2014 - [c23]David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan:
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. NDSS 2014 - [c22]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. RAID 2014: 22-45 - [c21]Swarup Chandra, Zhiqiang Lin, Ashish Kundu, Latifur Khan:
Towards a Systematic Study of the Covert Channel Attacks in Smartphones. SecureComm (1) 2014: 427-435 - [c20]Yangchun Fu, Junyuan Zeng, Zhiqiang Lin:
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management. USENIX ATC 2014: 85-96 - [c19]Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy:
Preventing Cryptographic Key Leakage in Cloud Virtual Machines. USENIX Security Symposium 2014: 703-718 - 2013
- [j4]Yangchun Fu, Zhiqiang Lin:
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. ACM Trans. Inf. Syst. Secur. 16(2): 7 (2013) - [c18]Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin:
Manipulating semantic values in kernel data structures: Attack assessments and implications. DSN 2013: 1-12 - [c17]Zhiqiang Lin:
The Transformation from the Galois NLFSR to the Fibonacci Configuration. EIDWT 2013: 335-339 - [c16]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization. ICDCS 2013: 112-123 - [c15]Zhipeng Cai, Zhiqiang Lin:
Message from the IPCCC 2013 technical program chairs. IPCCC 2013: 1 - [c14]Ziyi Liu, Jong-Hyuk Lee, Junyuan Zeng, Yuanfeng Wen, Zhiqiang Lin, Weidong Shi:
CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAM. ISCA 2013: 392-403 - [c13]Yangchun Fu, Zhiqiang Lin:
EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery. VEE 2013: 97-110 - 2012
- [j3]Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. Digit. Investig. 9(Supplement): S108-S117 (2012) - [c12]Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
Automatic generation of vaccines for malware immunization. CCS 2012: 1037-1039 - [c11]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin:
OS-Sommelier: memory-only operating system fingerprinting in the cloud. SoCC 2012: 5 - [c10]Yangchun Fu, Zhiqiang Lin:
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. IEEE Symposium on Security and Privacy 2012: 586-600 - 2011
- [i1]Zhiqiang Lin, Dingyi Pei:
Constructing a Diversified FCSR with a Given Connection Integer. IACR Cryptol. ePrint Arch. 2011: 358 (2011)
2000 – 2009
- 2009
- [c9]Lijuan Duan, Zhiqiang Lin, Jun Miao, Yuanhua Qiao:
A Method of Human Skin Region Detection Based on PCNN. ISNN (3) 2009: 486-493 - [c8]Tielei Wang, Tao Wei, Zhiqiang Lin, Wei Zou:
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. NDSS 2009 - 2008
- [j2]Zhiqiang Lin, Michael W. Hoffman, Nathan Schemm, Walter D. Leon-Salas, Sina Balkir:
A CMOS Image Sensor for Multi-Level Focal Plane Image Decomposition. IEEE Trans. Circuits Syst. I Regul. Pap. 55-I(9): 2561-2572 (2008) - [c7]Zhiqiang Lin, Michael W. Hoffman, Walter D. Leon-Salas, Nathan Schemm, Sina Balkir:
A CMOS image sensor with focal plane SPIHT image compression. ISCAS 2008: 2134-2137 - [c6]Zhiqiang Lin, Xiangyu Zhang:
Deriving input syntactic structure from execution. SIGSOFT FSE 2008: 83-93 - 2007
- [c5]Zhiqiang Lin, Michael W. Hoffman, Walter D. Leon-Salas, Nathan Schemm, Sina Balkir:
A CMOS Front-End for a Lossy Image Compression Sensor. ISCAS 2007: 2838-2841 - 2006
- [c4]Zhiqiang Lin, Bing Mao, Li Xie:
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. ARES 2006: 348-357 - [c3]Zhiqiang Lin, Michael W. Hoffman, Walter D. Leon-Salas, Nathan Schemm, Sina Balkir:
Effects of charge-based computation non-idealities on CMOS image compression sensors. ISCAS 2006 - [c2]Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. ISC 2006: 17-31 - 2005
- [j1]Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:
A policy flexible architecture for secure operating system. ACM SIGOPS Oper. Syst. Rev. 39(3): 24-33 (2005) - [c1]Zhiqiang Lin, Michael W. Hoffman, Walter D. Leon-Salas, Nathan Schemm, Sina Balkir:
A CMOS image sensor for focal plane decomposition. ISCAS (5) 2005: 5322-5325
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint