Login / Signup
Zihao Zhan
ORCID
Publication Activity (10 Years)
Years Active: 2016-2024
Publications (10 Years): 18
Top Topics
Image Representation
Reversible Data Hiding
Sliding Mode
Covert Channel
Top Venues
IEEE Symposium on Security and Privacy
CoRR
BigDataSecurity/HPSC/IDS
HOST
</>
Publications
</>
Hanqiu Wang
,
Max Panoff
,
Zihao Zhan
,
Shuo Wang
,
Christophe Bobda
,
Domenic Forte
Programmable EM Sensor Array for Golden-Model Free Run-Time Trojan Detection and Localization.
DATE
(2024)
Haoqi Shan
,
Boyi Zhang
,
Zihao Zhan
,
Dean Sullivan
,
Shuo Wang
,
Yier Jin
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
CoRR
(2024)
Zihao Zhan
,
Yirui Yang
,
Haoqi Shan
,
Hanqiu Wang
,
Yier Jin
,
Shuo Wang
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger.
CoRR
(2024)
Zihao Zhan
,
Yirui Yang
,
Haoqi Shan
,
Hanqiu Wang
,
Yier Jin
,
Shuo Wang
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger.
USENIX Security Symposium
(2024)
Hanqiu Wang
,
Max Panoff
,
Zihao Zhan
,
Shuo Wang
,
Christophe Bobda
,
Domenic Forte
Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization.
CoRR
(2024)
Fengyun Li
,
Shuang Huang
,
Zihao Zhan
,
Yunfei Lu
,
Tian Shen
,
Jianguo Zhou
Optimizing Cabin Wireless Network Signal Coverage with Ray Tracing Method.
BigDataSecurity/HPSC/IDS
(2023)
Shuang Huang
,
Fengyun Li
,
Zihao Zhan
,
Kaiyu Li
,
Wenhao Zhang
,
Jianguo Zhou
DDS-Based Information Interaction System for Ship Cloud Storage Data Center.
BigDataSecurity/HPSC/IDS
(2023)
Lin Li
,
Fengyun Li
,
Zihao Zhan
,
Kaiyu Li
,
Shuang Huang
,
Haike Yang
Research on UUV Rudder Angle Control Method Based on Sliding Mode Control.
BIC-TA (2)
(2023)
Sisheng Liang
,
Zihao Zhan
,
Fan Yao
,
Long Cheng
,
Zhenkai Zhang
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
SP Workshops
(2022)
Haoqi Shan
,
Boyi Zhang
,
Zihao Zhan
,
Dean Sullivan
,
Shuo Wang
,
Yier Jin
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
IEEE Symposium on Security and Privacy
(2022)
Zihao Zhan
,
Zhenkai Zhang
,
Sisheng Liang
,
Fan Yao
,
Xenofon D. Koutsoukos
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
IEEE Symposium on Security and Privacy
(2022)
Zihao Zhan
,
Zhenkai Zhang
,
Xenofon D. Koutsoukos
A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock.
J. Hardw. Syst. Secur.
6 (1) (2022)
Zihao Zhan
,
Wen-Sheng Chen
,
Binbin Pan
,
Bo Chen
Deep Grouped Non-Negative Matrix Factorization Method for Image Data Representation.
ICMLC
(2021)
Wen-Sheng Chen
,
Zihao Zhan
,
Binbin Pan
,
Bo Chen
Class-Based Deep Non-Negative Matrix Factorization Algorithm for Facial Image Representation.
CIS
(2021)
Zihao Zhan
,
Zhenkai Zhang
,
Xenofon D. Koutsoukos
BitJabber: The World's Fastest Electromagnetic Covert Channel.
HOST
(2020)
Zhenkai Zhang
,
Zihao Zhan
,
Daniel Balasubramanian
,
Bo Li
,
Péter Völgyesi
,
Xenofon D. Koutsoukos
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
IEEE Symposium on Security and Privacy
(2020)
Zhenkai Zhang
,
Zihao Zhan
,
Daniel Balasubramanian
,
Xenofon D. Koutsoukos
,
Gabor Karsai
Triggering Rowhammer Hardware Faults on ARM: A Revisit.
ASHES@CCS
(2018)
Dongdong Hou
,
Weiming Zhang
,
Zihao Zhan
,
Ruiqi Jiang
,
Yang Yang
,
Nenghai Yu
Reversible image processing via reversible data hiding.
DSP
(2016)