Publications
Journals
[J8] Y. Zheng, S. Wang, and C.H. Chang, "A DNN fingerprint for non-repudiable model ownership identification and piracy detection", IEEE Trans. Inf. Forensics, Security (TIFS), Jul. 2022. [link]
[J7] Y. Zheng, W. Liu, C. Gu, and C.H. Chang, "PUF-based mutual authenticaiton and key exchange protocol for peer-to-peer IoT applications", IEEE Trans. Dependable Secure Comput. (TDSC), Jul. 2022. [link]
[J6] Y. Cao, X. Zhao, W. Zheng, Y. Zheng, and C.H. Chang, "A new energy-efficient and high throughput two-phase multi-bit per cycle ring oscillator-based true random number generator", IEEE Trans. Circuit. Syst. Regular paper (TCAS-I), Jan. 2022. [link]
[J4] Y. Zheng, X. Zhao, T. Sato, Y. Cao and C.H. Chang, "Ed-PUF: Event-driven physical unclonable function for camera authentication in reactive monitoring system", IEEE Trans. Inf. Forensics, Security, Mar. 2020. [link]
[J3] Y. Zheng, Y. Cao and C.H. Chang, "A PUF-based data-device hash for tampered image detection and source camera identification", IEEE Trans. Inf. Forensics, Security, Jul. 2019. [link]
[J2] Y. Zheng, Y. Cao and C.H. Chang, "UDhashing: Physical Unclonable Function Based User-Device Hash for Endpoint Authentication", IEEE Trans. Industrial Electronics Jan. 2019. [link]
[J1] A. Cui, C.H. Chang, W. Zhou, Y. Zheng, “A new PUF based lock and key solution for secure in-field testing of cryptographic chips,” IEEE Trans. Emerging Topics in Computing, Mar. 2019. [link]
Magazine
[M1] C.H. Chang, Y. Zheng, and L. Zhang, “A retrospective and a look forward: Fifteen years of physical unclonable function advancement,” IEEE Circuits and Syst. Magazine, vol. 17, no. 3, pp. 32–62, 2017. [link]
Conferences
[C11] C. Xu, W. Liu, Y. Zheng, S. Wang, and C. H. Chang. "Inconspicuous data augmentation based backdoor attack on deep neural networks", in Proc. IEEE Int. System-On-Chip Conf. (SOCC), (Belfast, Northern Ireland), Setp. 2022. [To Appear]
[C10] S. Wang, C.Xu, Y. Zheng, and C. H. Chang. "A buyer-traceable DNN model IP protection method against piracy and misappropriation", in Proc. IEEE Int. Conf. Artificial Intell. Circuits Syst. (AICAS), (Incheon, Korea), Jun. 2022. [Link]
[C9] Y. Zheng, and C. H. Chang. "Secure mutual authentication and key-exchange protocol between PUF-embedded IoT endpoints." in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), (Daegu, Korea), May 2021. [link]
[C8] J. X. Soo, Y. Zheng, and C. H. Chang. "Live Demonstration: Event-driven physical unclonable function for camera authentication in reactive monitoring system", in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), (Daegu, Korea), May 2021. [link] (J.X. Soo is a second year undergraduate under my guidance)
[C7] B. Wang, X. Zhao, Y. Zheng, and C. H. Chang. "An in-pixel gain amplifier based event-driven physical unclonable function for CMOS dynamic vision sensors." in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), (Sapporo, Japan), May 2019. [link]
[C6] Y. Zheng, S. S. Dhabu, and C.H. Chang, “Securing IoT monitoring device using PUF and physical layer authentication,” in Proc. 2018 IEEE Int. Symp. Circuits and Syst. (ISCAS), Florence, May. 2018. [link]
[C5] S. S. Dhabu, Y. Zheng, W. Liu and C.H. Chang, “Active IC Metering of Digital Signal Processing Subsystem with Two-Tier Activation for Secure Split Test,” in Proc. 2018 IEEE Int. Symp. Circuits and Syst. (ISCAS), DOI 10.1109/ISCAS.2018.8351390, Florence, May. 2018. [link]
[C4] Y. Zheng, Y. Cao, and C.H. Chang, "Facial biohashing based User-Device physical unclonable function for bring your own device system (Invited Paper, also featured in IEEE Xplore Innovation Spotlight, titled “Can BYOD be as Secure as Company-Owned Devices” on August 6, 2018, https://innovate.ieee.org/innovation-spotlight/biohashing-physical-unclonable-function-byod-authentication-scheme/)," in Proc. IEEE Int. Conf. Consumer Electronics (ICCE 2018), Las Vegas, US, Jan. 2018. [link]
[C3] C. Q. Liu, Y. Zheng, C.H. Chang, “A new write-contention based dual-port SRAM PUF with multiple response bits per cell,” in Proc. IEEE Int. Symp. Circuits and Systems. (ISCAS 2017), Baltimore, USA, May. 2017. [link]
[C2] Y. Cao, C.H Chang, Y. Zheng, X Zhao. " An energy-efficient true random number generator based on current starved ring oscillators." in Proc. Hardware-Oriented Security and Trust (AsianHOST), Beijing, China, Oct. 2016. [link] (Cisco Best Paper Award Candidate)
[C1] Y. Zheng, Y. Cao, and C.H. Chang. "A new event-driven dynamic vision sensor based physical unclonable function for camera authentication in reactive monitoring system," in Proc. Hardware-Oriented Security and Trust, Yilan, Taiwan, Dec. 2016. [link]