Welcome to
ZHENG YUE WEBSITE
Dr. Yue Zheng obtained her Ph.D. degree from NTU under the supervision of Professor Chip Hong Chang in 2020 and then worked as a Research Fellow at NTU till 2023. She was a Visiting Scholar at Kyoto University in 2019. Dr. Zheng has published more than 20 research papers in Top-tier Journals/Transactions including TIFS, TDSC, TIE, TCAS-I or IEEE International Conferences and published 1 US patent as the first inventor.
Dr. Zheng is serving as the Associate Editor of IEEE TCAS-II, and she is serving or has served as the TPC (Technical Program Committee), RCM (Review Committee Member), PhD Forum Chair, Track/Session Chair and Special Session Organizer of more than 10 IEEE International Conferences. Dr. Zheng received the NTU Women in Engineering, Science, and Technology (WiEST) conference grant award in 2021.
2022-2023 Transactions on Circuits and Systems II: Express Briefs (TCAS-II)
2023-Present IEEE Information Forensics and Security Technical Committee (IFS-TC)
2021-Present IEEE VLSI Systems and Applications Technical Committee (VSA-TC)
2021-2023 RCM of IEEE Int. Symp. Circuits and Systems (ISCAS)
2023 TPC of Design Automation Conference (DAC)
2023 TPC of Hardware and Architectural Support for Security and Privacy (HASP)
2023 TPC of IEEE Int. Symp. Hardware Oriented Security and Trust (HOST)
2021-2023 TPC of SECUREWARE
2023 IEEE Int. Symp. Embedded Multicore/Many-core Systems-on-Chip (MCSoC)
2022 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)
2022 IEEE Int. Conf. Artificial Intelligence Circuits and Systems (AICAS)
2021 IFIP/IEEE Int. Conf. Very Large Scale Integration (VLSI-SoC)
2022 IEEE Int. Symp. Circuits and Systems (ISCAS)
2022-2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)
With the boom of technologies such as IoT and AI, security is increasingly becoming a requirement rather than an option. Given the completely different attack surfaces and the physical constraints of smart IoT devices, the direct adoption of conventional cyber-security solutions is misleading. Lightweight security solutions that provide the root of trust from hardware and comprehensive protections from data sources, transmission channels, processing, and user interactions are urged. We are interested in investigating the security and privacy vulnerabilities in smart IoT systems and developing corresponding countermeasures. In particular, we are interested at
1. Hardware security primitives, including physical unclonable functions, true random number generators, radio frequency fingerprint, etc.
2. Lightweight end-to-end security design for smart systems, including mutual authentication and key exchange protocols, group key protocols, etc.
3. Neural network security and privacy: attacks and defenses, including adversarial attacks, backdoor attacks, model IP protections, etc.
Journals (* corresponding author):
[10]. C. Xu, W. Liu, Y. Zheng, S. Wang, and C. H. Chang, “An imperceptible data augmentation based blackbox clean-label backdoor attack on deep neural networks”, IEEE Trans. Circuit. Syst. Regular paper (TCAS‑I, JCR-Q1), Jul. 2023 (To appear)
[9]. Y. Cao, W. Liu, Y. Zheng*, S. Chen, J. Ye, L. Qian, and C. H. Chang, “A new reconfigurable true random number generator and physical unclonable function unified chip with on‑chip auto‑calibration,” IEEE Trans. Circuit. Syst. Regular paper (TCAS‑I), Sept. 2023 (To appear)
[8]. Y. Zheng, S. Wang, and C. H. Chang, “A DNN fingerprint for non‑repudiable model ownership identification and piracy detection,” IEEE Trans. Inf. Forensics Secur. (TIFS, CCF‑A, JCR-Q1), July 2022
[7]. Y. Zheng, W. Liu, C. Gu, and C. H. Chang, “PUF‑based mutual authentication and key exchange protocol for peer-to-peer IoT applications,” IEEE Trans. Dependable Secure Comput. (TDSC, CCF‑A, JCR-Q1), July 2022
[6]. Y. Cao, X. Zhao, W. Zheng, Y. Zheng, and C. H. Chang, “A new energy‑efficient and high throughput two‑phase multi‑bit per cycle ring oscillator‑based true random number generator,” IEEE Trans. Circuit. Syst. Regular paper (TCAS‑I, JCR-Q1), pp. 272–283, Jan. 2022
[5]. Y. Zheng, X. Zhao, T. Sato, Y. Cao, and C. H. Chang, “Ed‑PUF: Event‑driven physical unclonable function for camera authentication in reactive monitoring system,” IEEE Trans. Inf. Forensics Secur. (TIFS, CCF‑A, JCR-Q1), pp. 2824–2839, Mar. 2020
[4]. Y. Zheng, Y. Cao, and C. H. Chang, “A PUF‑based data‑device hash for tampered image detection and source camera identification,” IEEE Trans. Inf. Forensics Secur. (TIFS, CCF‑A, JCR-Q1), vol. 15, pp. 620–634, Jul. 2019
[3]. A. Cui, C.H. Chang, W. Zhou, Y. Zheng, “A New PUF Based Lock and Key Solution for Secure In-field Testing of Cryptographic Chips,” IEEE Trans. Emerging Topics Comput. (TETC, JCR- Q1), Mar. 2019.
[2]. Y. Zheng, Y. Cao, and C. H. Chang, “UDhashing: Physical unclonable function based user‑ device hash for endpoint authentication,” IEEE Trans. Industrial Electronics (TIE, JCR-Q1), vol. 66, pp. 9559–9570, Jan. 2019
[1]. C. H. Chang, Y. Zheng, and L. Zhang, “A retrospective and a look forward: Fifteen years of physical unclonable function advancement,” IEEE Circuits and Syst. Magazine (CASM, JCR- Q1), vol. 17, no. 3, pp. 32–62, thirdquarter 2017.
Conferences (* corresponding author):
[12]. Y. Zheng, W. Liu, and C. H. Chang, “A lightweight PUF‑based secure group key agreement protocol for wireless sensor networks,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), (Monterey, California, USA), May 2023
[11]. C. Xu, W. Liu, Y. Zheng, S. Wang, and C. H. Chang, “Inconspicuous data augmentation based backdoor attack on deep neural networks,” in Proc. IEEE. Int. System‑On‑Chip Conf. (SOCC), (Belfast, Northern Ireland), Sept. 2022
[10]. S. Wang, C. Xu, Y. Zheng, and C. H. Chang, “A buyer‑traceable DNN model IP protection method against piracy and misappropriation,” in Proc. IEEE Int. Conf. Artificial Intell. Circuits Syst. (AICAS), (Incheon, Korea), Jun. 2022
[9]. Y. Zheng, C.H Chang, “Secure mutual authentication and key-exchange protocol between PUF- embedded IoT endpoints,” in Proc. 2021 IEEE Int. Symp. Circuits and Syst. (ISCAS), Daegu, Korea, May. 2021.
[8]. J.X Soo, Y. Zheng*, C.H Chang, “Live Demonstration: Event-driven physical unclonable function for proactive monitoring system by dynamic vision sensor”, in Proc. 2021 IEEE Int. Symp. Circuits and Syst. (ISCAS), Daegu, Korea, May. 2021.
[7]. B. Wang, X. Zhao, Y. Zheng, C.H Chang, “An in-pixel gain amplifier based event-driven physical unclonable function for CMOS dynamic vision sensors,” in Proc. 2019 IEEE Int. Symp. Circuits and Syst. (ISCAS), Hokkaiddo, Japan, May. 2019.
[6]. Y. Zheng, S. S. Dhabu, and C.H. Chang, “Securing IoT monitoring device using PUF and physical layer authentication,” in Proc. 2018 IEEE Int. Symp. Circuits and Syst. (ISCAS), Florence, May. 2018.
[5]. S. S. Dhabu, Y. Zheng, and C.H. Chang, “Active IC metering of digital signal processing subsystem with two-tier activation for secure split test,” in Proc. 2018 IEEE Int. Symp. Circuits and Syst. (ISCAS), Florence, May. 2018.
[4]. Y. Zheng, Y. Cao, and C.H. Chang, “Facial biohashing based User-Device physical unclonable function for bring your own device system (Invited Paper),” in Proc. IEEE Int. Conf. Consumer Electronics (ICCE 2018), Las Vegas, US, Jan. 2018.
[3]. Y. Cao, C.H Chang, Y. Zheng, X Zhao. “An energy-efficient true random number generator based on current starved ring oscillators,” in Proc. IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), Beijing, China, Oct. 2017.
[2]. C. Q. Liu, Y. Zheng, C.H. Chang, “A new write-contention based dual-port SRAM PUF with multiple response bits per cell,” in Proc. IEEE Int. Symp. Circuits and Systems. (ISCAS 2017), Baltimore, USA, May. 2017.
[1]. Y. Zheng, Y. Cao, and C.H. Chang. “A new event-driven dynamic vision sensor based physical unclonable function for camera authentication in reactive monitoring system,” in Proc. IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), Yilan, Taiwan, Dec. 2016.
Patent & Media Release
[1] Y. Zheng, C. H. Chang, and W. Liu, “PUF‑based Mutual Authentication and Key‑Exchange,” Invention disclosure ref. 2021‑336‑01‑SG PRV, Singapore Provisional Patent Application No. 10202107780Q filed on 15 July 2021 and US Patent Application No: 17/866,332, filed on July 15, 2022, published on Feb. 2, 2023, Publication no. US20230032099A1
[2] “Can BYOD be as Secure as Company-Owned Devices?”, IEEE Xplore Innovation Spotlight, 6. Aug. 2018. [online] https://innovate.ieee.org/innovation-spotlight/biohashing-physical- unclonable-function-byod-authentication-scheme/