Follow
Zebo Peng
Zebo Peng
Professor of Computer Systems, Linkoping University
Verified email at liu.se - Homepage
Title
Cited by
Year
On Modeling and Detecting Trojans in Instruction Sets
Y Zhang, A He, J Li, A Rezine, Z Peng, E Larsson, T Yang, J Jiang, H Li
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2024
2024
Multi-Traffic Resource Optimization for Real-Time Applications with 5G Configured Grant Scheduling
Y Pan, R Mahfouzi, S Samii, P Eles, Z Peng
ACM Transactions on Embedded Computing Systems, 2024
2024
Temperature-Aware Design and Optimization of Reliable Cyber-Physical Systems
Z Peng
2023 International Conference on Electrical, Computer and Energy …, 2023
2023
Runtime Resource Management with Multiple-Step-Ahead Workload Prediction
M Niknafs, P Eles, Z Peng
ACM Transactions on Embedded Computing Systems 22 (4), 1-34, 2023
2023
Resource optimization with 5g configured grant scheduling for real-time applications
Y Pan, R Mahfouzi, S Samii, P Eles, Z Peng
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-2, 2023
22023
Parallel Software-Based Self-Testing with Bounded Model Checking for Kilo-Core Networks-on-Chip
Y Zhang, PF Ji, PW Zhu, Z Peng, HW Li, JH Jiang
Journal of Computer Science and Technology 38 (2), 405-421, 2023
2023
千核片上网络中采用有界模型检验的并行指令级自测试方法
张颖, 季鹏飞, 朱潘玮, 李华伟, 江建慧
计算机科学技术学报 38 (2), 405-421, 2023
2023
BMC-Based Temperature-Aware SBST for Worst-Case Delay Fault Testing Under High Temperature
Y Zhang, Y Ding, Z Peng, H Li, M Fujita, J Jiang
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 30 (11 …, 2022
52022
Symbolic identification of shared memory based bank conflicts for GPUs
A Horga, A Rezine, S Chattopadhyay, P Eles, Z Peng
Journal of Systems Architecture 127, 102518, 2022
72022
Time-triggered scheduling for time-sensitive networking with preemption
Y Zhou, S Samii, P Eles, Z Peng
2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC), 262-267, 2022
92022
Automotive industry
HOWTOR TO
SYNTHESIS, 2022
2022
Secure cloud control using verifiable computation
R Mahfouzi, A Aminifar, S Samii, P Eles, Z Peng
2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS …, 2021
22021
Reliability-aware scheduling and routing for messages in time-sensitive networking
Y Zhou, S Samii, P Eles, Z Peng
ACM Transactions on Embedded Computing Systems (TECS) 20 (5), 1-24, 2021
322021
ASIL-decomposition based routing and scheduling in safety-critical time-sensitive networking
Y Zhou, S Samii, P Eles, Z Peng
2021 IEEE 27th Real-Time and Embedded Technology and Applications Symposium …, 2021
162021
Verifying safety of parameterized heard-of algorithms
Z Ganjei, A Rezine, P Eles, Z Peng
Networked Systems: 8th International Conference, NETYS 2020, Marrakech …, 2021
12021
A deterministic-path routing algorithm for tolerating many faults on very-large-scale network-on-chip
Y Zhang, X Hong, Z Chen, Z Peng, J Jiang
ACM Transactions on Design Automation of Electronic Systems (TODAES) 26 (1 …, 2020
92020
Genetic algorithm based estimation of non–functional properties for GPGPU programs
A Horga, S Chattopadhyay, P Eles, Z Peng
Journal of Systems Architecture 103, 101697, 2020
22020
Breaking silos to guarantee control stability with communication over ethernet TSN
R Mahfouzi, A Aminifar, S Samii, A Rezine, P Eles, Z Peng
IEEE Design & Test 38 (5), 48-56, 2020
92020
Butterfly attack: Adversarial manipulation of temporal properties of cyber-physical systems
R Mahfouzi, A Aminifar, S Samii, M Payer, P Eles, Z Peng
2019 IEEE Real-Time Systems Symposium (RTSS), 93-106, 2019
152019
Security-aware routing and scheduling for control applications on Ethernet TSN networks
R Mahfouzi, A Aminifar, S Samii, P Eles, Z Peng
ACM Transactions on Design Automation of Electronic Systems (TODAES) 25 (1 …, 2019
332019
The system can't perform the operation now. Try again later.
Articles 1–20