Zhenkai Zhang

ORCID: 0000-0002-7934-7773
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Real-Time Systems Scheduling
  • Embedded Systems Design Techniques
  • Parallel Computing and Optimization Techniques
  • Real-time simulation and control systems
  • Security and Verification in Computing
  • Distributed systems and fault tolerance
  • Radiation Effects in Electronics
  • Advanced Malware Detection Techniques
  • Seismology and Earthquake Studies
  • Rock Mechanics and Modeling
  • Alzheimer's disease research and treatments
  • Landslides and related hazards
  • Gut microbiota and health
  • Cryptographic Implementations and Security
  • Saffron Plant Research Studies
  • Genomics, phytochemicals, and oxidative stress
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Software Engineering Research
  • Geochemistry and Elemental Analysis
  • Geological and Geophysical Studies
  • Drug-Induced Hepatotoxicity and Protection
  • Control and Stability of Dynamical Systems
  • Underwater Acoustics Research
  • Software Testing and Debugging Techniques
  • Speech and Audio Processing

Henan Bioengineering Technology Research Center
2023-2024

First Affiliated Hospital of Henan University
2023-2024

Shanghai Institute of Geological Survey
2024

China Geological Survey
2020

Shandong University of Science and Technology
2020

Vanderbilt University
2011-2019

Texas Tech University
2019

Integrated Software (United States)
2013-2017

Alzheimer's disease (AD) is a progressive neurodegenerative for which there lack of effective therapeutic drugs. There great potential natural products to be used in the development anti-AD P-coumaric acid (PCA), small molecule phenolic widely distributed plant kingdom, has pharmacological effects such as neuroprotection, but its mechanism not been fully elucidated. In current study, we investigated PCA intervention Aβ25-35-induced AD model using gut microbiomics and serum metabolomics...

10.1016/j.biopha.2023.115825 article EN Biomedicine & Pharmacotherapy 2023-11-02

Designing cyber-physical systems (CPS) is challenging due to the tight interactions between software, network/platform, and physical components. A co-simulation method valuable enable early system evaluation. In this paper, a framework that considers interacting CPS components for design of time-triggered (TT) proposed. Virtual prototyping core proposed framework. network/platform model in SystemC forms backbone virtual prototyping, which bridges control software environment. The consists...

10.1145/2502524.2502541 article EN 2013-04-08

The systematic design of automotive control applications is a challenging problem due to lack understanding the complex and tight interactions that often manifest during integration components from phase with software generation deployment on actual platform/network. In order address this challenge, we present methodology toolchain using well-defined models integrate various phases specific emphasis restricting such as timing, deployment, quantization. We an experimental platform for...

10.1155/2013/678016 article EN cc-by Journal of Control Science and Engineering 2013-01-01

The rowhammer bug belongs to software-induced hardware faults, and has posed great security challenges numerous systems. On x86, many approaches triggering the have been found; yet, due several different reasons, number of discovered on ARM is limited. In this paper, we revisit problem how trigger ARM-based devices by carefully investigating whether it possible translate original x86-oriented ARM. We provide a thorough study unprivileged ARMv8-A cache maintenance instructions give two...

10.1145/3266444.3266454 article EN 2018-01-15

The Bayan Har Group in Quanshuigou area of the northern Tibetan Plateau is regionally subdivided into three litho‐stratigraphic units, namely, upper, middle, and lower formations. In this study, we report geochemical data for fine‐grained sandstones from upper formation aiming to constrain their source weathering, provenance, palaeoenvironment, tectonic setting. exhibit similar contents SiO 2 Al O 3 relative continental crust (UCC) Post‐Archean Australian Shale classified as wacke on log...

10.1002/gj.3743 article EN Geological Journal 2020-01-08

Cache-related preemption delay (CRPD) analysis is crucial when designing embedded control systems that employ preemptive scheduling. CRPD for single-level caches has been studied extensively based on useful cache blocks (UCBs). As high-performance processors are increasingly used, which often equipped with multi-level caches, hierarchies also needs to be investigated. Recently, an approach proposed estimate non-inclusive caches. Since inclusive commonly especially in some multi-core...

10.1145/2968478.2968481 article EN 2016-10-01

When designing hard real-time embedded systems, it is required to estimate the worst-case execution time (WCET) of each task for schedulability analysis. Precise cache persistence analysis can significantly tighten WCET estimation, especially when program has many loops. Methods should safely and precisely classify memory references as persistent. Existing safe approaches suffer from multiple sources pessimism may not provide precise results. In this paper, we first identify some that two...

10.1145/2670529.2754967 article EN 2015-05-26

In this paper, we investigate how to soundly analyze multi-level caches that employ write-back policy at each level for worst-case execution time (WCET) estimation. To the best of our knowledge, there is only one existing approach dealing with write backs in cache analysis. However, as shown not sound. order handle backs, a level, need consider whether memory block potentially dirty and when such may be evicted from cache. end, introduce attribute into persistence analysis tracking blocks,...

10.1145/3139258.3139269 article EN 2017-10-04

Most existing multiprocessor schedulability analysis assumes zero cost for preemptions and migrations. In order those to be correct, execution time estimations are often inflated by a certain (pessimistic) factor, leading severe waste of computing resource. this paper, novel Global Earliest Deadline First (GEDF) test is proposed, where Cache-Related Preemption Delay (CRPD) separately modeled integrated. Specifically, multiple analyses estimating CRPD bounds conducted based on the refined...

10.1109/trustcom/bigdatase/icess.2017.317 article EN 2017-08-01

Cyber-Physical Systems (CPS) have been increasingly subject to cyber-attacks including code injection attacks. Zero day attacks further exasperate the threat landscape by requiring a shift defense in depth approaches. With tightly coupled nature of cyber components with physical domain, these potential cause significant damage if safety-critical applications such as automobiles are compromised. Moving target techniques instruction set randomization (ISR) commonly proposed address types...

10.1145/3190619.3190636 article EN 2018-04-10

Cyber-physical systems (CPS), such as automotive systems, are very difficult to design due the tight interactions between physical dynamics, computational dynamics and communication networks. In addition, evaluation of these at early stages is crucial challenging. Model-based (MBD) approaches have been applied in order manage complexities interactions. this paper, we present a case study demonstrate systematic design, analysis an integrated control system. The system composed two...

10.1109/med.2013.6608766 article EN 2013-06-01

As the number of cores and utilization system are increasing quickly, shared resources like caches interfering tasks' execution behaviors more heavily. In order to achieve resource efficiency in both temporal spatial domains for multi-core real-time systems, should be taken into consideration when performing partitions. this paper, partitioned Earliest Deadline First (EDF) scheduling on a preemptive platform is considered. We propose new model that covers inter-task cache interference...

10.1109/rtss.2017.00054 article EN 2017-12-01

Non-control data attacks have become widely popular for circumventing authentication mechanisms in websites, servers, and personal computers. Moreover, the context of Cyber-Physical Systems (CPS) can be executed against not only but also safety. With tightly coupled nature between cyber components physical dynamics, any unauthorized change to safety-critical variables may cause damage or even catastrophic consequences. Moving target defense (MTD) techniques such as space randomization (DSR)...

10.1145/3314058.3314064 article EN 2019-04-01

In many multi-core architectures, inclusive shared caches are used to reduce cache coherence complexity. However, the enforcement of inclusion property can cause invalidation memory blocks at higher levels. order ensure safety, analysis hierarchies with for worst-case execution time (WCET) estimation is typically based on conservative decisions. Thus, may not be tight. tighten estimation, this paper proposes an approach that more precisely analyze behavior a hierarchy maintaining property....

10.1109/rtas.2015.7108413 article EN 2015-04-01

Gardeniae fructus (GF) is known for its various beneficial effects on cholestatic liver injury (CLI). However, the biological mechanisms through which GF regulates CLI have not been fully elucidated. This study aimed to explore potential of against α-naphthylisothiocyanate (ANIT)-induced CLI. First, HPLC technology was used analyze chemical profile extract. Second, serum biochemical indicators and histopathology were examined. Lastly, metabolomics utilized changes in metabolites clarify...

10.1002/bmc.5961 article EN Biomedical Chromatography 2024-07-25

In this study, taking the Jurassic Lianggaoshan Formation (J 1 l ) tight sandstones in eastern Sichuan Basin as an example, types and well-logging responses of main sedimentological diagenetic facies lacustrine delta-front are investigated based on summarizing sedimentary characteristics reservoir properties. Subsequently, further validation application conducted study area through machine learning. Research results show that J mainly develops subaqueous distributary channels mouth bar sand...

10.3389/feart.2024.1441548 article EN cc-by Frontiers in Earth Science 2024-08-14

Multi-level inclusive caches are often used in multi-core processors to simplify the design of cache coherence protocol. However, use such hierarchies poses great challenges tight worst-case execution time (WCET) estimation due possible invalidation behavior. Traditionally, multi-level analyzed a level-by-level manner, and at each level three analyses (i.e. must, may, persistence) performed separately. At particular level, conservative decisions need be made when behaviors other levels not...

10.1109/rtss.2015.40 article EN 2015-12-01

When designing hard real-time embedded systems, it is required to estimate the worst-case execution time (WCET) of each task for schedulability analysis. Precise cache persistence analysis can significantly tighten WCET estimation, especially when program has many loops. Methods should safely and precisely classify memory references as persistent. Existing safe approaches suffer from multiple sources pessimism may not provide precise results. In this paper, we first identify some that two...

10.1145/2808704.2754967 article EN ACM SIGPLAN Notices 2015-06-04
Coming Soon ...