liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Peng, Zebo, Professor
Alternative names
Publications (10 of 295) Show all publications
Jiang, J., Jin, S., Sun, Z., Duan, J., Liu, L., Pan, L. & Peng, Z. (2025). An Efficient Approach for Improving Message Acceptance Rate and Link Utilization in Time-Sensitive Networking. ACM Transactions on Embedded Computing Systems, 24(1), Article ID 1.
Open this publication in new window or tab >>An Efficient Approach for Improving Message Acceptance Rate and Link Utilization in Time-Sensitive Networking
Show others...
2025 (English)In: ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, E-ISSN 1558-3465, Vol. 24, no 1, article id 1Article in journal (Refereed) Published
Abstract [en]

Time-sensitive networking (TSN) is an emerging technology widely used in real-time systems for its high bandwidth and deterministic timing properties. To ensure the deterministic transmission of Time-triggered (TT) messages, a guard band mechanism is employed to prevent interference from other messages, such as Audio-Video Bridging (AVB) and Best-effort (BE) messages, before transmitting the TT messages in TSN. However, this mechanism introduces transmission delays for non-TT messages and bandwidth wastes for the physical links. Another challenge arises from the default First-in-first-out (FIFO) order of incoming messages, resulting in a relatively low acceptance rate for non-TT messages. To address these issues, a hybrid scheduling algorithm based on the min-heap structure (HSMH) is proposed. For AVB messages, HSMH sorts them in ascending style on the basis of deadlines, guaranteeing the earliest deadline message to be sent first. For BE messages, a threshold is designed to diverge them into two queues: a FIFO queue and a STF (shortest-time-first) queue. The former outputs the messages in a FIFO style, while the latter outputs messages in a STF style. All the output order of AVB messages and STF-queue messages are arranged in a min-heap structure. The algorithm can efficiently improve the transmission rate of AVB messages, the sending rate of BE messages, and the overall link utilization. Experimental results demonstrate that the proposed algorithm outperforms existing approaches in all these three aspects.

Place, publisher, year, edition, pages
ACM Digital Library, 2025
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208123 (URN)10.1145/3690638 (DOI)001395721700009 ()2-s2.0-85214559990 (Scopus ID)
Available from: 2024-10-04 Created: 2024-10-04 Last updated: 2025-01-28Bibliographically approved
Sun, Z., Jin, S., Duan, J., Jiang, J. & Peng, Z. (2024). A Relative-Priority Encoding Genetic Algorithm for Integrated Mapping and Scheduling Optimization. In: : . Paper presented at 2024 2nd International Symposium of Electronics Design Automation (ISEDA), Xi'an, China, May 10-13, 2024.
Open this publication in new window or tab >>A Relative-Priority Encoding Genetic Algorithm for Integrated Mapping and Scheduling Optimization
Show others...
2024 (English)Conference paper, Oral presentation only (Other academic)
Abstract [en]

This paper presents a Relative-Priority Genetic Algorithm (RPGA) designed for tackling Integrated Mapping and Scheduling (IMS) problems, frequently encountered in High-Level Synthesis. RPGA features a unique encoding and decoding mechanism specifically crafted for IMS problems, notably those involving OR nodes that denote alternative operation paths. Through comprehensive benchmarking experiments, RPGA demonstrates remarkable superiority in solution quality and convergence speed when compared to established meta-heuristics.

National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208118 (URN)
Conference
2024 2nd International Symposium of Electronics Design Automation (ISEDA), Xi'an, China, May 10-13, 2024
Available from: 2024-10-04 Created: 2024-10-04 Last updated: 2024-10-18Bibliographically approved
Sun, Z., Jin, S., Duan, J., Jiang, J. & Peng, Z. (2024). Integrated Mapping and Scheduling Optimization with Genetic Algorithms based on a Novel Encoding Scheme. In: : . Paper presented at Euromicro Conference on Digital System Design (DSD’24).
Open this publication in new window or tab >>Integrated Mapping and Scheduling Optimization with Genetic Algorithms based on a Novel Encoding Scheme
Show others...
2024 (English)Conference paper, Oral presentation only (Other academic)
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208120 (URN)
Conference
Euromicro Conference on Digital System Design (DSD’24)
Available from: 2024-10-04 Created: 2024-10-04 Last updated: 2024-10-18Bibliographically approved
Pan, Y., Mahfouzi, R., Samii, S., Eles, P. I. & Peng, Z. (2024). Multi-Traffic Resource Optimization for Real-Time Applications with 5G Configured Grant Scheduling. ACM Transactions on Embedded Computing Systems, 23(4), Article ID 63.
Open this publication in new window or tab >>Multi-Traffic Resource Optimization for Real-Time Applications with 5G Configured Grant Scheduling
Show others...
2024 (English)In: ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, E-ISSN 1558-3465, Vol. 23, no 4, article id 63Article in journal (Refereed) Published
Abstract [en]

The fifth-generation (5G) technology standard in telecommunications is expected to support ultra-reliable low latency communication to enable real-time applications such as industrial automation and control. 5G configured grant (CG) scheduling features a pre-allocated periodicity-based scheduling approach, which reduces control signaling time and guarantees service quality. Although this enables 5G to support hard real-time periodic traffics, synthesizing the schedule efficiently and achieving high resource efficiency, while serving multiple communications, are still an open problem. In this work, we study the trade-off between scheduling flexibility and control overhead when performing CG scheduling. To address the CG scheduling problem, we first formulate it using satisfiability modulo theories (SMT) so that an SMT solver can be used to generate optimal solutions. To enhance scalability, we propose two heuristic approaches. The first one as the baseline, Co1, follows the basic idea of the 5G CG scheduling scheme that minimizes the control overhead. The second one, CoU, enables increased scheduling flexibility while considering the involved control overhead. The effectiveness and scalability of the proposed techniques and the superiority of CoU compared to Co1 have been evaluated using a large number of generated benchmarks as well as a realistic case study for industrial automation.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2024
Keywords
5G; URLLC; deterministic periodic traffic; configured grant scheduling; satisfiability modulo theories; resource optimization
National Category
Embedded Systems
Identifiers
urn:nbn:se:liu:diva-207759 (URN)10.1145/3664621 (DOI)001288115200010 ()
Note

Funding Agencies|ELLIIT (Excellence Center at Linkoping-Lund in Information Technology); SSF (Swedish Foundation for Strategic Research) [FUS21-0033]

Available from: 2024-09-20 Created: 2024-09-20 Last updated: 2024-10-10
Zhang, Y., He, A., Li, J., Rezine, A., Peng, Z., Larsson, E., . . . Li, H. (2024). On Modeling and Detecting Trojans in Instruction Sets. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 43(10), 3226-3239
Open this publication in new window or tab >>On Modeling and Detecting Trojans in Instruction Sets
Show others...
2024 (English)In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, ISSN 0278-0070, E-ISSN 1937-4151, Vol. 43, no 10, p. 3226-3239Article in journal (Refereed) Published
Abstract [en]

Amid growing concerns about hardware security, comprehensive security testing has become essential for chip certification. This article proposes a deep-testing method for identifying Trojans of particular concern to middle-to-high-end users, with a focus on illegal instructions. A hidden instruction Trojan can employ a low-probability sequence of normal instructions as a boot sequence, which is followed by an illegal instruction that triggers the Trojan. This enables the Trojan to remain deeply hidden within the processor. It then exploits an intrusion mechanism to acquire Linux control authority by setting a hidden interrupt as its payload. We have developed an unbounded model checking (UMC) technique to uncover such Trojans. The proposed UMC technique has been optimized with slicing based on the input cone, head-point replacement, and backward implication. Our experimental results demonstrate that the presented instruction Trojans can survive detection by existing methods, thus allowing normal users to steal root user privileges and compromising the security of processors. Moreover, our proposed deep-testing method is empirically shown to be a powerful and effective approach for detecting these instruction Trojans.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2024
Keywords
Deep test for security, hidden instruction Trojan (HIT), unbounded model checking (UMC), VLSI test
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-207755 (URN)10.1109/tcad.2024.3389558 (DOI)001319522900007 ()
Note

Funding Agencies|National Key Research and Development Program of China [2020YFB1600201]; National Natural Science Foundation of China (NSFC) [62374114, 62373206, 61974105, 62090024]; Zhejiang Laboratory [2021KC0AB01]

Available from: 2024-09-20 Created: 2024-09-20 Last updated: 2024-10-09
Peng, Z. (2024). Security-Aware Design of Cyber-Physical Systems for Control over the Cloud. In: : . Paper presented at 2024 2nd International Symposium of Electronics Design Automation (ISEDA).
Open this publication in new window or tab >>Security-Aware Design of Cyber-Physical Systems for Control over the Cloud
2024 (English)Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

Modern-day control applications increasingly rely on cyber-physical systems (CPS) to implement advanced functionalities. Notable examples within automotive domains include adaptive cruise control, intelligent navigation, and autonomous driving. Leveraging the cloud's virtually infinite storage and computational power proves to be an efficient strategy for executing these sophisticated control algorithms. However, migrating control computations to the cloud introduces new challenges, notably on security and real-time constraints. We will present an integrated design and optimization methodology tailored for cloud-based control systems. This approach addresses security concerns and other crucial CPS design prerequisites, particularly focusing on ensuring the security and stability mandates of control loops closed over the cloud.

National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208119 (URN)
Conference
2024 2nd International Symposium of Electronics Design Automation (ISEDA)
Available from: 2024-10-04 Created: 2024-10-04 Last updated: 2024-10-04
Niknafs, M., Eles, P. I. & Peng, Z. (2023). Runtime Resource Management with Multiple-Step-Ahead Workload Prediction. ACM Transactions on Embedded Computing Systems, 22(4), Article ID 71.
Open this publication in new window or tab >>Runtime Resource Management with Multiple-Step-Ahead Workload Prediction
2023 (English)In: ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, E-ISSN 1558-3465, Vol. 22, no 4, article id 71Article in journal (Refereed) Published
Abstract [en]

Modern embedded platforms need sophisticated resource managers to utilize their heterogeneous computational resources efficiently. Furthermore, such platforms are subject to fluctuating workloads that are unforeseeable at design time. Predicting the incoming workload could enhance the efficiency of resource management in this situation. But is that the case? And, if so, how substantial is this improvement? Does multiple-step-ahead prediction of the workload contribute to this improvement? How precise must the prediction be to improve decisions rather than cause harm? By proposing a prediction-based resource manager that aims at meeting task deadlines while minimizing energy usage, and by conducting extensive tests, we attempt to provide answers to the aforementioned questions.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2023
Keywords
Heterogeneous architecture, multiple-step-ahead prediction, resource management
National Category
Embedded Systems
Identifiers
urn:nbn:se:liu:diva-196542 (URN)10.1145/3605213 (DOI)001053965300012 ()2-s2.0-85170645262 (Scopus ID)
Note

Funding: Swedish Foundation for Strategic Research (SSF) [FUS21-0033]

Available from: 2023-08-10 Created: 2023-08-10 Last updated: 2025-02-20
Peng, Z. (2023). Temperature-Aware Design and Optimization of Reliable Cyber-Physical Systems. In: : . Paper presented at 2023 International Conference on Electrical, Computer and Energy Technologies (ICECET).
Open this publication in new window or tab >>Temperature-Aware Design and Optimization of Reliable Cyber-Physical Systems
2023 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Cyber-physical systems (CPS) are widely used for safety-critical applications, including automotive electronics and medical equipment, where reliability and performance are important issues to consider. In the meantime, as the feature sizes of VLSI circuits used in CPS continue to shrink, the power density has increased rapidly, causing a significant rise in chip temperatures. These elevated temperatures have an adverse impact on the system's reliability, performance, and power efficiency. Therefore, it is essential to consider thermal effects during the CPS design process, in particular at the system design level. This paper discusses the challenges of designing and optimizing a CPS, with a focus on the interplay between thermal issues and the stringent reliability and real-time requirements demanded by safety-critical CPS applications. Through this discussion, we will explore the various issues related to CPS design and optimization in the context of different thermal problems. We will also present a temperature-aware task scheduling and mapping technique for heterogeneous CPS platforms consisting of microprocessor cores, GPU processors, and FPGA units. By carefully analyzing and considering thermal impacts during the design process, we can ensure that the CPS to be designed meets the high standards required for safety-critical applications.

National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208116 (URN)
Conference
2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)
Available from: 2024-10-04 Created: 2024-10-04 Last updated: 2024-10-04
Zhang, Y., Ding, Y., Peng, Z., Li, H., Fujita, M. & Jiang, J. (2022). BMC-Based Temperature-Aware SBST for Worst-Case Delay Fault Testing Under High Temperature. IEEE Transactions on Very Large Scale Integration (vlsi) Systems, 30(11), 1677-1690
Open this publication in new window or tab >>BMC-Based Temperature-Aware SBST for Worst-Case Delay Fault Testing Under High Temperature
Show others...
2022 (English)In: IEEE Transactions on Very Large Scale Integration (vlsi) Systems, ISSN 1063-8210, E-ISSN 1557-9999, Vol. 30, no 11, p. 1677-1690Article in journal (Refereed) Published
Abstract [en]

This article presents a bounded model checking (BMC)-based temperature-aware software-based self-testing (SBST) technique to test worst case delay faults within the highest temperature range. The BMC-based SBST method first defines the sequential constraint. It develops a sequentially constrained automatic test pattern generation (ATPG) to ensure that the generated delay test patterns can emerge in functional mode. It then uses the processors multiple-level information to reduce the model complexity, avoid aborts due to time-outs during the BMC process, and generate test programs automatically. A temperature-aware SBST method has then been developed to ensure that the test temperature is within the specified range and test the worst case delays under high temperature. Experimental results demonstrate that the proposed technique achieves an extremely high coverage for delay faults and effectively avoids yield loss caused by the overtesting problem. Its test quality also outperforms that of the existing methods. The generated SBST programs are successful and efficient in testing worst case delay faults under high temperature.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2022
Keywords
Delays; Circuit faults; Temperature distribution; Registers; Logic gates; Symbols; Manufacturing; Bounded model checking (BMC); software-based self-testing (SBST); temperature-aware testing; worst case delay faults
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-187362 (URN)10.1109/TVLSI.2022.3186946 (DOI)000829071800001 ()
Note

Funding Agencies|National Key Research and Development Program of China [2020YFB1600201]; National Natural Science Foundation of China (NSFC) [61974105, 62090024, U20A20202]; Zhejiang Laboratory [2021KC0AB01]

Available from: 2022-08-19 Created: 2022-08-19 Last updated: 2023-03-28Bibliographically approved
Horga, A., Rezine, A., Chattopadhyay, S., Eles, P. I. & Peng, Z. (2022). Symbolic identification of shared memory based bank conflicts for GPUs. Journal of systems architecture, 127, Article ID 102518.
Open this publication in new window or tab >>Symbolic identification of shared memory based bank conflicts for GPUs
Show others...
2022 (English)In: Journal of systems architecture, ISSN 1383-7621, E-ISSN 1873-6165, Vol. 127, article id 102518Article in journal (Refereed) Published
Abstract [en]

Graphic processing units (GPUs) are routinely used for general purpose computations to improve performance. To achieve the sought performance gains, care must be invested in fine tuning the way GPU programs interact with the underlying architecture, accounting for the shared memory bank conflicts and the entailed shared memory transactions. Uncovering inputs leading to particular bank conflicts can turn out to be quite hard given the intricacy of the access patterns and their dependence on the inputs. We propose a symbolic execution based framework to systematically uncover shared memory bank conflicts, to propose inputs to realize a given number of shared memory transactions, and to refute the existence of such inputs if the number of shared memory transactions is impossible to achieve during the execution. This allows programmers to more formally reason about the shared memory conflicts and to validate their impact on performance and security. We have implemented our approach and report on our experiments to explore its usefulness towards performance enhancement and quantifying shared memory side-channel leakage in security applications.

Place, publisher, year, edition, pages
Amsterdam, Netherlands: Elsevier, 2022
Keywords
GPU; Shared memory; Formal verification; Performance evaluation; Software security
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-184473 (URN)10.1016/j.sysarc.2022.102518 (DOI)000797269300005 ()
Note

Funding: Swedish Research Council [2017-04194, 2018-05973]; Singapore Ministry of Education (MOE) [MOE2018-T2-1-098]; National Research Foundation (NRF) [NRF2019-NRF-ANR092]

Available from: 2022-04-22 Created: 2022-04-22 Last updated: 2022-06-08Bibliographically approved
Organisations

Search in DiVA

Show all publications