PUF-FSM: a controlled strong PUF Y Gao, H Ma, SF Al-Sarawi, D Abbott, DC Ranasinghe IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 102 | 2018 |
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices Y Gao, G Li, H Ma, SF Al-Sarawi, O Kavehei, D Abbott, DC Ranasinghe 2016 IEEE International Conference on Pervasive Computing and Communication …, 2016 | 101 | 2016 |
PUF sensor: Exploiting PUF unreliability for secure wireless sensing Y Gao, H Ma, D Abbott, SF Al-Sarawi IEEE Transactions on Circuits and Systems I: Regular Papers 64 (9), 2532-2543, 2017 | 53 | 2017 |
Quantization backdoors to deep learning commercial frameworks H Ma, H Qiu, Y Gao, Z Zhang, A Abuadbba, M Xue, A Fu, J Zhang, ... IEEE Transactions on Dependable and Secure Computing, 2023 | 33 | 2023 |
Dangerous cloaking: Natural trigger based backdoor attacks on object detectors in the physical world H Ma, Y Li, Y Gao, A Abuadbba, Z Zhang, A Fu, H Kim, SF Al-Sarawi, ... arXiv preprint arXiv:2201.08619, 2022 | 31 | 2022 |
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World H Ma, Y Li, Y Gao, Z Zhang, A Abuadbba, A Fu, SF Al-Sarawi, N Surya, ... The 42nd International Symposium on Reliable Distributed Systems (SRDS), 2023 | 22* | 2023 |
A PUF sensor: Securing physical measurements H Ma, Y Gao, O Kavehei, DC Ranasinghe 2017 IEEE International Conference on Pervasive Computing and Communications …, 2017 | 21 | 2017 |
NTD: Non-Transferability enabled Deep Learning Backdoor Detection Y Li, H Ma, Z Zhang, Y Gao, A Abuadbba, M Xue, A Fu, Y Zheng, ... IEEE Transactions on Information Forensics and Security, 2023 | 12 | 2023 |
DeepTheft: Stealing DNN Model Architectures through Power Side Channel Y Gao, H Qiu, Z Zhang, B Wang, H Ma, A Abuadbba, M Xue, A Fu, ... IEEE Symposium on Security and Privacy 2024, 2024 | 10 | 2024 |
Towards a critical evaluation of robustness for deep learning backdoor countermeasures H Qiu, H Ma, Z Zhang, A Abuadbba, W Kang, A Fu, Y Gao IEEE Transactions on Information Forensics and Security, 2023 | 10 | 2023 |
RBNN: memory-efficient reconfigurable deep binary neural network with IP protection for Internet of things H Qiu, H Ma, Z Zhang, Y Gao, Y Zheng, A Fu, P Zhou, D Abbott, ... IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022 | 9 | 2022 |
MUD-PQFed: Towards Malicious User Detection on Model Corruption in Privacy-Preserving Quantized Federated Learning H Ma, Q Li, Y Zheng, Z Zhang, X Liu, Y Gao, SF Al-Sarawi, D Abbott Computers & Security, 103406, 2023 | 7* | 2023 |
Watch Out! Simple Horizontal Class Backdoors Can Trivially Evade Defenses H Ma, S Wang, Y Gao, Z Zhang, H Qiu, M Xue, A Alsharif, A Fu, S Nepal, ... ACM Conference on Computer and Communications Security (CCS), 2024 | 4* | 2024 |
One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning G Wang, H Ma, Y Gao, A Abuadbba, Z Zhang, W Kang, SF Al-Sarawi, ... Knowledge-Based Systems 288, 111456, 2024 | 4 | 2024 |
Exploiting PUF models for error free response generation Y Gao, H Ma, G Li, S Zeitouni, SF Al-Sarawi, D Abbott, AR Sadeghi, ... arXiv preprint arXiv:1701.08241, 2017 | 4 | 2017 |
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses H Peng, H Qiu, H Ma, S Wang, A Fu, SF Al-Sarawi, D Abbott, Y Gao IEEE Transactions on Information Forensics and Security, 2024 | 3 | 2024 |
Detecting Recycled Commodity SoCs: Exploiting Aging-Induced SRAM PUF Unreliability Y Gao, H Ma, SF Al-Sarawi, D Abbott, DC Ranasinghe arXiv preprint arXiv:1705.07375, 2017 | 3 | 2017 |
Towards robustness evaluation of backdoor defense on quantized deep learning models Y Zhu, H Peng, A Fu, W Yang, H Ma, SF Al-Sarawi, D Abbott, Y Gao Expert Systems with Applications, 124599, 2024 | 2 | 2024 |