VeriTrust: Verification for hardware trust J Zhang, F Yuan, L Wei, Z Sun, Q Xu Proceedings of the 50th Annual Design Automation Conference, 1-8, 2013 | 325 | 2013 |
I know what you see: Power side-channel attack on convolutional neural network accelerators L Wei, B Luo, Y Li, Y Liu, Q Xu Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 224 | 2018 |
Fault injection attack on deep neural network Y Liu, L Wei, B Luo, Q Xu 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 131-138, 2017 | 212 | 2017 |
Towards imperceptible and robust adversarial example attacks against neural networks B Luo, Y Liu, L Wei, Q Xu Proceedings of the AAAI conference on artificial intelligence 32 (1), 2018 | 149 | 2018 |
On code execution tracking via power side-channel Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 97 | 2016 |
BoardPUF: Physical unclonable functions for printed circuit board authentication L Wei, C Song, Y Liu, J Zhang, F Yuan, Q Xu 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 152-158, 2015 | 61 | 2015 |
D2NN: a fine-grained dual modular redundancy framework for deep neural networks Y Li, Y Liu, M Li, Y Tian, B Luo, Q Xu. Proceedings of the 35th Annual Computer Security Applications Conference, pp …, 2019 | 23 | 2019 |
Testrank: Bringing order into unlabeled test instances for deep learning tasks Y Li, M Li, Q Lai, Y Liu, Q Xu Advances in Neural Information Processing Systems 34, 20874-20886, 2021 | 21 | 2021 |
Shadow block: Accelerating oram accesses with data duplication X Zhang, G Sun, P Xie, C Zhang, Y Liu, L Wei, Q Xu, CJ Xue 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018 | 19 | 2018 |
On Trojan side channel design and identification J Zhang, G Su, Y Liu, L Wei, F Yuan, G Bai, Q Xu 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 278-285, 2014 | 15 | 2014 |
DERA: Yet another differential fault attack on cryptographic devices based on error rate analysis Y Liu, J Zhang, L Wei, F Yuan, Q Xu Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 14 | 2015 |
On testing timing-speculative circuits F Yuan, Y Liu, WB Jone, Q Xu Proceedings of the 50th Annual Design Automation Conference, 1-6, 2013 | 13 | 2013 |
Vulnerability analysis for crypto devices against probing attack L Wei, J Zhang, F Yuan, Y Liu, J Fan, Q Xu The 20th Asia and South Pacific Design Automation Conference, 827-832, 2015 | 4 | 2015 |
Retrodmr: Troubleshooting non-deterministic faults with retrospective DMR T Wang, Y Liu, Q Xu, Z Zhang, Z Wang, X Gu Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017 | 3 | 2017 |
NLabel: An Accurate Familial Clustering Framework for Large-Scale Weakly-Labeled Malware Y Liu, Y Lai, K Wei, L Gu, Z Yan 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 1 | 2020 |
On the Security of Embedded System under Fault Injection and Side-Channel Leaks Y Liu PQDT-Global, 2017 | | 2017 |