A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing J Zhang, Y Lin, Y Lyu, G Qu IEEE Transactions on Information Forensics and Security 10 (6), 1137-1150, 2015 | 182 | 2015 |
Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies P Qiu, D Wang, Y Lyu, G Qu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 148 | 2019 |
SNrram: An efficient sparse neural network computation architecture based on resistive random-access memory P Wang, Y Ji, C Hong, Y Lyu, D Wang, Y Xie Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018 | 103 | 2018 |
Hyperconnected network: A decentralized trusted computing and networking paradigm H Yin, D Guo, K Wang, Z Jiang, Y Lyu, J Xing IEEE Network 32 (1), 112-117, 2018 | 102 | 2018 |
Approximate computing for low power and security in the internet of things M Gao, Q Wang, MT Arafin, Y Lyu, G Qu Computer 50 (6), 27-34, 2017 | 85 | 2017 |
VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults P Qiu, D Wang, Y Lyu, G Qu 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2019 | 63 | 2019 |
Measuring photoplethysmogram-based stress-induced vascular response index to assess cognitive load and stress Y Lyu, X Luo, J Zhou, C Yu, C Miao, T Wang, Y Shi, K Kameyama Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 62 | 2015 |
Navigating registers in placement for clock network minimization Y Lu, CN Sze, X Hong, Q Zhou, Y Cai, L Huang, J Hu Proceedings of the 42nd annual Design Automation Conference, 176-181, 2005 | 51 | 2005 |
A survey of hardware trojan detection, diagnosis and prevention H Li, Q Liu, J Zhang, Y Lyu 2015 14th International Conference on Computer-Aided Design and Computer …, 2015 | 47 | 2015 |
Design and implementation of a delay-based PUF for FPGA IP protection J Zhang, Q Wu, Y Lyu, Q Zhou, Y Cai, Y Lin, G Qu 2013 International Conference on Computer-Aided Design and Computer Graphics …, 2013 | 44 | 2013 |
LEAP: A lightweight encryption and authentication protocol for in-vehicle communications Z Lu, Q Wang, X Chen, G Qu, Y Lyu, Z Liu 2019 IEEE Intelligent Transportation Systems Conference (ITSC), 1158-1164, 2019 | 43 | 2019 |
Control flow integrity based on lightweight encryption architecture P Qiu, Y Lyu, J Zhang, D Wang, G Qu IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2017 | 43 | 2017 |
An android-based emergency alarm and healthcare management system Y Du, Y Chen, D Wang, J Liu, Y Lu 2011 IEEE International Symposium on IT in Medicine and Education 1, 375-379, 2011 | 36 | 2011 |
Video delivery networks: Challenges, solutions and future directions Q Fan, H Yin, G Min, P Yang, Y Luo, Y Lyu, H Huang, L Jiao Computers & Electrical Engineering 66, 332-341, 2018 | 35 | 2018 |
High-performance scheduling model for multisensor gateway of cloud sensor system-based smart-living Y Lyu, F Yan, Y Chen, D Wang, Y Shi, N Agoulmine Information Fusion 21, 42-56, 2015 | 35 | 2015 |
A parasitic extraction method of VLSI interconnects for pre-route timing analysis W Gong, W Yu, Y Lü, Q Tang, Q Zhou, Y Cai 2010 International Conference on Communications, Circuits and Systems …, 2010 | 34 | 2010 |
Cloud storage security assessment through equilibrium analysis Y Wu, Y Lyu, Y Shi Tsinghua Science and Technology 24 (6), 738-749, 2019 | 33 | 2019 |
QGAN: Quantized generative adversarial networks P Wang, D Wang, Y Ji, X Xie, H Song, XX Liu, Y Lyu, Y Xie arXiv preprint arXiv:1901.08263, 2019 | 31 | 2019 |
FPGA IP protection by binding finite state machine to physical unclonable function J Zhang, Y Lin, Y Lyu, G Qu, RCC Cheung, W Che, Q Zhou, J Bian 2013 23rd International Conference on Field programmable Logic and …, 2013 | 29 | 2013 |
Physical unclonable functions-based linear encryption against code reuse attacks P Qiu, Y Lyu, J Zhang, X Wang, D Zhai, D Wang, G Qu Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 28 | 2016 |