关注
Yier Jin
Yier Jin
Associate Professor, University of Florida
在 ece.ufl.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
2015 Index IEEE Transactions on Multi-Scale Computing Systems Vol.
C Andras Moritz, O Arias, N Banerjee, S Bhunia, K Chakrabarty, ...
26, Hardware and System Design for Security and Privacy Том. 18-20-May-2016. GLSVLSI 2016-Proceedings of the 2016 ACM Great Lakes Symposium on VLSI.-Сер. GLSVLSI 2016 …
S Bian, H Awano, M Shintani, M Hiromoto, S Morita, T Sato, Y Bi, Y Jin, ...
2016
3d-adv: Black-box adversarial attacks against deep learning models through 3d sensors
K Yang, XY Lin, Y Sun, TY Ho, Y Jin
2021 58th ACM/IEEE Design Automation Conference (DAC), 547-552, 2021
12021
A 22-nm 1-Mb 1024-b read data-protected STT-MRAM macro with near-memory shift-and-rotate functionality and 42.6-GB/s read bandwidth for security-aware mobile device
YC Chiu, TC Chang, CY Lee, JM Hung, KT Chang, CX Xue, SY Wu, ...
IEEE Journal of Solid-State Circuits 57 (6), 1936-1949, 2021
72021
A comprehensive netlist reverse engineering toolset for IC trust
T Meade, S Zhang, M Tehranipoor, Y Jin
Proc. Govt. Microcircuit Appl. Critical Technol. Conf.(GOMACTech), 281-284, 2016
32016
A Generalize Hardware Debugging Approach for Large Language Models Semi-Syntectic Datasets
W Fu, S Li, Y Zhao, K Yang, X Zhang, Y Jin, X Guo
Authorea Preprints, 2024
2024
A Novel TIGFET-based DFF Design for Improved Resilience to Power Side-Channel Attacks.
MM Sharifi, R Rajaei, P Cadareanu, PE Gaillardon, Y Jin, MT Niemier, ...
DATE, 1253-1258, 2020
162020
A post-deployment IC trust evaluation architecture
Y Jin, D Maliuk, Y Makris
2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 224-225, 2013
62013
A proof-carrying based framework for trusted microprocessor IP
Y Jin, Y Makris
2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 824-829, 2013
542013
A review and comparison of AI-enhanced side channel analysis
M Panoff, H Yu, H Shan, Y Jin
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022
182022
A statistical STT-RAM retention model for fast memory subsystem designs
Z Liu, W Wen, L Jiang, Y Jin, G Quan
2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), 720-725, 2017
82017
A Structural and SAT Analysis of SANSCrypt
J Geist, S Zhang, Y Jin, T Meade
2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2022
2022
Adaptive sampling and quick anomaly detection in large networks
X Xian, A Semenov, Y Hu, A Wang, Y Jin
IEEE Transactions on Automation Science and Engineering 20 (4), 2253-2267, 2022
42022
An end-to-end view of IoT security and privacy
Z Ling, K Liu, Y Xu, Y Jin, X Fu
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
832017
Analog Trojan Design, Fabrication, and Detection
Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu
Approximate power grid protection against false data injection attacks
K Ly, K Kwiat, C Kamhoua, L Njilla, Y Jin
2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017
32017
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
3522017
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption
Z Zhang, S Bian, Z Zhao, R Mao, H Zhou, J Hua, Y Jin, Z Guan
Cryptology ePrint Archive, 2024
2024
Atrium: Runtime attestation resilient under memory attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017
1152017
Audio Adversarial Examples Generation with Recurrent Neural Networks*
KH Chang, PH Huang, H Yu, Y Jin, TC Wang
2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 488-493, 2020
182020
系统目前无法执行此操作,请稍后再试。
文章 1–20