2015 Index IEEE Transactions on Multi-Scale Computing Systems Vol. C Andras Moritz, O Arias, N Banerjee, S Bhunia, K Chakrabarty, ... | | |
26, Hardware and System Design for Security and Privacy Том. 18-20-May-2016. GLSVLSI 2016-Proceedings of the 2016 ACM Great Lakes Symposium on VLSI.-Сер. GLSVLSI 2016 … S Bian, H Awano, M Shintani, M Hiromoto, S Morita, T Sato, Y Bi, Y Jin, ... | | 2016 |
3d-adv: Black-box adversarial attacks against deep learning models through 3d sensors K Yang, XY Lin, Y Sun, TY Ho, Y Jin 2021 58th ACM/IEEE Design Automation Conference (DAC), 547-552, 2021 | 1 | 2021 |
A 22-nm 1-Mb 1024-b read data-protected STT-MRAM macro with near-memory shift-and-rotate functionality and 42.6-GB/s read bandwidth for security-aware mobile device YC Chiu, TC Chang, CY Lee, JM Hung, KT Chang, CX Xue, SY Wu, ... IEEE Journal of Solid-State Circuits 57 (6), 1936-1949, 2021 | 7 | 2021 |
A comprehensive netlist reverse engineering toolset for IC trust T Meade, S Zhang, M Tehranipoor, Y Jin Proc. Govt. Microcircuit Appl. Critical Technol. Conf.(GOMACTech), 281-284, 2016 | 3 | 2016 |
A Generalize Hardware Debugging Approach for Large Language Models Semi-Syntectic Datasets W Fu, S Li, Y Zhao, K Yang, X Zhang, Y Jin, X Guo Authorea Preprints, 2024 | | 2024 |
A Novel TIGFET-based DFF Design for Improved Resilience to Power Side-Channel Attacks. MM Sharifi, R Rajaei, P Cadareanu, PE Gaillardon, Y Jin, MT Niemier, ... DATE, 1253-1258, 2020 | 16 | 2020 |
A post-deployment IC trust evaluation architecture Y Jin, D Maliuk, Y Makris 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 224-225, 2013 | 6 | 2013 |
A proof-carrying based framework for trusted microprocessor IP Y Jin, Y Makris 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 824-829, 2013 | 54 | 2013 |
A review and comparison of AI-enhanced side channel analysis M Panoff, H Yu, H Shan, Y Jin ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022 | 18 | 2022 |
A statistical STT-RAM retention model for fast memory subsystem designs Z Liu, W Wen, L Jiang, Y Jin, G Quan 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), 720-725, 2017 | 8 | 2017 |
A Structural and SAT Analysis of SANSCrypt J Geist, S Zhang, Y Jin, T Meade 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2022 | | 2022 |
Adaptive sampling and quick anomaly detection in large networks X Xian, A Semenov, Y Hu, A Wang, Y Jin IEEE Transactions on Automation Science and Engineering 20 (4), 2253-2267, 2022 | 4 | 2022 |
An end-to-end view of IoT security and privacy Z Ling, K Liu, Y Xu, Y Jin, X Fu GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 83 | 2017 |
Analog Trojan Design, Fabrication, and Detection Y Hou, H He, K Shamsi, Y Jin, D Wu, H Wu | | |
Approximate power grid protection against false data injection attacks K Ly, K Kwiat, C Kamhoua, L Njilla, Y Jin 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 3 | 2017 |
AppSAT: Approximately deobfuscating integrated circuits K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 352 | 2017 |
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption Z Zhang, S Bian, Z Zhao, R Mao, H Zhou, J Hua, Y Jin, Z Guan Cryptology ePrint Archive, 2024 | | 2024 |
Atrium: Runtime attestation resilient under memory attacks S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017 | 115 | 2017 |
Audio Adversarial Examples Generation with Recurrent Neural Networks* KH Chang, PH Huang, H Yu, Y Jin, TC Wang 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), 488-493, 2020 | 18 | 2020 |