Strip: A defence against trojan attacks on deep neural networks Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal The 35th Annual Computer Security Applications Conference (ACSAC), 113-125, 2019 | 708 | 2019 |
Physical unclonable functions Y Gao, SF Al-Sarawi, D Abbott Nature Electronics 3 (2), 81-91, 2020 | 354 | 2020 |
Emerging physical unclonable functions with nanotechnology Y Gao, DC Ranasinghe, SF Al-Sarawi, O Kavehei, D Abbott IEEE access 4, 61-80, 2016 | 203 | 2016 |
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review Y Gao, BG Doan, Z Zhang, S Ma, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 196 | 2020 |
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things Y Gao, M Kim, S Abuadbba, Y Kim, C Thapa, K Kim, SA Camtepe, H Kim, ... The 39th International Symposium on Reliable Distributed Systems (SRDS), 2020 | 187 | 2020 |
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT A Fu, X Zhang, N Xiong, Y Gao, H Wang, J Zhang IEEE Transactions on Industrial Informatics, 2020 | 179 | 2020 |
Memristive crypto primitive for building highly secure physical unclonable functions Y Gao, DC Ranasinghe, SF Al-Sarawi, O Kavehei, D Abbott Scientific reports 5, 12785, 2015 | 117 | 2015 |
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? S Abuadbba, K Kim, M Kim, C Thapa, SA Camtepe, Y Gao, H Kim, ... Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 106 | 2020 |
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices Y Gao, G Li, H Ma, SF Al-Sarawi, O Kavehei, D Abbott, DC Ranasinghe 2016 IEEE International Conference on Pervasive Computing and Communication …, 2016 | 106 | 2016 |
PUF-FSM: a controlled strong PUF Y Gao, H Ma, SF Al-Sarawi, D Abbott, DC Ranasinghe IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 95 | 2018 |
Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks Y Gao, Y Kim, BG Doan, Z Zhang, G Zhang, S Nepal, D Ranasinghe, ... IEEE Transactions on Dependable and Secure Computing, 2021 | 76 | 2021 |
APMSA: Adversarial Perturbation against Model Stealing Attacks J Zhang, S Peng, Y Gao, Z Zhang, Q Hong IEEE Transactions on Information Forensics and Security, 2023 | 69 | 2023 |
Artificial Intelligence Security: Threats and Countermeasures Y Hu, W Kuang, Z Qin, K Li, J Zhang, Y Gao, W Li, K Li ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021 | 68 | 2021 |
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects B Kuang, A Fu, W Susilo, S Yu, Y Gao Computers & Security 112, 102498, 2022 | 60 | 2022 |
Lightweight (reverse) fuzzy extractor with multiple reference PUF responses Y Gao, Y Su, L Xu, DC Ranasinghe IEEE Transactions on Information Forensics and Security 14 (7), 1887-1901, 2018 | 57 | 2018 |
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things Y Gao, M Kim, C Thapa, S Abuadbba, Z Zhang, S Camtepe, H Kim, ... IEEE Transactions on Computers, 2021 | 52 | 2021 |
PUF sensor: Exploiting PUF unreliability for secure wireless sensing Y Gao, H Ma, D Abbott, SF Al-Sarawi IEEE Transactions on Circuits and Systems I: Regular Papers 64 (9), 2532-2543, 2017 | 50 | 2017 |
Building secure SRAM PUF key generators on resource constrained devices Y Gao, Y Su, W Yang, S Chen, S Nepal, DC Ranasinghe 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 47 | 2019 |
Read operation performance of large selectorless cross-point array with self-rectifying memristive device Y Gao, O Kavehei, SF Al-Sarawi, DC Ranasinghe, D Abbott Integration, the VLSI Journal 54, 56-64, 2016 | 32* | 2016 |
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh Z Zhang, Y Cheng, M Wang, W He, W Wang, N Surya, Y Gao, K Li, ... USENIX Annual Technical Conference (USENIX ATC '22), 2022 | 29 | 2022 |