Potrojan: powerful neural-level trojan designs in deep learning models M Zou, Y Shi, C Wang, F Li, WZ Song, Y Wang arXiv preprint arXiv:1802.03043, 2018 | 75 | 2018 |
Potential trigger detection for hardware trojans M Zou, X Cui, L Shi, K Wu IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2017 | 17 | 2017 |
Network phenotyping for network traffic classification and anomaly detection M Zou, C Wang, F Li, WZ Song arXiv preprint arXiv:1803.01528, 2018 | 14 | 2018 |
Security enhancement for rram computing system through obfuscating crossbar row connections M Zou, Z Zhu, Y Cai, J Zhou, C Wang, Y Wang 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 466-471, 2020 | 13 | 2020 |
Efficient training of the memristive deep belief net immune to non‐idealities of the synaptic devices W Wang, B Hoffer, T Greenberg-Toledo, Y Li, M Zou, E Herbelin, R Ronen, ... Advanced Intelligent Systems 4 (5), 2100249, 2022 | 10 | 2022 |
Review of Security Techniques for Memristor Computing Systems M Zou, N Du, S Kvatinsky Frontiers in Electronic Materials, 28, 2022 | 8 | 2022 |
Enhancing security of memristor computing system through secure weight mapping M Zou, J Zhou, X Cui, W Wang, S Kvatinsky 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 182-187, 2022 | 8 | 2022 |
Scan-based attack on stream ciphers: A case study on eSTREAM finalists MH Zou, K Ma, KJ Wu, EHM Sha Journal of Computer Science and Technology 29 (4), 646-655, 2014 | 8 | 2014 |
Identifying inactive nets in function mode of circuits X Cui, M Zou, K Wu J. Comput. Res. Dev 54 (1), 163-170, 2017 | 6 | 2017 |
Towards trustable storage using SSDs with proprietary FTL X Cui, M Zou, L Shi, K Wu 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2015 | 6 | 2015 |
Improving efficiency and lifetime of logic-in-memory by combining IMPLY and MAGIC families M Zou, J Zhou, J Sun, C Wang, S Kvatinsky Journal of Systems Architecture 119, 102232, 2021 | 4 | 2021 |
TDPP: Two-Dimensional Permutation-Based Protection of Memristive Deep Neural Networks M Zou, Z Zhu, T Greenberg-Toledo, O Leitersdorf, J Li, J Zhou, Y Wang, ... IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023 | | 2023 |
Supporting Information for" Efficient Training of the Memristive Deep Belief Net Immune to Non-Idealities of the Synaptic Devices" W Wang, B Hoffer, T Greenberg-Toledo, Y Li, M Zou, E Herbelin, R Ronen, ... Authorea Preprints, 2022 | | 2022 |
Enhancing the Security of RRAM Computing System Based on Trojans M Zou, J Zhou, J Sun, C Wang Journal of Software 32 (8), 2021 | | 2021 |
针对流加密法的扫描链攻击: 一个对 eSTREAM 的案例研究 MH Zou, K Ma, KJ Wu, EHM Sha 计算机科学技术学报 29 (4), 646-655, 2014 | | 2014 |