Lira: Learnable, imperceptible and robust backdoor attacks K Doan, Y Lao, W Zhao, P Li Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 277 | 2021 |
Backdoor attack with imperceptible input and latent modification K Doan, Y Lao, P Li Advances in Neural Information Processing Systems 34, 18944-18957, 2021 | 146 | 2021 |
Obfuscating DSP circuits via high-level transformations Y Lao, KK Parhi IEEE transactions on very large scale integration (VLSI) systems 23 (5), 819-830, 2014 | 111 | 2014 |
Hardware trojan attacks on neural networks J Clements, Y Lao arXiv preprint arXiv:1806.05768, 2018 | 109 | 2018 |
Statistical analysis of MUX-based physical unclonable functions Y Lao, KK Parhi IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014 | 107 | 2014 |
True random number generator circuits based on single-and multi-phase beat frequency detection Q Tang, B Kim, Y Lao, KK Parhi, CH Kim Proceedings of the IEEE 2014 Custom Integrated Circuits Conference, 1-4, 2014 | 94 | 2014 |
An in-place FFT architecture for real-valued signals M Ayinala, Y Lao, KK Parhi IEEE Transactions on Circuits and Systems II: Express Briefs 60 (10), 652-656, 2013 | 79 | 2013 |
Rallying adversarial techniques against deep learning for network security J Clements, Y Yang, AA Sharma, H Hu, Y Lao 2021 IEEE symposium series on computational intelligence (SSCI), 01-08, 2021 | 75 | 2021 |
Hardware trojan design on neural networks J Clements, Y Lao 2019 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5, 2019 | 72 | 2019 |
Robust watermarking for deep neural networks via bi-level optimization P Yang, Y Lao, P Li Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 67 | 2021 |
Reliable PUF-based local authentication with self-correction Y Lao, B Yuan, CH Kim, KK Parhi IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2016 | 64 | 2016 |
Reconfigurable architectures for silicon physical unclonable functions Y Lao, KK Parhi 2011 IEEE International Conference on Electro/Information Technology, 1-7, 2011 | 44 | 2011 |
Backdoor attacks on neural network operations J Clements, Y Lao 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2018 | 38 | 2018 |
Marksman backdoor: Backdoor attacks with arbitrary target class KD Doan, Y Lao, P Li Advances in Neural Information Processing Systems 35, 38260-38273, 2022 | 37 | 2022 |
Robust optical physical unclonable function using disordered photonic integrated circuits F Bin Tarik, A Famili, Y Lao, JD Ryckman Nanophotonics 9 (9), 2817-2828, 2020 | 36 | 2020 |
Defending backdoor attacks on vision transformer via patch processing KD Doan, Y Lao, P Yang, P Li Proceedings of the AAAI Conference on Artificial Intelligence 37 (1), 506-515, 2023 | 30 | 2023 |
Enhancing PUF reliability by machine learning Y Wen, Y Lao 2017 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2017 | 30 | 2017 |
Soft response generation and thresholding strategies for linear and feed-forward MUX PUFs C Zhou, S Satapathy, Y Lao, KK Parhi, CH Kim Proceedings of the 2016 International Symposium on Low Power Electronics and …, 2016 | 30 | 2016 |
Mathematical modeling analysis of strong physical unclonable functions Y Xu, Y Lao, W Liu, Z Zhang, X You, C Zhang IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020 | 29 | 2020 |
CLPA: Clean-label poisoning availability attacks using generative adversarial nets B Zhao, Y Lao Proceedings of the AAAI Conference on Artificial Intelligence 36 (8), 9162-9170, 2022 | 28 | 2022 |