Volgen
Yuntao Liu
Yuntao Liu
Geverifieerd e-mailadres voor lehigh.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Neural trojans
Y Liu, Y Xie, A Srivastava
2017 IEEE International Conference on Computer Design (ICCD), 45-48, 2017
4232017
Reverse Engineering-based Hardware Trojan Detection
C Bao, D Forte, Y Liu, A Srivastava
The Hardware Trojan War, 269, 2018
1992018
Keynote: A disquisition on logic locking
A Chakraborty, NG Jayasankaran, Y Liu, J Rajendran, O Sinanoglu, ...
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019
1292019
A Survey on Neural Trojans
Y Liu, A Mondal, A Chakraborty, M Zuzak, N Jacobsen, D Xing, ...
2020 21st International Symposium on Quality Electronic Design (ISQED), 33-39, 2020
1002020
Strong Anti-SAT: Secure and Effective Logic Locking
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
2020 21st International Symposium on Quality Electronic Design (ISQED), 199-205, 2020
602020
TimingSAT: Timing profile embedded SAT attack
A Chakraborty, Y Liu, A Srivastava
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2018
432018
Ganred: Gan-based reverse engineering of dnns via cache side-channel
Y Liu, A Srivastava
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020
402020
Mitigating reverse engineering attacks on deep neural networks
Y Liu, D Dachman-Soled, A Srivastava
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 657-662, 2019
402019
A combined optimization-theoretic and side-channel approach for attacking strong physical unclonable functions
Y Liu, Y Xie, C Bao, A Srivastava
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (1), 73-81, 2017
342017
Robust and attack resilient logic locking with a high application-level impact
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-22, 2021
262021
Trace logic locking: Improving the parametric space of logic locking
M Zuzak, Y Liu, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
222020
2.5 D/3D integration technologies for circuit obfuscation
Y Xie, C Bao, Y Liu, A Srivastava
2016 17th International Workshop on Microprocessor and SOC Test and …, 2016
212016
A Resource Binding Approach to Logic Obfuscation
M Zuzak, Y Liu, A Srivastava
2021 58th ACM/IEEE Design Automation Conference (DAC), 235-240, 2021
132021
Evaluating the security of delay-locked circuits
A Chakraborty, Y Liu, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
112020
Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security
Y Liu, C Bao, Y Xie, A Srivastava
2017 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2017
92017
A combined logical and physical attack on logic obfuscation
M Zuzak, Y Liu, I McDaniel, A Srivastava
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided …, 2022
72022
An optimization-theoretic approach for attacking physical unclonable functions
Y Liu, Y Xie, C Bao, A Srivastava
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2016
72016
Dynamarks: Defending against deep learning model extraction using dynamic watermarking
A Chakraborty, D Xing, Y Liu, A Srivastava
arXiv preprint arXiv:2207.13321, 2022
52022
A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks
Y Liu, M Zuzak, D Xing, I McDaniel, P Mittu, O Ozbay, A Akib, A Srivastava
2022 IEEE 4th International Conference on Artificial Intelligence Circuits …, 2022
42022
TimingCamouflage+ Decamouflaged
P Mittu, Y Liu, A Srivastava
Proceedings of the Great Lakes Symposium on VLSI 2023, 575-580, 2023
12023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20