关注
Lingxiao Wei
Lingxiao Wei
在 microsoft.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
VeriTrust: Verification for hardware trust
J Zhang, F Yuan, L Wei, Z Sun, Q Xu
Proceedings of the 50th Annual Design Automation Conference, 1-8, 2013
3232013
I know what you see: Power side-channel attack on convolutional neural network accelerators
L Wei, B Luo, Y Li, Y Liu, Q Xu
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
2142018
Fault injection attack on deep neural network
Y Liu, L Wei, B Luo, Q Xu
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 131-138, 2017
2082017
Towards imperceptible and robust adversarial example attacks against neural networks
B Luo, Y Liu, L Wei, Q Xu
Proceedings of the AAAI conference on artificial intelligence 32 (1), 2018
1452018
On code execution tracking via power side-channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
952016
BoardPUF: Physical unclonable functions for printed circuit board authentication
L Wei, C Song, Y Liu, J Zhang, F Yuan, Q Xu
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 152-158, 2015
612015
Fault injection attack on deep neural network. In 2017 IEEE
Y Liu, L Wei, B Luo, Q Xu
ACM International Conference on Computer-Aided Design (ICCAD), 131-138, 0
23
Shadow block: Accelerating oram accesses with data duplication
X Zhang, G Sun, P Xie, C Zhang, Y Liu, L Wei, Q Xu, CJ Xue
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
182018
DERA: Yet another differential fault attack on cryptographic devices based on error rate analysis
Y Liu, J Zhang, L Wei, F Yuan, Q Xu
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
142015
On Trojan side channel design and identification
J Zhang, G Su, Y Liu, L Wei, F Yuan, G Bai, Q Xu
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 278-285, 2014
142014
On functional test generation for deep neural network ips
B Luo, Y Li, L Wei, Q Xu
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2019
112019
Vulnerability analysis for crypto devices against probing attack
L Wei, J Zhang, F Yuan, Y Liu, J Fan, Q Xu
The 20th Asia and South Pacific Design Automation Conference, 827-832, 2015
42015
VeriTrust
J Zhang, F Yuan, L Wei, Z Sun, Q Xu
Proceedings of the 50th Annual Design Automation Conference, 2013
32013
I Know What You See
L Wei, B Luo, Y Li, Y Liu, Q Xu
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
12018
Hardware Trust Verification
Q Xu, L Wei
Hardware IP Security and Trust, 227-253, 2017
12017
系统目前无法执行此操作,请稍后再试。
文章 1–15