VeriTrust: Verification for hardware trust J Zhang, F Yuan, L Wei, Z Sun, Q Xu Proceedings of the 50th Annual Design Automation Conference, 1-8, 2013 | 323 | 2013 |
I know what you see: Power side-channel attack on convolutional neural network accelerators L Wei, B Luo, Y Li, Y Liu, Q Xu Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 214 | 2018 |
Fault injection attack on deep neural network Y Liu, L Wei, B Luo, Q Xu 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 131-138, 2017 | 208 | 2017 |
Towards imperceptible and robust adversarial example attacks against neural networks B Luo, Y Liu, L Wei, Q Xu Proceedings of the AAAI conference on artificial intelligence 32 (1), 2018 | 145 | 2018 |
On code execution tracking via power side-channel Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 95 | 2016 |
BoardPUF: Physical unclonable functions for printed circuit board authentication L Wei, C Song, Y Liu, J Zhang, F Yuan, Q Xu 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 152-158, 2015 | 61 | 2015 |
Fault injection attack on deep neural network. In 2017 IEEE Y Liu, L Wei, B Luo, Q Xu ACM International Conference on Computer-Aided Design (ICCAD), 131-138, 0 | 23 | |
Shadow block: Accelerating oram accesses with data duplication X Zhang, G Sun, P Xie, C Zhang, Y Liu, L Wei, Q Xu, CJ Xue 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018 | 18 | 2018 |
DERA: Yet another differential fault attack on cryptographic devices based on error rate analysis Y Liu, J Zhang, L Wei, F Yuan, Q Xu Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015 | 14 | 2015 |
On Trojan side channel design and identification J Zhang, G Su, Y Liu, L Wei, F Yuan, G Bai, Q Xu 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 278-285, 2014 | 14 | 2014 |
On functional test generation for deep neural network ips B Luo, Y Li, L Wei, Q Xu 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2019 | 11 | 2019 |
Vulnerability analysis for crypto devices against probing attack L Wei, J Zhang, F Yuan, Y Liu, J Fan, Q Xu The 20th Asia and South Pacific Design Automation Conference, 827-832, 2015 | 4 | 2015 |
VeriTrust J Zhang, F Yuan, L Wei, Z Sun, Q Xu Proceedings of the 50th Annual Design Automation Conference, 2013 | 3 | 2013 |
I Know What You See L Wei, B Luo, Y Li, Y Liu, Q Xu Proceedings of the 34th Annual Computer Security Applications Conference, 2018 | 1 | 2018 |
Hardware Trust Verification Q Xu, L Wei Hardware IP Security and Trust, 227-253, 2017 | 1 | 2017 |