


Остановите войну!
for scientists:
Yier Jin
Person information

- affiliation: University of Florida, Gainesville, FL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j38]Jiaji He
, Xiaolong Guo
, Mark M. Tehranipoor, Apostol Vassilev
, Yier Jin
:
EM Side Channels in Hardware Security: Attacks and Defenses. IEEE Des. Test 39(2): 100-111 (2022) - [j37]Yen-Cheng Chiu, Tung-Cheng Chang, Chun-Ying Lee, Je-Min Hung, Kuang-Tang Chang, Cheng-Xin Xue, Ssu-Yen Wu, Hui-Yao Kao, Peng Chen
, Hsiao-Yu Huang, Shih-Hsih Teng, Chieh-Pu Lo
, Yi-Chun Shih
, Yu-Der Chih, Tsung-Yung Jonathan Chang, Yier Jin
, Meng-Fan Chang
:
A 22-nm 1-Mb 1024-b Read Data-Protected STT-MRAM Macro With Near-Memory Shift-and-Rotate Functionality and 42.6-GB/s Read Bandwidth for Security-Aware Mobile Device. IEEE J. Solid State Circuits 57(6): 1936-1949 (2022) - [j36]Kejun Chen, Orlando Arias, Qingxu Deng
, Daniela Oliveira
, Xiaolong Guo
, Yier Jin
:
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor. IEEE Trans. Inf. Forensics Secur. 17: 559-573 (2022) - [j35]Raj Gautam Dutta
, Yaodan Hu, Feng Yu
, Teng Zhang
, Yier Jin
:
Design and Analysis of Secure Distributed Estimator for Vehicular Platooning in Adversarial Environment. IEEE Trans. Intell. Transp. Syst. 23(4): 3418-3429 (2022) - [c124]Orlando Arias, Zhaoxiang Liu, Xiaolong Guo, Yier Jin, Shuo Wang:
RTSEC: Automated RTL Code Augmentation for Hardware Security Enhancement. DATE 2022: 596-599 - [c123]Zhaoxiang Liu, Orlando Arias, Weimin Fu, Yier Jin, Xiaolong Guo:
Inter-IP Malicious Modification Detection through Static Information Flow Tracking. DATE 2022: 600-603 - [c122]Weimin Fu, Honggang Yu, Orlando Arias, Kaichen Yang, Yier Jin, Tuba Yavuz, Xiaolong Guo:
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms. ACM Great Lakes Symposium on VLSI 2022: 481-486 - [i12]Huifeng Zhu, Haoqi Shan, Dean Sullivan, Xiaolong Guo, Yier Jin, Xuan Zhang:
PDNPulse: Sensing PCB Anomaly with the Intrinsic Power Delivery Network. CoRR abs/2204.02482 (2022) - 2021
- [j34]Haocheng Ma
, Jiaji He
, Max Panoff
, Yier Jin
, Yiqiang Zhao:
Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel Protection. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 371-382 (2021) - [j33]Max Panoff
, Raj Gautam Dutta
, Yaodan Hu
, Kaichen Yang
, Yier Jin
:
On Sensor Security in the Era of IoT and CPS. SN Comput. Sci. 2(1): 51 (2021) - [j32]Haocheng Ma
, Jiaji He
, Yanjiang Liu
, Leibo Liu
, Yiqiang Zhao, Yier Jin
:
Security-Driven Placement and Routing Tools for Electromagnetic Side-Channel Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1077-1089 (2021) - [j31]Kaveh Shamsi
, Yier Jin
:
In Praise of Exact-Functional-Secrecy in Circuit Locking. IEEE Trans. Inf. Forensics Secur. 16: 5225-5238 (2021) - [c121]Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin
:
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules. AsiaCCS 2021: 349-362 - [c120]Huifeng Zhu, Xiaolong Guo, Yier Jin
, Xuan Zhang:
PCBench: Benchmarking of Board-Level Hardware Attacks and Trojans. ASP-DAC 2021: 396-401 - [c119]Yichen Jiang, Huifeng Zhu, Dean Sullivan, Xiaolong Guo, Xuan Zhang, Yier Jin
:
Quantifying Rowhammer Vulnerability for DRAM Security. DAC 2021: 73-78 - [c118]Kaichen Yang, Xuan-Yi Lin, Yixin Sun, Tsung-Yi Ho, Yier Jin
:
3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors. DAC 2021: 547-552 - [c117]Honggang Yu, Haoqi Shan, Maximillian Panoff, Yier Jin
:
Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning. DAC 2021: 703-708 - [c116]Xiaolong Guo, Song Han, X. Sharon Hu
, Xun Jiao, Yier Jin
, Fanxin Kong, Michael Lemmon:
Towards scalable, secure, and smart mission-critical IoT systems: review and vision. EMSOFT 2021: 1-10 - [c115]Yichen Jiang, Huifeng Zhu, Haoqi Shan, Xiaolong Guo, Xuan Zhang, Yier Jin:
TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection. HOST 2021: 239-247 - [c114]Kaveh Shamsi, Yier Jin
:
Circuit Deobfuscation from Power Side-Channels using Pseudo-Boolean SAT. ICCAD 2021: 1-9 - [c113]Yaodan Hu, Xiaochen Xian, Yier Jin
:
RADM: a risk-aware DER management framework with real-time DER trustworthiness evaluation. ICCPS 2021: 77-86 - [c112]Weimin Fu, Orlando Arias, Yier Jin
, Xiaolong Guo:
Fuzzing Hardware: Faith or Reality? : Invited Paper. NANOARCH 2021: 1-6 - [c111]Xiaorui Liu, Yaodan Hu, Charalambos Konstantinou
, Yier Jin
:
CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks. SmartGridComm 2021: 95-101 - [i11]Xiaorui Liu, Yaodan Hu, Charalambos Konstantinou
, Yier Jin:
CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks. CoRR abs/2103.13568 (2021) - [i10]Honggang Yu, Shihfeng Zeng, Teng Zhang, Ing-Chao Lin, Yier Jin:
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers. CoRR abs/2109.10770 (2021) - 2020
- [j30]Feng Yu
, Raj Gautam Dutta
, Teng Zhang
, Yaodan Hu, Yier Jin
:
Fast Attack-Resilient Distributed State Estimator for Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3555-3565 (2020) - [j29]Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin
:
SaeCAS: Secure Authenticated Execution Using CAM-Based Vector Storage. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 4078-4089 (2020) - [j28]Yajun Yang, Zhang Chen, Yuan Liu, Tsung-Yi Ho
, Yier Jin
, Pingqiang Zhou:
How Secure Is Split Manufacturing in Preventing Hardware Trojan? ACM Trans. Design Autom. Electr. Syst. 25(2): 20:1-20:23 (2020) - [c110]Tzungyu Tsai, Kaichen Yang, Tsung-Yi Ho
, Yier Jin:
Robust Adversarial Objects against Deep Learning Models. AAAI 2020: 954-962 - [c109]Kaichen Yang, Tzungyu Tsai, Honggang Yu, Tsung-Yi Ho
, Yier Jin:
Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World. AAAI 2020: 1088-1095 - [c108]Yaodan Hu, Haoqi Shan, Raj Gautam Dutta, Yier Jin
:
Protecting Platoons from Stealthy Jamming Attack. AsianHOST 2020: 1-6 - [c107]Jun Kuai
, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou, Yier Jin
:
WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking. AsianHOST 2020: 1-6 - [c106]Huifeng Zhu, Xiaolong Guo, Yier Jin
, Xuan Zhang:
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis. AsianHOST 2020: 1-6 - [c105]Jiaji He, Haocheng Ma, Xiaolong Guo, Yiqiang Zhao, Yier Jin
:
Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations. ASP-DAC 2020: 62-67 - [c104]Kuei-Huan Chang, Po-Hao Huang, Honggang Yu, Yier Jin
, Ting-Chi Wang:
Audio Adversarial Examples Generation with Recurrent Neural Networks*. ASP-DAC 2020: 488-493 - [c103]James Geist, Travis Meade, Shaojie Zhang, Yier Jin
:
RELIC-FUN: Logic Identification through Functional Signal Comparisons. DAC 2020: 1-6 - [c102]Jiaji He, Xiaolong Guo, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao, Yier Jin
:
Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors. DAC 2020: 1-6 - [c101]Mohammad Mehdi Sharifi, Ramin Rajaei, Patsy Cadareanu, Pierre-Emmanuel Gaillardon, Yier Jin
, Michael T. Niemier, Xiaobo Sharon Hu
:
A Novel TIGFET-based DFF Design for Improved Resilience to Power Side-Channel Attacks. DATE 2020: 1253-1258 - [c100]Rachel Selina Rajarathnam, Yibo Lin, Yier Jin
, David Z. Pan:
ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist. HOST 2020: 154-163 - [c99]Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin
:
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage. HOST 2020: 209-218 - [c98]Orlando Arias, Dean Sullivan, Haoqi Shan, Yier Jin
:
LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells. HOST 2020: 305-315 - [c97]Feng Yu, Yaodan Hu, Teng Zhang, Yier Jin
:
Special Issue: Resilient Distributed Estimator with Information Consensus for CPS Security. ICCD 2020: 41-44 - [c96]Nikolaos Sapountzis, Ruimin Sun, Xuetao Wei, Yier Jin
, Jedidiah R. Crandall
, Daniela Oliveira:
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems. ICDCS 2020: 1090-1100 - [c95]Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho
, Yier Jin:
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. NDSS 2020 - [c94]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - [c93]Yier Jin:
CAD for Security: A Full Reverse Engineering Toolchain from Layout to RTL. VLSI-DAT 2020: 1 - [i9]Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, Xiaorui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou:
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems. CoRR abs/2008.06926 (2020)
2010 – 2019
- 2019
- [j27]Jiaji He
, Xiaolong Guo, Travis Meade, Raj Gautam Dutta, Yiqiang Zhao, Yier Jin
:
SoC interconnection protection through formal verification. Integr. 64: 143-151 (2019) - [j26]Meng Li
, Kaveh Shamsi, Travis Meade, Zheng Zhao, Bei Yu
, Yier Jin
, David Z. Pan
:
Provably Secure Camouflaging Strategy for IC Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(8): 1399-1412 (2019) - [j25]Yumin Hou
, Hu He, Kaveh Shamsi, Yier Jin
, Dong Wu, Huaqiang Wu
:
On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(10): 1820-1830 (2019) - [j24]Kaveh Shamsi, Travis Meade, Meng Li
, David Z. Pan
, Yier Jin
:
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes. IEEE Trans. Inf. Forensics Secur. 14(2): 347-359 (2019) - [j23]Kaveh Shamsi, Meng Li, Kenneth Plaks, Saverio Fazzari, David Z. Pan, Yier Jin
:
IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview. ACM Trans. Design Autom. Electr. Syst. 24(6): 65:1-65:36 (2019) - [c92]Raj Gautam Dutta, Teng Zhang, Yier Jin
:
Resilient Distributed Filter for State Estimation of Cyber-Physical Systems Under Attack. ACC 2019: 5141-5147 - [c91]Haocheng Ma, Jiaji He, Yanjiang Liu, Yiqiang Zhao, Yier Jin
:
CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection. AsianHOST 2019: 1-6 - [c90]Jason Portillo, Travis Meade, John Hacker, Shaojie Zhang, Yier Jin
:
RERTL: Finite State Transducer Logic Recovery at Register Transfer Level. AsianHOST 2019: 1-6 - [c89]Travis Meade, Jason Portillo, Shaojie Zhang, Yier Jin
:
NETA: when IP fails, secrets leak. ASP-DAC 2019: 90-95 - [c88]Kaveh Shamsi, Meng Li, David Z. Pan, Yier Jin
:
KC2: Key-Condition Crunching for Fast Sequential Circuit Deobfuscation. DATE 2019: 534-539 - [c87]Xiaolong Guo, Huifeng Zhu, Yier Jin
, Xuan Zhang
:
When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans. DATE 2019: 1727-1732 - [c86]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark M. Tehranipoor, Yier Jin
:
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment. HOST 2019: 91-100 - [c85]Kaveh Shamsi, David Z. Pan, Yier Jin
:
On the Impossibility of Approximation-Resilient Circuit Locking. HOST 2019: 161-170 - [c84]Kaveh Shamsi, David Z. Pan, Yier Jin
:
IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits. ICCAD 2019: 1-7 - [c83]Bryan Pearson, Lan Luo, Cliff C. Zou, Jacob Crain, Yier Jin
, Xinwen Fu:
Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory. IFIPIoT 2019: 289-306 - [c82]Yier Jin
:
Towards Hardware-Assisted Security for IoT Systems. ISVLSI 2019: 632-637 - [c81]Kejun Chen, Qingxu Deng, Yumin Hou, Yier Jin
, Xiaolong Guo:
Hardware and Software Co-Verification from Security Perspective. MTV 2019: 50-55 - [c80]Miao Tony He, Jungmin Park, Adib Nahiyan, Apostol Vassilev, Yier Jin
, Mark M. Tehranipoor:
RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level. VTS 2019: 1-6 - [i8]Miao Tony He, Jungmin Park, Adib Nahiyan, Apostol Vassilev, Yier Jin, Mark M. Tehranipoor:
RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level. CoRR abs/1901.05909 (2019) - [i7]Yue Zhang
, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode. CoRR abs/1908.10497 (2019) - 2018
- [j22]Kejun Chen, Shuai Zhang, Zhikun Li, Yi Zhang, Qingxu Deng, Sandip Ray, Yier Jin
:
Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice. J. Hardw. Syst. Secur. 2(2): 97-110 (2018) - [j21]Sarah Amir
, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark M. Tehranipoor, Domenic Forte:
Development and Evaluation of Hardware Obfuscation Benchmarks. J. Hardw. Syst. Secur. 2(2): 142-161 (2018) - [j20]Travis Meade, Kaveh Shamsi, Thao Le, Jia Di, Shaojie Zhang, Yier Jin
:
The Old Frontier of Reverse Engineering: Netlist Partitioning. J. Hardw. Syst. Secur. 2(3): 201-213 (2018) - [j19]Juan Wang, Zhi Hong, Yuhan Zhang, Yier Jin
:
Enabling Security-Enhanced Attestation With Intel SGX for Remote Terminal and IoT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(1): 88-96 (2018) - [c79]Tao Liu, Lei Jiang, Yier Jin
, Gang Quan, Wujie Wen:
PT-spike: A precise-time-dependent single spike neuromorphic architecture with efficient supervised learning. ASP-DAC 2018: 568-573 - [c78]Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin
, Wujie Wen:
Security analysis and enhancement of model compressed deep learning systems under adversarial attacks. ASP-DAC 2018: 721-726 - [c77]Jungmin Park, Xiaolin Xu, Yier Jin
, Domenic Forte, Mark M. Tehranipoor:
Power-based side-channel instruction-level disassembler. DAC 2018: 119:1-119:6 - [c76]Orlando Arias, Fahim Rahman, Mark M. Tehranipoor, Yier Jin
:
Device attestation: Past, present, and future. DATE 2018: 473-478 - [c75]Kaveh Shamsi, Meng Li, David Z. Pan, Yier Jin
:
Cross-Lock: Dense Layout-Level Interconnect Locking using Cross-bar Architectures. ACM Great Lakes Symposium on VLSI 2018: 147-152 - [c74]Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin
, Dong Wu, Huaqiang Wu:
R2D2: Runtime reassurance and detection of A2 Trojan. HOST 2018: 195-200 - [c73]Tao Liu, Wujie Wen, Yier Jin
:
SIN2: Stealth infection on neural network - A low-cost agile neural Trojan attack methodology. HOST 2018: 227-230 - [c72]Raj Gautam Dutta, Feng Yu
, Teng Zhang, Yaodan Hu, Yier Jin
:
Security for safety: a path toward building trusted autonomous vehicles. ICCAD 2018: 92 - [c71]Meng Li, Kaveh Shamsi, Yier Jin
, David Z. Pan:
TimingSAT: Decamouflaging Timing-based Logic Obfuscation. ITC 2018: 1-10 - [c70]Thao Le, Lucas Weaver, Jia Di, Shaojie Zhang, Yier Jin
:
Hardware Trojan Detection and Functionality Determination for Soft IPs. IVSW 2018: 56-61 - [c69]Dean Sullivan, Orlando Arias, Travis Meade, Yier Jin:
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds. NDSS 2018 - [p1]Yier Jin, Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi:
Hardware control flow integrity. The Continuing Arms Race 2018: 181-210 - [i6]Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen:
Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks. CoRR abs/1802.05193 (2018) - [i5]Tao Liu, Lei Jiang, Yier Jin, Gang Quan, Wujie Wen:
PT-Spike: A Precise-Time-Dependent Single Spike Neuromorphic Architecture with Efficient Supervised Learning. CoRR abs/1803.05109 (2018) - [i4]Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin, Gang Quan, Wujie Wen:
MT-Spike: A Multilayer Time-based Spiking Neuromorphic Architecture with Temporal Error Backpropagation. CoRR abs/1803.05117 (2018) - [i3]Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff C. Zou, Xinwen Fu, Wei Zhao
:
IoT Security: An End-to-End View and Case Study. CoRR abs/1805.05853 (2018) - 2017
- [j18]Travis Meade, Shaojie Zhang, Yier Jin
:
IP protection through gate-level netlist security enhancement. Integr. 58: 563-570 (2017) - [j17]Sandip Ray, Yier Jin:
Guest Editorial: Security Challenges in the IoT Regime. J. Hardw. Syst. Secur. 1(4): 297 (2017) - [j16]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Yier Jin
, Michael T. Niemier, Xiaobo Sharon Hu
:
Tunnel FET Current Mode Logic for DPA-Resilient Circuit Designs. IEEE Trans. Emerg. Top. Comput. 5(3): 340-352 (2017) - [j15]Xiaolong Guo, Raj Gautam Dutta, Yier Jin
:
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems. IEEE Trans. Inf. Forensics Secur. 12(2): 405-417 (2017) - [j14]Yier Jin
, Xiaolong Guo, Raj Gautam Dutta, Mohammad-Mahdi Bidmeshki, Yiorgos Makris
:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals. IEEE Trans. Inf. Forensics Secur. 12(10): 2416-2429 (2017) - [j13]Mohammad-Mahdi Bidmeshki, Xiaolong Guo, Raj Gautam Dutta, Yier Jin
, Yiorgos Makris
:
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation. IEEE Trans. Inf. Forensics Secur. 12(10): 2430-2443 (2017) - [j12]Jacob Wurm, Yier Jin
, Yang Liu, Shiyan Hu, Kenneth Heffner, Fahim Rahman, Mark M. Tehranipoor:
Introduction to Cyber-Physical System Security: A Cross-Layer Perspective. IEEE Trans. Multi Scale Comput. Syst. 3(3): 215-227 (2017) - [j11]Yu Liu, Yier Jin
, Aria Nosratinia, Yiorgos Makris
:
Silicon Demonstration of Hardware Trojan Design and Detection in Wireless Cryptographic ICs. IEEE Trans. Very Large Scale Integr. Syst. 25(4): 1506-1519 (2017) - [j10]Jiaji He
, Yiqiang Zhao, Xiaolong Guo, Yier Jin
:
Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis. IEEE Trans. Very Large Scale Integr. Syst. 25(10): 2939-2948 (2017) - [j9]Xiaolong Guo, Raj Gautam Dutta, Prabhat Mishra, Yier Jin
:
Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3390-3400 (2017) - [c68]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Yier Jin
:
PCH framework for IP runtime security verification. AsianHOST 2017: 79-84 - [c67]Zihao Liu, Wujie Wen, Lei Jiang, Yier Jin
, Gang Quan:
A statistical STT-RAM retention model for fast memory subsystem designs. ASP-DAC 2017: 720-725 - [c66]Raj Gautam Dutta, Xiaolong Guo, Teng Zhang, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin
:
Estimation of Safe Sensor Measurements of Autonomous System Under Attack. DAC 2017: 46:1-46:6 - [c65]Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin
:
Approximate Power Grid Protection Against False Data Injection Attacks. DASC/PiCom/DataCom/CyberSciTech 2017: 527-533 - [c64]Zhen Ling, Kaizheng Liu, Yiling Xu, Yier Jin
, Xinwen Fu:
An End-to-End View of IoT Security and Privacy. GLOBECOM 2017: 1-7 - [c63]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin
:
Cyclic Obfuscation for Creating SAT-Unresolvable Circuits. ACM Great Lakes Symposium on VLSI 2017: 173-178 - [c62]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin
:
Circuit Obfuscation and Oracle-guided Attacks: Who can Prevail? ACM Great Lakes Symposium on VLSI 2017: 357-362 - [c61]Kaveh Shamsi, Meng Li, Travis Meade, Zheng Zhao, David Z. Pan, Yier Jin
:
AppSAT: Approximately deobfuscating integrated circuits. HOST 2017: 95-100 - [c60]Shaza Zeitouni, Ghada Dessouky, Orlando Arias, Dean Sullivan, Ahmad Ibrahim, Yier Jin
, Ahmad-Reza Sadeghi:
ATRIUM: Runtime attestation resilient under memory attacks. ICCAD 2017: 384-391 - [c59]Tao Liu, Zihao Liu, Fuhong Lin, Yier Jin
, Gang Quan, Wujie Wen:
MT-spike: A multilayer time-based spiking neuromorphic architecture with temporal error backpropagation. ICCAD 2017: 450-457 - [c58]Nathalie Domingo, Bryan Pearson, Yier Jin
:
Exploitations of wireless interfaces via network scanning. ICNC 2017: 937-941 - [c57]Orlando Arias, Dean Sullivan, Yier Jin
:
HA2lloc: Hardware-Assisted Secure Allocator. HASP@ISCA 2017: 8:1-8:7 - [c56]Travis Meade, Zheng Zhao, Shaojie Zhang, David Z. Pan, Yier Jin
:
Revisit sequential logic obfuscation: Attacks and defenses. ISCAS 2017: 1-4 - [c55]Fahim Rahman, Mohammad Farmani, Mark M. Tehranipoor, Yier Jin
:
Hardware-Assisted Cybersecurity for IoT Devices. MTV 2017: 51-56 - [c54]David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin
, Ahmad-Reza Sadeghi:
LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. RAID 2017: 238-258 - [i2]Dean Sullivan, Orlando Arias, David Gens, Lucas Davi, Ahmad-Reza Sadeghi, Yier Jin:
Execution Integrity with In-Place Encryption. CoRR abs/1703.02698 (2017) - [i1]Qixue Xiao, Kang Li, Deyue Zhang, Yier Jin:
Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications. CoRR abs/1712.07805 (2017) - 2016
- [j8]Sandip Ray, Yier Jin
, Arijit Raychowdhury:
The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction. IEEE Des. Test 33(2): 76-96 (2016) - [j7]Yu Bi, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, Xiaobo Sharon Hu
, Michael T. Niemier, Yier Jin
:
Emerging Technology-Based Design of Primitives for Hardware Security. ACM J. Emerg. Technol. Comput. Syst. 13(1): 3:1-3:19 (2016) - [j6]Shiyan Hu, Yier Jin
, Kenneth Heffner, Mark M. Tehranipoor:
Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing. IEEE Trans. Multi Scale Comput. Syst. 2(3): 144-145 (2016) - [j5]